SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

Size: px
Start display at page:

Download "SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions"

Transcription

1 SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System Lab The College of Wllam and Mary Hewlett-Packard Laboratores Wllamsburg, VA 387, USA Palo Alto, CA 9434, USA fsqchen,zhangg@cs.wm.edu fboshen,basusg@hpl.hp.com Abstract Wth the fallng prce of the memory, an ncreasng number of multmeda servers and proxes are now equpped wth a large DRAM memory space. Cachng meda objects n the memory of a proxy helps to reduce network traffc, dsk I/O bandwdth requrement, and data delvery latency. The runnng buffer approach and ts alternatves are representatve technques to cache streamng data n the memory. However, there are two lmts n the exstng technques. Frst, although multple runnng buffers for the same meda object co-exst n a gven processng perod, data sharng among the multple buffers s not consdered. Second, user access patterns are not nsghtfully consdered n the buffer management. In ths paper, we propose two technques based on shared runnng buffers (SRB) n the proxy to address these lmts. Consderng user access patterns and characterstcs of the requested meda objects, our technques adaptvely allocate memory buffers to fully utlze the currently buffered data of streamng sessons, wth the am to reduce both the server load and the network traffc. Expermentally comparng wth several exstng technques, we show that the proposed technques have acheved sgnfcant performance mprovement by effectvely usng the shared runnng buffers.. Introducton The basc nfrastructure of a Web content delvery network s a server-proxy-clent system. In ths system, the server delvers the content to the clent through a proxy. The proxy can choose to cache the object so that subsequent requests to the same object can be served drectly from the proxy wthout contactng the server. Proxy cachng strateges have therefore been the focus of many studes. Much work has been done n cachng the statc Web contents to reduce network load and end-to-end latency. The delvery of streamng meda content presents several challenges: () The sze of a streamng meda object s usually orders of magntudes larger than tradtonal textbased Web contents. For example, a two hour MPEG vdeo requres more than GB of dsk space, whle text-based Web objects are of the magntude of KB; () The demand of contnuous and tmely delvery of a streamng meda object s more rgorous than that of the text-based Web pages. Therefore a lot of resources have to be reserved for delverng the streamng meda data to a clent. In practce, even a relatvely small number of clents can overload a meda server, creatng bottlenecks by demandng hgh dsk bandwdth on the server and hgh network bandwdth to the clents. To address these challenges, researchers have proposed dfferent methods to cache streamng meda objects. Partal cachng (see e.g. [3], [7], [], [], [3], [4]) s a techncal method to cache ether a prefx or segments of a meda object n the dsk storage of the proxy. Researchers have also pad attenton to dynamcally cachng streamng data n the proxy memory to reduce the access latency. The fxed-szed runnng buffer cachng [] and the nterval cachng [4], [5] are two representatve memory-based runnng buffer based cachng technques. The basc dea of the runnng buffer based cachng technque s as follows. When a request arrves, a fxed-szed buffer of a predetermned length s allocated n the man memory to cache the meda data fetched by the proxy, hopng that subsquent requests could reuse the data n the memory nstead of obtanng t from other sources (the dsk, the orgn server or other caches). In contrast, the nterval cachng technque uses a dfferent approach. It consders two mmedately followed requests as a request par, and ncrementally orders the arrval ntervals of all request pars (the arrval nterval of a request par s defned as the dfference n ther arrval tmes). In the memory allocaton, the nterval cachng gves a preference to smaller ntervals, ex- Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

2 pectng more requests can be served for a gven amount of memory. Fgure llustrates the basc deas of the runnng buffer cachng and the nterval cachng technques. Meda Poston R R R3 R4 R5 R6 (a) B B Access Tme Meda Poston R R R3 R4 R5 R6 (b) B B Access Tme Fgure. Runnng Buffer (a) and Interval Cachng (b) In Fgure, the Meda Poston ndcates a tme poston n a streamng meda where the meda object s delvered to the clent. The sold slope represents a delvery sesson. In Fgure (a), a fxed-szed buffer B s allocated upon the arrval of the request R. Subsequently, requests R, R3, R4 are served by the data cached n ths buffer snce they arrve n tme. The request R5 does not arrve n tme, so a new buffer B of the same length s allocated, whch benefts the request R6. In Fgure (b), upon the arrval of R, anntervals formed between R and R, and a buffer of the nterval sze s allocated to cache data read by R from now on. So the request R only needs to read the frst part of data from the proxy/server whle recevng the rest data from the buffer. The stuaton changes untl the arrval of request R5,where we assume the nterval betweenr4 and R5 s smaller than that between R3 and R4. Snce the nterval between R4 and R5 s smaller than that between R3 and R4, the buffer allocated for the nterval between R3 and R4 s deallocated, and the space s re-allocated to the new nterval between R4 and R5. However, the runnng buffer cachng does not take consderaton of user access patterns, resultng n the neffcent usage of the memory resource. For example, n Fgure (a), the sze of buffer B s bgger than the amount needed to serve the requests of R through R 4, the sze of buffer B s bgger than the amount needed to serve the request R 5 and the request R 6. The nterval cachng approach does consder the user access pattern n the buffer allocaton. However, t shares another lmt wth the runnng buffer cachng: data sharng among dfferent buffers has not been consdered. For example, B n Fgure (b) does not need to run to the end of the meda f the data cached n buffer B are shared by the later requests. In ths paper, we frst propose a new memory-based cachng algorthm for streamng meda objects, called Shared Runnng Buffers (SRB). In ths algorthm, the memory space on the proxy s allocated adaptvely based on the user access patterns and the requested meda objects themselves. By cachng streamng sessons n runnng buffers, ths algorthm dynamcally caches meda objects n the memory whle delverng the data to the clent so that the bottleneck of the dsk and/or network I/O s releved. More mportantly, the data cached n dfferent runnng buffers are fully shared, whch s dfferent from any of the prevous work [], [4], [5]. Ths approach s especally useful when requests to streamng objects are hghly temporally localzed. The algorthm also effcently reclams the dle memory space and does near-optmal buffer replacement at runtme when requests are termnated. By further lookng nto the patchng approaches that were heavly studed n the VOD (Vdeo-On-Demand) envronment [6], [8], we found that patchng algorthms, such as the greedy patchng, the grace patchng and the optmal patchng [9], take advantage of the clent-sde storage resource to buffer data n multple channels wthout any delay. The greedy patchng always patches to the exstng complete stream whle the grace patchng restarts a new complete stream at some approprate ponts n tme. Furthermore, the optmal patchng [] consders how to reuse the lmted storage on the clent sde to receve as many data as possble whle lstenng to as many channels as possble. Motvated by ths, we further propose an effcent meda delverng algorthm: Patchng SRB (PSRB), whch further mproves the performance of the meda data delvery wthout the necessty of cachng. Fnally, we evaluated our algorthms through a comprehensve set of smulatons based on synthetc workloads and a real access trace of an enterprse meda server. The smulaton results show that the performance of our algorthms s superor to prevous solutons. The rest of the paper s organzed as follows. Secton descrbes the memory-based SRB algorthms we proposed. Smulaton based performance evaluaton results are presented n Secton 3. We then make concludng remarks n Secton 4.. Shared Runnng Buffers (SRB) Meda Cachng Algorthm It has also been shown that two current memory cachng approaches of the meda objects: the runnng buffer cachng and the nterval cachng, do not make effectve use of the lmted memory resource. Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

3 Motvated by the lmts of the current memory bufferng approaches, we desgn a Shared Runnng Buffer (SRB) based cachng algorthm for streamng meda wth the am to maxmze the memory utlzaton. In ths secton, wth the ntroducton of several new concepts, we frst descrbe our basc SRB meda cachng algorthm n detal. Then, we present an extenson to the SRB: Patchng SRB (PSRB)... SRB Related Concepts The algorthm frst consders buffer allocaton n a tme span T startng from the frst request. We denote R j as the j-th request to meda object, andt j as the arrval tme of ths request. Assume that there are n request arrvals wthn the tme span T and R n s the last request arrved n T.For the convenence of representaton wthout losng precson, T s normalzed to and T j (where <j» n) s a tme relatve to T. Based on the above, the followng concepts are defned to capture the characterstcs of the user request pattern.. Interval Seres: An nterval s defned as the dfference n tme between two consecutve request arrvals. We denote I j as the j-th nterval for object. AnInterval Seres conssts of a group of ntervals. Wthn the tme T,fn =, the nterval I s defned as ;otherwse, t s defned as: ( T j+ T j ; f» j<n I j = T T n ; f () j = n: Snce I n represents the tme nterval between the last request arrval and the end of the nvestgatng tme perod, t s called as the Watng Tme.. Average Request P Arrval Interval (ARAI):TheARAI s defned as n k= I k =(n ) when n>. ARAI does not exst when n = snce t ndcates only one request arrval wthn tme frame T andthuswesettas. For the buffer management, three buffer states and three tmng concepts are defned respectvely as follows.. Constructon State & Start-Tme: When an ntal buffer s allocated upon the arrval of a request, the buffer s flled whle the request s beng served, expectng that the data cached n the buffer could serve the closely followed requests for the same object. The sze of the buffer may be adjusted to cache less or more data before t s frozen. Before the freezng happens, the buffer s n the Constructon State. Thus, the Start-Tme of a buffer B j, the j-th buffer allocated for object, s defned as the arrval tme of the last request before the buffer s frozen. We use S j to denote the Start-tme of the buffer B j. The requests arrvng n a buffer s Constructon State are called as the resdent requests of ths buffer and the buffer s called as the resdent buffer of these requests.. Runnng State & Runnng-Dstance: After the buffer freezes ts sze t wll serve as a runnng wndow of a streamng sesson and moves along wth the streamng sesson. Therefore, the state of the buffer s called the Runnng State. The Runnng-Dstance of a buffer s defned as the dstance n terms of tme between a runnng buffer and ts precedng runnng buffer. We use D j to denote the Runnng-Dstance of B j. Note that for the frst buffer allocated to an object, D s equal to the length of object : L. Here, we assume a complete vewng scenaro ntally. Snce we are encouragng the sharng among the buffers, the buffer B j needs only to run to the end pont of B j. Mathematcally, we have: ( L ; f j = D j = S j Sj () ; f j>: 3. Idle State & End-Tme: When the runnng wndow reaches the end of the streamng sesson, the buffer enters the Idle State, whch s a transent state that allows the buffer to be reclamed. The End-Tme of a buffer s defned as the tme when a buffer enters dle state and s ready to be reclamed. The End-Tme of the buffer B j, denoted as s defned as: E j E j ( j S = ; f j = (3) T latest + D j ; f j>: T latest denotes the arrval tme of the most recent request to the object. Here, the T latest dynamcally changes wth the comng of new requests and so does the E j. The detaled updatng procedure of s descrbed n the followng Ej secton... SRB Algorthm For an ncomng request to the object, the SRB algorthm works as follows: () If the latest runnng buffer of the object s cachng the prefx of the object, the request wll be served drectly from all the exstng runnng buffers of the object. () Otherwse, (a) If there s enough memory, a new runnng buffer of a predetermned sze T s allocated. The request wll be served from the new runnng buffer and all exstng runnng buffers of the object. (b)if there s no enough memory, the SRB buffer replacement algorthm (see..3) s called to ether re-allocate an exstng runnng buffer to the request or serve ths request wthout cachng. (3) Update the End-Tmes of all exstng buffers Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

4 Meda Poston T (a) Access Tme Meda Poston T (b) Access Tme Meda Poston T T Fgure. SRB Memory Allocaton: the Intal Buffer Freezes ts Sze (c) Access Tme of the object based on Equaton 3. Durng the process of the SRB algorthm, parts of a runnng buffer could be dynamcally reclamed as descrbed n Secton.. due to the request termnaton and the buffer s dynamcally managed based on the user access pattern through a lfecycle of three states as descrbed n Secton SRB Buffer Lfecycle Management Intally, a runnng buffer s allocated wth a predetermned sze of T. Startng from the Constructon State, t then adjusts ts sze by gong through a three-state lfecycle management process as descrbed n the followng. ffl Case : the buffer s n the Constructon State. The proxy makes a decson at the end of T as follows. If ARAI =, whch ndcates that there s only one request arrval so far, the ntal buffer enters the Idle State (case 3) mmedately. For ths request, the proxy wll serve as a bypass server,.e., the content s passed to the clent wthout cachng. Ths scheme gves preference to more frequently requested objects n the memory allocaton. Fgure (a) llustrates ths stuaton. The shadow ndcates the allocated ntal buffer, whch s reclamed at T. If I n >ARAI(I n s the watng tme), the ntal buffer s shrunk to the extent that the most recent request can be served from the buffer. Subsequently, the buffer enters the Runnng State (case ). Ths runnng buffer wll serve as a shftng wndow and run to the end. Fgure (b) llustrates an example. Part of the ntal buffer s reclamed at the end of T. Ths scheme performs well for perodcally arrved request groups. If I n» ARAI, the ntal buffer mantans the constructon state and contnues to grow to the length of T,whereT = T I n + ARAI, expectng that a new request arrves very soon. At T,theARAI and I are recalculated and the n above procedure repeats. Eventually, when the request to the object becomes less frequent, the buffer wll freeze ts sze and enter the Runnng State (case ). In the extreme case, the full length of the meda object s cached n the buffer. In ths case, the buffer also freezes and enters the runnng state (a statc runnng). For most frequently accessed objects, ths scheme ensures that the requests to these objects are served from the proxy drectly. Fgure (c) llustrates ths stuaton. The ntal buffer has been extended beyond the sze of T for the frst tme. The buffer expanson s bounded by the avalable memory n the proxy. When the avalable memory s exhausted, the buffer freezes ts sze and enters the runnng state regardless of future request arrvals. ffl Case : the buffer s n the Runnng State. After a buffer enters the runnng state, t has run away from the begnnng of the meda object and subsequently arrved requests can not be served completely from the runnng buffer. In ths case, a new buffer of an ntal sze T s allocated and subsequent requests are served from the new buffer as well as ts precedng runnng buffers. In addton, the End-Tme of the new runnng buffer needs to be determned and the End-Tmes of ts precedng runnng buffers E j,... E need to be modfed accordng to the arrval tme of the latest request, as shown n Equaton 3. Fgure 3(a) llustrates the maxmal data sharng n the SRB algorthm. The requests R n to R k+ are served smultaneously from B and B. Late requests could be served from all exstng precedng runnng buffers. Note that except for the frst buffer, the other buffers do not have to run to the end of the object. When the buffer runs to ts End-Tme, tenters the Idle State (case 3). ffl Case 3: the buffer s n the Idle State. Whenabuffer enters the Idle State, t s ready for reclamaton. In the above algorthm, the tme span T (whch s the ntal buffer sze) s determned based on the object length. Typcally, a Scale factor (say, / to /3) of the orgn length s used. To prevent a extremely large or small buffer sze, the buffer sze s bounded by a upper bound: Hgh- Bound and a lower bound: Low-Bound. It can be adjusted by the streamng rate to allow the ntal buffer to cache a reasonable length (e.g., mnute to mnutes) of meda data. The algorthm requres the clent be able to lsten to multple channels at the same tme: once a request s posted, t should be able to receve data from all the ongong runnng buffers of that object smultaneously. Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

5 Meda Poston B R R... R k R k+ R n (a) B Access Tme R Meda Poston R 3 R 4 5 R R 6 R 7 8 R R B B b a (b) Access Tme Fgure 3. Data Sharng among Buffers n SRB Algorthm (a) and Example of PSRB Algorthm (b)... SRB Buffer Dynamc Reclamaton The memory reclamaton of a runnng buffer s trggered by two dfferent types of sesson termnatons: the complete sesson termnaton and the premature sesson termnaton. In the complete sesson termnaton, a sesson termnates only when the delvery of the whole meda object s completed, whch only happens when the buffer s n the Runnng State. In ths case, assume that R s the frst request beng served by a runnng buffer. When R reaches the end of the meda object, the followng two scenaros happen for the resdent buffer of R ;. If the resdent buffer s the only runnng buffer for the meda object, the resdent buffer enters the dle state. In ths state, the buffer mantans ts content untl all the resdent requests reach the end of the sesson. On that tme, the buffer s released.. If the resdent buffer s not the only runnng buffer, that s, there are succeedng runnng buffers, the buffer enters the dle state and mantans ts content untl ts End-Tme. Note that the End-Tme may be updated by succeedng runnng buffers. The premature sesson termnaton s much more complcated. In the premature sesson termnaton, the request arrvng later may termnate earler, whch can happen when a buffer s n the Constructon State or the Runnng State. Consderng a group of consecutve requests R to that Rn are beng served by a runnng buffer, the sesson for one of the requests, say R j,where <j< n, termnates before everyone else. The stuaton s handled as follows.. If R j s served from the mddle of ts resdent buffer, that s, there are precedng and succeedng requests served from the same runnng buffer, the resdent buffer mantans ts current state and the request R j gets deleted from all ts assocated runnng buffers.. If R j s served from the head of ts resdent buffer, the request s deleted from all of ts assocated runnng buffers. The resdent buffer enters the dle state for a tme perod of I. Durng ths tme perod, the content to the head. At the end of the tme perod I, the buffer space from the tal to the last served request s released and the buffer enters the runnng state agan. wthn the buffer s moved from R j+ 3. If R j s served at the tal of a runnng buffer, two scenaros are further consdered. ffl After deletng the R j from the request lst of ts resdent buffer, f the request lst s not empty, then do nothng. Alternatvely, the algorthm can choose to shrnk the buffer to the extent that R j can stll be served from the buffer (assumng R j s a resdent request of the same buffer). In ths case, the End-Tmes of the succeedng runnng buffers need to be adjusted. ffl If R j s at the tal of the last runnng buffer, the buffer wll be shrunk to the extent that R j s the last request served from the buffer. R j s deleted from the request lst...3. SRB Buffer Replacement Polcy The replacement polcy s mportant n the sense that the avalable memory s stll scarce compared to the sze of vdeo objects. So to effcently use the lmted resources s crtcal to acheve the best performance gan. In ths secton, we propose popularty based replacement polces for the SRB meda cachng algorthm. The basc dea s descrbed as follows: ffl When a request arrves whle there s no avalable memory, all the objects that have on-gong streams n the memory are ordered accordng to ther populartes calculated n a certan past tme perod. If the object beng demanded has a hgher popularty than the least popular object n the memory, then the latest runnng buffer of the least popular object wll be deallocated, and the space s re-allocated to the new request. Those requests wthout runnng buffers do not buffer ther data at all. In ths case, theoretcally, they are assumed to have no memory consumpton. We have precsely analyzed our popularty based replacement polces by both the modelng and the smulaton n the reference [], whch s omtted due to page lmts..3. Patchng SRB (PSRB) Meda Delverng Algorthm Snce the proxy has a fnte amount of memory space, t s possble that the proxy serves as a bypass server to transently cache concurrent sessons. The SRB algorthm pro- Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

6 hbts the sharng of such sessons, whch may lead to excessve server access when there are ntensve request arrvals to many dfferent objects. To solve ths problem, the SRB algorthm s extended to a Patchng SRB (PSRB) algorthm whch enables the sharng of such bypass sessons. It s mportant to note that PSRB scheme makes the memorybased SRB algorthm work wth the memoryless patchng algorthm. Fgure 3(b) llustrates a PSRB scenaro. The frst runnng buffer B has been formed for requests R to R5.Nobuffer s runnng for R 6 snce t does not have a close neghborng request. However, a patchng sesson has been started to retreve the absent prefx n B from the content server. At ths tme, request R 6 s served from both the patchng sesson and B untl the mssng prefx s patched. Then, R6 s served from B only (the sold lne for R6 ends). When R 7 and R 8 arrve and form the second runnng buffer B, they are served from B and B as descrbed n the SRB algorthm. In addton, they are also served from the patchng sesson ntated for R 6. Note that the patchng sesson for R 6 s transent, or we can thnk of t as a runnng buffer sesson wth zero buffer sze. As evdent from the fgure, the fllng of B does not cause server traffc between poston a and b (no sold lne between a and b)snceb s flled from the patchng sesson for R 6. Sharng the patchng sesson further reduces the the number of server accesses for R 7 and R8. In general, the PSRB algorthm s a combnaton of the SRB algorthm wth the optmal patchng algo- rthm proposed n []. By usng more clent-sde storage, PSRB tres to maxmze the data sharng among concurrent sessons n order to mnmze the server-to-proxy traffc. 3. Performance Evaluaton To evaluate the performance of the proposed algorthms and to compare them wth pror solutons, we have mplemented an event-drven smulator to model a proxy s memory cachng behavor. Both synthetc workloads and a real workload extracted from enterprse meda server logs are used. However, n the followng context, only the performance results based on the real workload are presented. Others are omtted due to page lmts. Interested readers can refer to []. The real workload, named as REAL, s extracted from HP Corporate Meda Solutons, coverng the perod from Aprl to Aprl,. There are a total of 43 objects, and the unque object sze accounts to G. There are 9 requests, whch run for 9647 seconds, roughly days. Our analyss shows that 83% requests only vew the objects for less than mnutes and 56% requests only vew the objects for less than %. Only about % requests vew the whole objects. 3.. Evaluaton Metrcs Snce the object ht rato or ht rato s not sutable for evaluatng the cachng performance of the streamng meda, we use the server traffc reducton (shown as bandwdth reducton n the fgures) to evaluate the performance of the proposed cachng algorthms. If the algorthms are employed on a server, ths parameter ndcates dsk I/O traffc reducton. Usng SRB or PSRB algorthms, a clent needs to lsten to multple channels for the maxmal sharng of the cached data n the proxy s memory. We measure the traffc between the proxy and the clent n terms of average clent channel requrement. Ths s an averaged number of channels the clents are lstenng to durng the sessons. Snce the clents are lstenng to earler on-gong sessons, storage s needed at the clent to buffer the data before ts presentaton. We use the average clent storage requrement n percentage of the full sze of the meda object to ndcate the storage requrement on the clent sde. If a sesson termnates before t reaches the end of the requested meda object, t s possble that the clent has already downloaded future part of the meda stream whch s no longer needed. To characterze ths wasted delvery from proxy to the clent, we record average clent waste durng the smulaton. It s the percentage of wasted bytes versus the averaged total prefetched data. The effectveness of the algorthms s studed by smulatng dfferent scale factors for the allocaton of the ntal buffer sze and varyng memory cache capactes. The streamng rate s assumed to be constant for smplcty. The smulatons are conducted on a HP workstaton x4, wth GHz CPU and GB memory, runnng Lnux Redhat 7.. For each smulaton, we compare a set of seven algorthms n three groups. The frst group contans bufferng schemes whch nclude the runnng buffer cachng and the nterval cachng. The second group contans patchng algorthms, specfcally the greedy patchng, the grace patchng and the optmal patchng. The thrd group contans the two shared runnng buffer algorthms proposed n ths paper. 3.. Performance Results Frst, we evaluate the cachng performance wth respect to the ntal buffer sze. Wth a fxed memory capacty of GB, the ntal buffer sze vares from to /3 of the length of meda objects. For each scale factor, the ntal buffer of dfferent szes s allocated f the length of the meda object s dfferent. The server traffc reducton,theaverage clent channel requrement and the average clent storage requrement are recorded n the smulaton. The results are plotted n Fgure 4 and Fgure 5. Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

7 Bandwdth Reducton (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB /Scale Average Clent Channel Requrement RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB /Scale Fgure 4. REAL: (a) Bandwdth Reducton and (b) Average Clent Channel Requrement wth GB Memory Average Clent Storage Requrement (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB /Scale Average Clent Waste (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB /Scale Fgure 5. REAL: (a) Average Clent Storage Requrement(%) and (b) Clent Waste(%) wth GB Memory Fgure 4(a) shows the server traffc reducton acheved by each algorthm. Notce that PSRB acheves the best traffc reducton. As expected, the performance of the three patchng algorthms does not depends on the scale factor for allocatng the ntal buffer. Nether does that of the nterval cachng snce the nterval cachng allocates buffers based on access ntervals. The changes of scale factor have a sgnfcant mpact on the performance of the proposed SRB and PSRB algorthms, especally when the scale factor s /8, /6 or /3. Ths s due to the burst nature of the accesses logged n the workload and the trade-off between the number of runnng buffers and the szes of runnng buffers. A larger buffer mples that more requests can be served from the proxy buffer. However, a larger buffer also ndcates that less memory space s left for other requests. Ths n turn leads to a larger number of server accesses snce there s no avalable memory. On the other hand, a smaller buffer may serve a smaller number of requests but t leaves more memory space for the system to allocate for other requests. Despte of these performance fluctuatons, we can stll see that PSRB and SRB acheve hgher traffc reducton rates from Fgure 4. The result concludes that PSRB uses 6% of the clent channel to acheve 5% hgher traffc reducton than the optmal patchng as shown n Fgure 4(b). Fgure 5(a) shows the average storage requrement on the clent. PSRB allows the sesson sharng even when memory space s not avalable. It s therefore expected that PSRB acheves the hghest rate of server traffc rate reducton. In the mean tme, t also requres the largest clent sde storage. On the other hand, SRB acheves about 4% less traffc reducton averagely, but the requrement on clent channel and storage s sgnfcantly lower. Fgure 5(b) shows that the clent sde wastes for PSRB Bandwdth Reducton (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB Memory Cache Sze (Gbytes) Average Clent Channel Requrement RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB Memory Cache Sze (Gbytes) Fgure 6. REAL: (a) Bandwdth Reducton and (b) Average Clent Channel Requrement wth the Scale of /4 and SRB are about 33% and 5% respectvely, compared to % for the nterval cachng. Snce the wasted bytes are not counted as hts, ths leads to the lowered traffc reducton rate for PSRB and SRB. From another perspectve, even wth the waste, PSRB and SRB stll can acheve better performance than other technques. Settng the ntal buffer sze as /4 of the requested meda object, we agan evaluate the cachng performance wth the ncreasng amount of the avalable proxy memory. Fgure 6 and Fgure 7 show the server traffc reducton rate and the clent sde statstcs respectvely. Fgure 6(a) shows that dstances between the traffc reducton curves of PSRB, SRB and the nterval cachng become much smaller n general. Ths renforces the observaton that PSRB and SRB have more waste due to the partal vewng nature. In addton, the grace patchng achevng al- Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

8 Average Clent Storage Requrement (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB Memory Cache Sze (Gbytes) Average Clent Waste (%) RB Cachng Interval Cachng SRB Cachng Greedy Patchng Grace Patchng Optmal Patchng Patchng SRB Memory Cache Sze (Gbytes) Fgure 7. REAL: (a) Average Clent Storage Requrement(%) and (b) Clent Waste(%) wth the Scale of /4 most no traffc reducton shows ts ncapablty n dealng wth the partal vewng stuaton. Fgure 6 and Fgure 7 also show a flat gan when the memory capacty ncreases. It seems to ndcate that the memory capacty s a mnor factor. Once agan, the burst nature of the request arrval may play a role here. In addton, the volume of the burst may also be low whch leads to the fact that a lmted amount of memory space suffces the sharng of sessons. 4. Concluson In ths paper, we propose two new algorthms for effcently delverng streamng meda objects. Shared Runnng Buffers (SRB) cachng algorthm s proposed to dynamcally cache meda objects n the proxy memory durng the delvery. Patchng SRB (PSRB) algorthm s proposed to further enhance the memory utlzaton n the proxy. Our algorthms can adaptvely allocate the memory buffer by consderng the user access pattern, and enable the data beng fully shared among dfferent buffers. Extensve smulatons are conducted to evaluate these algorthms. The smulaton results demonstrate the effcency acheved by the proposed algorthms. Both algorthms requre the clent capable of lstenng to multple channels at the same tme. Compared wth prevous solutons whch also requre multple clent channels, the proposed algorthms acheve hgher server traffc reducton rate wth less or smlar load on the lnk between the proxy and the clent. References [] E. Bommaah, K. Guo, M. Hofmann, and S. Paul. Desgn and mplementaton of a cachng system for streamng meda over the nternet. In Proceedngs of IEEE Real Tme Technology and Applcatons Symposum, May. [] S. Chen, B. Shen, S. Basu, and Y. Yan. Srb:the shared runnng buffer based proxy cachng of streamng sessons. In Hewlett-Packard Laboratores Tech. Report, 3. [3] S. Chen, B. Shen, S. Wee, and X. Zhang. Adaptve and lazy segmentaton based proxy cachng for streamng meda delvery. In Proceedngs of ACM Workshop on Network and Operatng System Support for Dgtal Audo and Vdeo (NOSSDAV), June 3. [4] A. Dan and D. Staram. Buffer management polcy for an on-demand vdeo server. In IBM Research Report 9347, 993. [5] A. Dan and D. Staram. A generalzed nterval cachng polcy for mxed nteractve and long vdeo workloads. In Proceedngs of Multmeda Computng and Networkng, Jan [6] A. Dan, D. Staram, and P. Shahabuddn. Schedulng polces for an on-demand vdeo server wth batchng. In Proceedngs of ACM Multmeda, Oct [7] D. L. Eager, M. C. Ferrs, and M. K. Vernon. Optmzed regonal cachng for on-demand data delvery. In Proceedngs of Multmeda Computng and Networkng, Jan [8] L. Gao and D. Towsley. Supplyng nstantaneous vdeo-ondemand servces usng controlled multcast. In Proceedngs of IEEE Internatonal Conference on Multmeda Computng and Systems, June, 999. [9] K. A. Hua, Y. Ca, and S. Sheu. Patchng : A multcast technque for true vdeo-on-demand servces. In Proceedngs of ACM Multmeda, Sept [] S. Lee, W. Ma, and B. Shen. An nteractve vdeo delvery and cachng system usng vdeo summarzaton. In Computer Communcatons, volume 5, pages , March. [] R. Rejae, M. Handley, H. Yu, and D. Estrn. Proxy cachng mechansm for multmeda playback streams n the nternet. In Proceedngs of Web Cachng Workshop, March 999. [] S. Sen, L. Gao, J. Rexford, and D. Towsley. Optmal patchng schemes for effcent multmeda streamng. In Proceedngs of ACM Workshop on Network and Operatng System Support for Dgtal Audo and Vdeo (NOSSDAV), June 999. [3] S. Sen, J. Rexford, and D. Towsley. Proxy prefx cachng for multmeda streams. In Proceedngs of IEEE INFOCOM, March 999. [4] K. Wu, P. S. Yu, and J. Wolf. Segment-based proxy cachng of multmeda streams. In Proceedngs of WWW, Sept.. Acknowledgments We apprecate the constructve comments from the anonymous referees. We also thank Mtch Trott and Suse Wee of HP Laboratores for ther comments and suggestons on ths work. Proceedngs of the 4th Internatonal Conference on Dstrbuted Computng Systems (ICDCS 4) /4 $. 4 IEEE

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access Agenda Cache Performance Samra Khan March 28, 217 Revew from last lecture Cache access Assocatvty Replacement Cache Performance Cache Abstracton and Metrcs Address Tag Store (s the address n the cache?

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

FRES-CAR: An Adaptive Cache Replacement Policy

FRES-CAR: An Adaptive Cache Replacement Policy FRES-CAR: An Adaptve Cache Replacement Polcy George Palls, Athena Vaal, Eythms Sdropoulos Department of Informatcs Arstotle Unversty of Thessalon, 54124, Thessalon, Greece gpalls@ccf.auth.gr, {avaal, eythms}@csd.auth.gr

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Analytic Evaluation of Quality of Service for On-Demand Data Delivery

Analytic Evaluation of Quality of Service for On-Demand Data Delivery Analytc Evaluaton of Qualty of Servce for On-Demand Data Delvery Hongfe Guo Haonan Tan ( guo@cs.wsc.edu) (haonan@cs.wsc.edu) Abstract Qualty of servce (QoS) measured as balkng probablty and average watng

More information

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Content Classification for Caching under CDNs

Content Classification for Caching under CDNs Content Classfcaton for Cachng under CDNs George Palls 1,2, Charlaos homos 2, Konstantnos Stamos 2, Athena Vakal 2, George Andreads 3 1 Department of Computer Scence, Unversty of Cyprus 2 Department of

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Queueing Network-based Optimisation Techniques for Workload Allocation in Clusters of Computers *

Queueing Network-based Optimisation Techniques for Workload Allocation in Clusters of Computers * Queueng Network-based Optmsaton Technques for Workload Allocaton n Clusters of Computers * Lgang He, Stephen A. Jarvs, Davd Bacgalupo, Danel P. Spooner, Xnuo Chen and Graham R. Nudd Department of Computer

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement Clustered Multmeda NOD : Popularty-Based Artcle Prefetchng and Placement Y.J.Km, T.U.Cho, K.O.Jung, Y.K.Kang, S.H.Park, K-Dong Chung Department of Computer Scence, Pusan Natonal Unversty, Korea Abstract

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Lecture 7 Real Time Task Scheduling. Forrest Brewer

Lecture 7 Real Time Task Scheduling. Forrest Brewer Lecture 7 Real Tme Task Schedulng Forrest Brewer Real Tme ANSI defnes real tme as A Real tme process s a process whch delvers the results of processng n a gven tme span A data may requre processng at a

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to:

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to: 4.1 4.2 Motvaton EE 457 Unt 4 Computer System Performance An ndvdual user wants to: Mnmze sngle program executon tme A datacenter owner wants to: Maxmze number of Mnmze ( ) http://e-tellgentnternetmarketng.com/webste/frustrated-computer-user-2/

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Burst Round Robin as a Proportional-Share Scheduling Algorithm

Burst Round Robin as a Proportional-Share Scheduling Algorithm Burst Round Robn as a Proportonal-Share Schedulng Algorthm Tarek Helmy * Abdelkader Dekdouk ** * College of Computer Scence & Engneerng, Kng Fahd Unversty of Petroleum and Mnerals, Dhahran 31261, Saud

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms On Achevng Farness n the Jont Allocaton of Buffer and Bandwdth Resources: Prncples and Algorthms Yunka Zhou and Harsh Sethu (correspondng author) Abstract Farness n network traffc management can mprove

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

BANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION

BANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION ARPN Journal of Engneerng and Appled Scences 2006-2009 Asan Research Publshng Network (ARPN). All rghts reserved. BANDWIDTH OPTIMIZATION OF INDIVIDUA HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICA APPICATION

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS

FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS Sunghoon Ivan Lee, Hyunggon Park, and Mhaela van der Schaar Electrcal Engneerng

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks Channel-Qualty Dependent Earlest Deadlne Due Far Schedulng Schemes for Wreless Multmeda Networks Ahmed K. F. Khattab Khaled M. F. Elsayed ahmedkhattab@eng.cu.edu.eg khaled@eee.org Department of Electroncs

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Scalable Download Protocols

Scalable Download Protocols Scalable Download Protocols A Thess Submtted to the College of Graduate Studes and Research In Partal Fulfllment of the Requrements For the Degree of Doctor of Phlosophy In the Department of Computer Scence

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Reducing I/O Demand in Video-On-Demand Storage Servers. from being transmitted directly from tertiary devices.

Reducing I/O Demand in Video-On-Demand Storage Servers. from being transmitted directly from tertiary devices. Reducng I/O Demand n Vdeo-On-Demand Storage Servers Leana Golubchk y John C.S. Lu z Rchard Muntz x Abstract Recent technologcal advances have made multmeda on-demand servces, such as home entertanment

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Buğra Gedk, Kun-Lung Wu, Phlp S. Yu, Lng Lu College of Computng, Georga Tech Atlanta GA 333 {bgedk,lnglu}@cc.gatech.edu IBM T. J. Watson Research Center Yorktown

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Bu gra Gedk College of Computng, GaTech bgedk@cc.gatech.edu Kun-Lung Wu, Phlp Yu T.J. Watson Research, IBM {klwu,psyu}@us.bm.com Lng Lu College of Computng,

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

Evaluation of TCP Variants and Bandwidth on Demand over Next Generation Satellite Network

Evaluation of TCP Variants and Bandwidth on Demand over Next Generation Satellite Network Evaluaton of TCP Varants and Bandwdth on Demand over Next Generaton Satellte Network Songrth Kttperachol, Zhl Sun and Hatham Cruckshank Centre for Communcaton Systems Research Unversty of Surrey Guldford,

More information

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 8, Aug. 2016 3753 Copyrght c2016 KSII Instantaneous Farness of TCP n Heterogeneous Traffc Wreless LAN Envronments Young-Jn Jung 1 and

More information

Agile Data Streaming for Grid Applications

Agile Data Streaming for Grid Applications Agle Data Streamng for Grd Applcatons Wen Zhang, Junwe Cao 2,3*, Ysheng Zhong,3, Lanchen Lu,3, and Cheng Wu,3 Department of Automaton, Tsnghua Unversty, Bejng 00084, Chna 2 Research Insttute of Informaton

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information