Priority-Based Distribution Trees for Application-Level Multicast
|
|
- Jeffrey Kory Gibson
- 5 years ago
- Views:
Transcription
1 Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer, farin, mauve, ABSTRACT In thi paper, we propoe a novel multicat routing algorithm that i baed on application-level prioritie and network characteritic: The application may pecify an individual priority for each packetreceiver pair. The multicat ditribution tree i then contructed uch that the higher the priority, the more direct the path from the ender to the packet detination and the lower the reulting endto-end delay. Thi algorithm can be ued to realize applicationlevel multicat for delay-enitive application uch a networked computer game. However, optimizing the multicat tree with repect to the end-to-end delay come at the cot of an increae in link tre the more direct a path, the le likely it i that it can be integrated efficiently into an overlay ditribution tree. Our algorithm take thi tradeoff into account and contruct efficient prioritybaed multicat tree. We demontrate the performance and characteritic of the algorithm through imulation. Keyword Application-Level Multicat, Multicat Routing, Ditribution Tree.. INTRODUCTION Group communication, or multicat, i needed by ditributed interactive application to deliver data from one ender to multiple receiver. Example are video conference, groupware ytem, and networked computer game. In many cae, realizing group communication by etting up a direct connection from a ender to each receiver i not a viable olution becaue of reource limitation. In the Internet, IP multicat provide efficient group communication by duplicating packet within the network router o that data travere phyical link only once. But due to variou technical and adminitrational reaon, IP multicat ha not been widely deployed. A promiing alternative i application-level multicat ALM) [-8]: The key idea i to ue the end-ytem a node in a multicat ditribution tree. The contruction and maintenance of the tree i done at the application level without any upport from the network. Router within the network do not have to keep tate information about group memberhip. Furthermore, ALM can be deployed immediately without any change to the network. Thi eliminate two key problem of IP multicat. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. NetGame May -,, Redwood City, CA, USA Copyright ACM -8-7-//...$.. Exiting approache for ALM focu on network characteritic e.g., latency) to contruct the multicat ditribution tree. A long a thoe characteritic remain contant and no change in the et of eion member occur, all packet from a ender will take the ame path toward the detination. Thi approach i well uited when all packet hould be delivered to all receiver with the ame priority e.g., in a multi-detination file tranfer). However, a number of application exit where the priority of a packet may be different for the receiver. In a networked computer game, for example, the action of a player i very important to competing player that are cloe by. Thee player hould receive information about uch action with a very low delay. Other player may be able to tolerate a higher delay, depending on their location and orientation within the game. Furthermore, a packet priority may change over time for ome or all receiver. For example, if enor data i tranmitted by a ender, thi data may typically have a low priority for all receiver, unle an extreme enor reading occur which require the tranmiion of a packet with very low latency to ome receiver. Traditional tree routing algorithm are unable to handle thee ituation. In thi paper, we propoe to ue a combination of applicationlevel prioritie and network characteritic in order to build and maintain a multicat ditribution tree. Since multicat routing i handled at the application level, integrating application knowledge into the routing deciion come natural and introduce little overhead. The general idea of our approach i to allow the ending application to aign a priority to each pair of packet and receiver. The higher the priority, the more direct will be the path that the packet take toward it detination. The cot for reduced latency i a poible increae in link tre i.e., the number of copie of a packet that travere the ame link). Thu, the key challenge i to find an appropriate algorithm for the contruction of a multicat ditribution tree which take thi tradeoff into account. The remainder of thi paper i tructured a follow: in Section we briefly outline exiting approache for application-level multicat. The algorithm for the contruction of multicat ditribution tree which take application-level emantic into account i decribed in Section. In Section we dicu practical iue uch a the maintenance of a ditribution tree that may change on a perpacket bai and how to efficiently ditribute topology information to other node. Section contain an evaluation of the preented algorithm by mean of imulation. We conclude the paper and give an outlook on future work in Section.. RELATED WORK Typically, application-level multicat algorithm contruct their ditribution topologie baed on path characteritic uch a endto-end) latency, available bandwidth and packet lo rate. Their
2 aim i to build ditribution tree that minimize the additional routing overhead compared to native IP multicat. Yoid [7] create a ingle multicat tree for all end-ytem that participate in a eion, independently of a pecific ender. Each node elect another node a parent, preferably a node with a low network delay to. Receiver gather a lit of poible parent on bai of periodic control meage and explicit querie. An initial lit can be obtained from a o-called rendezvou hot during the boottrap phae. Aide from the network delay, the maximum number of children that can be attached to a potential parent i.e., the fan-out) i conidered in the choice of a parent node. Becaue the lit of poible parent i uually incomplete and the fan-out i contrained, the reulting ditribution tree may be uboptimal. A a conequence, node periodically ping other eion member in order to find a better parent and optimize the tree tructure. An alternative method to elect a parent node in Yoid i provided for the tranfer of large data file: node connect to the parent that cache the larget amount of data. Other example for tree building ALM protocol are HMTP [], BTP [8], and Overcat [9]. They all form elf-organizing ditribution tree where node elect an appropriate parent, and they implement mechanim for integrating new member, detecting loop and partition, and for optimizing the tree by rearrangement. Unlike the other protocol, Overcat build ender-pecific tree intead of a ingle hared tree. With TMeh [], the author propoe to add additional link to the multicat tree. While thee hortcut reduce the number of hop on the way from a ender to the receiver, TMeh eek to optimize the average end-to-end delay for the whole group and build a rather table ALM tree. Thu, TMeh eem not to be flexible and fat enough to facilitate delay optimization for certain receiver in an environment where prioritie change dynamically. Intead of contructing a tree directly, Narada [] employ a twotep proce. Firt, a meh i built among the participating endytem. For the actual data tranport, Narada run a ditance vector protocol with latency and bandwidth [] a the routing metric on top of the meh. The reulting tree i a ender-pecific hortet path tree ) baed on the underlying meh. The crucial factor in thi approach i the quality of the meh that mut balance the number and the characteritic of the ued unicat link. If there are too many link in the meh, the reulting ditribution topology will reemble a tar of unicat connection from the ender to all receiver. A in Yoid, joining end-ytem obtain a lit of current eion member by a boottrap mechanim and connect to one or more lited node. Then, member periodically add link that improve the routing performance and remove link that are rarely utilized by a ditribution tree. Like Narada, Goamer [] alo employ the tree-over-meh approach where the meh i contructed in order to minimize latencie of the ditribution tree. The number of connection that a node can maintain at a certain point in time i explicitly retricted with Goamer in order to take bandwidth limitation into account. Approache where application-level emantic are ued for routing can be found in the area of content delivery network. The common idea of Bayeux [], Chord [], and Content Addreable Network [] i to realize a calable lookup ervice for object e.g., end-ytem) where the reponibility for managing the object pace i hared equally among a network of peer node. The multi-hop lookup path for a target object e.g., the receiver of a meage) i determined on bai of certain propertie of the hahgenerated) detination addre. For example, in Bayeux the current node ue the i-th digit of an object addre to reolve the next hop toward the detination. In contrat to the previouly dicued ap- A 7 B C Figure : Joint path to ditant receiver plication level multicat protocol, thee content delivery network bae their routing deciion almot) excluively on application emantic. Conequently, the reulting ditribution tree may be very inefficient with repect to end-to-end delay and link tre.. APPLICATION-LEVEL MULTICAST ROUTING An ALM routing algorithm build a data ditribution tree with the end-ytem a node connected by unicat link. The reulting tree hould ue the reource of the underlying network efficiently. Since on the application level there i no direct acce to network topology information, obervable parameter e.g., latency) may be ued to deduce a certain amount of knowledge about the actual topology: When node ha a high delay to both node and, and ha a low delay to, then it i likely that the route hare a ignificant portion of the phyical link with route ee Figure ). In the following, we will concentrate on unicat latencie a the network parameter that determine the ALM tree. Two well-known type of tree are the minimum panning tree ) and the hortet path tree ). The optimize the reource uage of the multicat tree but the path length i not conidered and can caue very large end-to-end delay. Hence, uing an i only reaonable when end-to-end delay are not an iue e.g., for non-interactive data diemination). When building an from the unicat delay, the ditribution tree will conit of eparate unicat connection from the ender to each receiver commonly, thi would be regarded a normal unicat rather than application-level multicat). With repect to end-to-end delay the i optimal but it caue a very high conumption of network reource. Furthermore, building a i not poible when the ender bandwidth i not ufficient to erve all receiver imultaneouly. Our aim i to contruct application-aware ditribution tree that balance the characteritic of and : For each packetreceiver pair the application may provide a priority. Depending on thi priority, the path along which the packet i forwarded hould gradually change from the path to the path. In order to find an algorithm with thi property, we firt invetigate well-known metric for the aement of ditribution tree. The optimization of reource uage lead to an, while the optimization of the cumulative end-to-end delay lead to an. We combine thoe two metric by uing one common application priority for the whole ditribution tree. The optimization of the combined metric allow the gradual tranition from path to path a the application priority increae. In a econd tep, we generalize the met- We will ignore that unicat routing protocol may give uboptimal route and aume that the underlying unicat routing algorithm caue direct path to a node to be horter than any indirect path over intermediate node.
3 8 ) ric uch that one priority may be given for each detination. It optimization lead to a tree where each path from the ender to a detination change from the path to the path. Finally, we preent an efficient algorithm which provide a very good approximation for the optimal ditribution tree with repect to the lat metric.. Ditribution Tree Metric Let be a fully connected, directed graph, where denote the et of node and the et of edge, where connect the node and. We define the node a ource and the remaining node a receiver. Edge weight are aigned according to the delay of the correponding link. For %$ each ditribution '& tree!#", we can define two cot function and : Reource uage, defined a the product of link tre and link delay, ummed over all phyical link of the underlying network. Thi um i equivalent to the um of all edge delay in the overlay ditribution tree : $ *) +-,/. Cumulative end-to-end delay, meauring the total delay for the ditribution of a packet from the ource to all receiver. Let 798 :<;=>>>= -?@BA denote the route from the ource '& to the receiver on the current ditribution tree. Then i given by: '& ) C<DE $ ) +EGF-D When optimizing $ '&, the minimum cot tree i equal to the, when optimizing, it i equal to the.. Introducing Application-Level Semantic For many application, electing either of thee two metric a the optimization criterion doe not give the deired reult. While minimizing the total reource uage i deirable, overly large endto-end delay reduce the utility of the application. Hence, ome tradeoff between reource uage and end-to-end delay i required. Let HJI KL MON be the application priority with which it want to deliver data, where M mean that the end-to-end delay for the receiver hould be a low a poible, while K denote no pecial delay requirement. A balancing cot function can be defined a follow: ) P-M'QRHST) +-,U. WVXHY) C<D< $ ) +F D Figure viualize the effect of H when building the optimum ditribution tree according to ) for a ample ALM eion. The participant of the eion are numbered from M to Z, while intermediate router of the underlying network appear a unmarked node. The correponding table contain the pairwie end-to-end delay. Let node [ be the ender. The reulting ditribution tree that are optimal with repect to are depicted in Figure. When H i increaed, node farther away move up in the tree, reducing the end-to-end delay to the ender, ^]`_ until for H\#M K a tar-like _ba Given the ditribution tree = in Figure, the reource uage in the underlying network i MbcedeVf[gcgM`V\Mhch[ikj, which i equal to the um of edge weight in the overlay tree ZlVnm. The link tre i implicitly contained in the end-to-end delay. i reached. A can be een from the graph, the number of poible tree for a mall overlay network with only node i very limited. Following, we generalize the cot function for the cae of individual per-receiver prioritie, where information may be of high importance to ome receiver and hould therefore be delivered on a direct path) and of lower importance to other receiver. Let Hpo@ rqi K@ MON be the per-node prioritie for a ender. They can eaily be integrated into & t &, defining the cot function : & ) C<D< $ Hu e) +EGF D %$ Integrating the per-node prioritie into i more difficult ince the cot are calculated over the edge of the tree and not per receiver. However, in an, the relevant cot for a receiver i the weight of the edge over which it i connected to the ret of the tree. Conequently, the priority of a node can be aigned to thi edge. Thi lead to the following cot function $ : The total cot t $ *) -M'QRHu B +-,/. are defined a $ V & ) Note that pecialize to & if vwhulyxm, and to $ if vyhulz{k. Thi mean that the node prioritie determine the tructure of the minimum cot tree with the extreme and. Direct optimization of thi cot function i computationally complex. Thu, we approximate the cot term in a way that allow u to directly modify edge weight and compute an baed on thee modified weight. In order to calculate the modified weight, the cot function need to be baed olely on the weight of the edge of the tree, and not on complete path to individual receiver. The general idea i to plit the complete path to a receiver into the lat edge of the path and the path of all previou edge :<;= <;}-~=>>>>= -?@ A. We can approximate the cot of the path from to with the cot of the direct edge -, where - i a lower bound for the actual path cot. Thi lead to a implified approximate formulation for the global cot : *) -M'QRHu B +-,U. ) -M'QRHu >B +-,U. WV ) C<DE $ Hu e) +GF D V C<DE $uƒ HuB - `V\ C, G e +, D G ) VpHb B - +-,U. The lat equality follow from the property that a panning tree of a graph ha the ame number of edge a there are target node in the graph. Conequently, both um are calculated over the ame et of edge. In order to minimize, we can apply an algorithm on the graph with modified weight. The new weight are et to 7Š Œ `VpHuOB /--ˆ - ) With increaing HuO, indirect link to the target node > will become more expenive and eventually uch link will be removed from the ditribution tree. Note that a directed algorithm ha to be applied to obtain correct reult a it i not a priori known in which direction data i ditributed over the edge and the cot for
4 End-to-end delay 7 Figure : Example graph a) H I K@ KKyQ KL K@M^ b) H I KL K@MLQiKL [K c) H I K@ [KWQ K@ ZG[ d) H I KL Z[WQ KL j 8 e) H fi K@ j Q M KKG Figure : Optimal ditribution tree
5 oppoing direction may differ. We call the combination of modified edge weight and directed computation priority-baed directed minimum panning tree ) algorithm. Algorithm to contruct in directed graph have been decribed in [, ]. Peudo code for the implementation that wa ued for the imulation can be found in Appendix A.. DESIGN CONSIDERATIONS The preented algorithm improve the application influence on the data ditribution proce through the incluion of application emantic in the contruction of the ditribution tree. However, it i very cotly to recalculate the ditribution tree for each packet. Moreover, node in a pecific ditribution tree need to know which other node or node to forward a packet to and thu require ome information about the tree topology whenever the topology change. Thi information ha to be ditributed to the node in an efficient way. In thi ection, we will dicu how the algorithm can be integrated into application while avoiding exceive calculation in the end-ytem and meage overhead through the ditribution of topology information.. Maintenance of the Ditribution Tree Intead of rebuilding the ditribution tree whenever topology information or application prioritie change, an improved update mechanim can ignificantly reduce the number of neceary tree recomputation. The tree will not change under the following condition: the cot delay) of a link that i not in the directed increae, the cot of a link within the directed decreae, the priority for a receiver which i connected directly to the ender increae, and the priority for a receiver which i connected indirectly via another receiver decreae. In thee cae, it i only neceary to update the link weight. Furthermore, a change in receiver prioritie or link delay may be too mall to caue a tree change. An increae in link delay on a direct link between ender and receiver may caue the receiver to be connected through an indirect link correponding to a priority decreae). An increae in the delay of an indirect link may caue a node to be connected directly correponding to a priority increae). Similar conideration hold for a delay decreae on direct or indirect link. When computing a directed, it i poible to record for each tep of the algorithm by how much the cot of a link ha to increae before it i excluded from the ditribution tree, or by how much the cot of a link ha to decreae before it will be included in the tree. With thee conideration, rebuilding the tree can be limited to the cae where the tree tructure will change. If change to the tree tructure are neceary, it i deirable to keep the number of update mall. When a number of link delay or prioritie change imultaneouly, recomputing the whole tree i reaonable. For minor change, adjuting the exiting tree can be much le cotly. Note that ome of the improvement in the update mechanim are only poible becaue the overlay graph i fully connected and becaue the relative weight increae on the lat hop of an indirect path i baed on the weight of the link from the ender to the tart of the lat hop link and not on the complete path to the receiver. Let u aume that the cot of a ingle link increae ufficiently to caue a change in the ditribution tree. We have to ditinguih two cae: increae for p, : increae for ender. In the firt cae, Š i updated and > i connected to the ret of the tree via a le expenive link. However, the link cot for all node in the tree below > a well a the tree tructure remain unchanged. Becaue of the aymmetric link, it may be poible that it i now le expenive to connect via E, and o on. Hence, we have to revere the direction of link on the path from to a long a the cot Š in the direction toward the ender are le expenive than the link cot in the oppoite direction. In the econd cae when the cot of a link : from the ender increae, the change will alo increae the cot of Š v T. For all with!, it i neceary to check whether the node can be connected to the ret of the tree via a le cotly link i.e., the ret of the tree may grow into the region with the increaed link cot). The tree part below the will not be affected. Thu, in both cae only very limited part of the tree will change. The ame calculation can be applied when link cot decreae. Moreover, priority change affect the cot of all incoming link of a node but ince only one of thee link can be in the current ditribution tree, the above tatement are even valid for priority change. Latly, even though a ditribution tree may no longer be optimal given the current edge weight, it may be ufficient for data ditribution a long a the change are mall i.e., ue a fuzzy update trategy where update are triggered by ignificant weight change only).. Efficient Topology Ditribution For the forwarding proce, a pecific tree topology need to be known by all node of the tree. Either, node may ditribute their priority table o that all other node can locally recalculate all ditribution tree, or node may ditribute the tree they already calculated. The econd alternative eem much better uited for the tak ince the communication overhead i imilar but much le calculation at the receiver are required. Furthermore, for the econd alternative inconitent delay information at the receiver will not reult in routing loop. In fact, node do not require the complete ditribution tree, but only need to know which node or node to forward the packet to. Thi information i updated by a ender whenever it ditribution tree change. It i either poible to include the information in the data packet header, or to end extra tree maintenance packet. The econd alternative i preferable if a ignificant number of packet are ent along the ame ditribution tree. If delay between node remain relatively contant and only ome application priority pattern are valid, the number of different ditribution tree i fairly limited. In thi cae it may be more efficient to precompute all poible tree or a limited ubet of uitable tree), ditribute thi information to all the other node, and then only include an identifier for a pecific ditribution tree in the header of a data packet.. SIMULATIONS We implemented a imple network imulator in order to evaluate the performance of our algorithm compared to the delay-baed and approache. The imulator i event-baed and allow
6 ƒ Table : Router Link End- Avg. # Avg. # of Sytem of Tree Edge Change ratio priority cla packet-level data ditribution on arbitrary network topologie. A network topology i characterized by a et of node connected via edge with a certain delay. We do not conider other factor uch a bandwidth, router load, and packet lo. All network topologie were generated with the Georgia Tech Internetwork Topology Model GT-ITM) [] toolkit. The topologie ue the tranit-tub method without extra tranit-tub or tub-tub edge. Edge between node are placed uing the random model. End-ytem were located on the network edge. Firt, we evaluate the propertie of for different network topologie when all receiver are aigned the ame applicationlevel priority. Following, we give imulation reult for realitic prioritie baed on a multi-player game.. Simulation for with a ingle priority In thi ection, we analyze how many ditinct ditribution tree are built by the algorithm and to what extent thee tree differ. We define the application-level priority H to be equal for all receiver according to Equation )) and calculate the et of tree! i.e., vghf I K@ MON ) for different network topologie. The reult are lited in Table. The firt three column decribe the topology ued in term of the number of router, the number of phyical link, and the number of end-ytem participating in the ALM eion. The average number of different ditribution tree i given in column four. A can be derived from the table, thi figure i correlated with the number of end-ytem. Next, we are intereted in the topological difference between two ucceive ditribution tree! and!, where! i the tree H with at leat one changed with the mallet priority H edge compared to!. The average number of edge change from one tree to the next i relatively mall ee column five). Thu, the optimization of tree maintenance a decribed in Section i able to achieve a ignificant reduction in tree calculation cot.. Simulation for a ample application In the following, we compare the characteritic of our algorithm to the delay-baed and approache on bai of a realitic application cenario... Simulation Setup Event pattern to determine application prioritie for the imulation were generated by tracing a imple multi-player game []. In thi game, each player control a pacehip which can accelerate, decelerate, turn, and hoot at one another with a laer beam of a certain range. The rectangular game field allow player who approach one edge of the field to reappear at the oppoite ide. Each pacehip ha a predefined amount of hit point: each time it i hit by a laer beam, one of the hit point i ubtracted. If no hit Figure : Ditribution of application prioritie point remain, the pacehip i removed from the game. Uer action together with timetamp and information about the current game tate were recorded for game with ix and eighteen player. In our network imulation, each recorded uer action led to one packet exchanged among end-ytem. The application prioritie Hu iki KL MON ued for the tree building algorithm are baed on the relative poition between the pacehip and their orientation. If the pacehip of a player i within hooting range of another player hip, the end-ytemg of et Hu JM. We define that i within hooting range of if the ditance between and i le than the maximum range of the laer beam and i oriented in uch a way that it can hit after conducting at mot one turn operation. For player outide the hooting range of, H i calculated depending on their ditance = to the ender: Hu rm'q, where i the maximum poible ditance. A typical ditribution of prioritie for a game eion with ix player i depicted in Figure. Prioritie cloe to M are common becaue the objective of the game i to core point by hooting other player and hence player will cluter together intead of preading out evenly on the game field... Simulation Reult for End-Sytem To evaluate the characteritic of our priority-baed tree-building algorithm ), we compare it to the and the, repectively. For the imulation, we ue two network topologie of different ize. The firt imulation cenario i baed on a game eion with ix player. The eion lated for econd and during that time pan a total of event were iued. The priority ditribution that reulted from the pacehip poition i depicted in Figure. Figure how the underlying network topology with end-to-end delay between and m and an average value of m. The delay propertie of a pecific ditribution tree can be meaured uing the cot & ee Section ). Figure a) depict the ditribution of & for the, the, and the, repectively. By definition, t the routing algorithm reult in the bet ditribution of, with 9% of all tree having a of le than & 7 & m. However, the difference between and i comparatively mall m at 9%), meaning that the end-to-end delay in the ditribution tree contructed with the algorithm are on average only marginally higher than the delay on the direct path. In comparion, ditribution tree created with the algorithm reult in a ignificantly higher difference for & 7 m at 9%).
7 & priority-baed 7 8 cumulative weighted end-to-end delay [m] a) Ditribution of relative delay penalty..... [.;.) [.;.) [.;.9) [.9;.] priority clae b) Average RDP reource uage [m] c) Ditribution of.. link tre d) Link tre ditribution Figure : Simulation reult for End-Sytem The receiver-pecific end-to-end delay, defined a +F-D, reulted in the following 99% confidence interval for thi imulation cenario: I j I M>KmL j@ M>KZL N. The relative delay penalty of the end-to-end delay: ^M>KLM [N, I MM <e UM M^[@M mn, and ) i a meaure for the optimality +EGF-D -B The compare the end-to-end delay of a receiver to the mallet poible delay i.e., the unicat delay fromg to ). By definition, for the ditribution tree <l#mzv Œ. Figure b) how the average value for different priority clae. In the cae of the algorithm, the decreae continuouly with increaing application-level prioritie from. for receiver with Hu XI KL KL K@/M to. for with Hu z I K@ j@ ^M KN. For application intance with a high priority, a delay cloe to the unicat latency can be achieved. The maximum range of the average i relatively mall.) ince only ix endytem participate in thi imulation cenario and the ditribution tree have path with at mot four hop. The load on the network caued by a certain ditribution tree can be meaured uing the reource uage metric $ a defined in Section. '$ take into account that more than one identical copy of a packet may be ent over the ame phyical link. The ditribution of $ i depicted in Figure c). The algorithm alway elect the ame et of edge for it tree, independently of the ource node. Thu, the '$ ha a contant value of 8 m which i at the ame time the lower bound for the reource uage of the other algorithm. 7% of all ditribution tree built by the algorithm have a $ between 8 m and 7 m which i cloe to the optimum and far better than the value obtained by. Hence, the optimization of end-to-end delay for certain application intance by the caue only a light increae in reource uage when compared to the. Link tre i another indicator for the network overhead caued by an ALM tree. reult in the lowet link tre with 77% of all ditribution tree having a link tre of and a maximum link tre of, a hown in Figure d). Ditribution tree contructed by the algorithm come cloe to thee value with the only difference being that.7% of the tree have a link tre of. The link tre for the tar-haped topologie lie between and and only % of the tree have a link tre of... Simulation Reult for 8 End-Sytem For the econd imulation cenario, we created a more complex network topology with router, 8 link, and 8 end-ytem participating in a virtual game eion. The delay among end-
8 & cumulative weighted end-to-end delay [] a) Ditribution of relative delay penalty.8... [.;.) [.;.) [.;.9) [.9;.] priority clae b) Average RDP reource uage [m] c) Ditribution of link tre d) Link tre ditribution Figure : Simulation reult for 8 End-Sytem ytem lie between m and 8 m with an average value of. m. During the eion duration of econd, a total of event were iued by all player. The reulting application prioritie are imilar to the ditribution hown in Figure. The ditribution for the cumulative weighted end-to-end delay & are depicted in Figure a). Becaue of the increaed complexity of the ALM tree with up to hop on path of the ), the difference in & between and i larger 7 m to 9 m at 9%). However, the doe achieve a good optimization of the latency from the ource node to receiver with a high priority when compared to the value of & for the algorithm 9 m at 9%). The receiver-pecific end-to-end delay reulted in the following 99% confidence interval: I M L M GjL [N, I [ M d O[ m@ N, and I M d [@ M Z@ d^n. The optimization of end-to-end delay become alo viible in the average value for application intance within different priority clae ee Figure b)). For the algorithm, the decreae from. to. for receiver with Hu WkI K@ j@ M KN which i cloe to the optimum value. Thi i a ignificant improvement over multicat tree contructed uing the, even for the receiver within the lowet priority cla. At the ame time, priority-baed minimum panning tree caue a higher network load a can be een from Figure c). It how the reource uage ditribution for the three tree building algorithm: 9% of all have a reource uage that i up to % higher than $ of the. Shortet path tree have a reource uage that i by far larger. A in the firt imulation cenario, the algorithm generate the lowet link tre with 9% of all ditribution tree having a link tre of at mot and a maximum tre of ee Figure d)). The value for the algorithm are only lightly larger with 9% of all multicat tree having a link tre of at mot and a maximum link tre of. In comparion, the link tre of the tree ha a value of 9 at 9% and maximum link tre i 7... Introducing Uncertainty All imulation reult dicued above were calculated under the condition that the application alway had full knowledge about the actual end-to-end delay. In a real network, delay fluctuate depending on router load) and meaurement give approximation only. Thu, we alo conducted imulation for the algorithm when meaured delay differ t from the real value up to a certain &, degrade only by 8 m at 9% percentage. For P[K when compared to the value given in Figure a), and by 7 m for dk. In the highet priority cla, increae only lightly to. for [K, and to. for dk. The reource uage ditribution for [K i almot identical to the
9 one depicted in Figure c). For dk, 9% of all tree have a '$ between m and 88 m. Thee reult indicate that the algorithm i fairly robut againt inaccurate knowledge of delay. Summing up, the imulation reult how that the algorithm optimize the end-to-end delay for receiver for which the ender ha a high application priority. Even delay for end-ytem with a lower priority are in mot cae better than thoe that can be achieved with multicat tree built by the algorithm. At the ame time, the increae in network load i kept at a tolerable level.. CONCLUSIONS AND OUTLOOK We have preented a novel priority-baed routing algorithm for application-level multicat. It allow an application to influence the path that a packet take from the ender to a receiver by pecifying a priority for each packet-receiver pair. A the priority i increaed from K to M, the path change gradually from to. Thu, our can be conidered a a generalization of the and the. We have decribed an efficient algorithm for the contruction of the ditribution tree and dicued how tree maintenance operation can be minimized. Our imulation reult indicate that the algorithm build multicat tree with end-to-end delay that are cloe to the optimum for receiver with a high priority while the total network load increae only lightly. In the future, we plan to invetigate how to bet elect prioritie on the bai of application-layer emantic for performance-critical multicat application. Another important iue i to further reduce the computational complexity and to improve calability. One olution might be to cluter adjacent in repect to latencie and prioritie) end-ytem and to contruct local. Alo, we want to take capacity contraint on the link into account, and we intend to perform imulation for more complex topologie. Our final goal i to integrate the algorithm into a real-world multicat application, uch a an Internet game, and to perform meaurement over the Internet. 7. REFERENCES [] K. Calvert, M. Doar, and E. Zegura. Modeling Internet Topology. IEEE Communication Magazine, ):, 997. [] Y. Chawathe. Scattercat: An Architecture for Internet Broadcat Ditribution a an Infratructure Service. PhD thei, Univerity of California, Berkeley, USA, Dec.. [] Y. Chu and T. Liu. On the Shortet Arborecence of a Directed Graph. Science Sinica, :9, 9. [] Y. Chu, S. Rao, S. Sehan, and H. Zhang. Enabling Conferencing Application on the Internet uing an Overlay Multicat Architecture. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] Y. Chu, S. Rao, and H. Zhang. A Cae For End-Sytem Multicat. In Proc. ACM SIGMETRICS, Santa Clara, CA, USA, June. [] J. Edmond. Optimum Branching. J. Reearch of the National Bureau of Standard, 7B:, 97. [7] P. Franci. Yoid: Extending the Internet Multicat Architecture. unrefereed report, available at Apr.. [8] D. Helder and S. Jamin. End-hot Multicat Communication Uing Switch-tree Protocol. In Proc. GPPC, Berlin, Germany, May. [9] J. Jannotti, D. Gifford, K. Johnon, M. Kaahoek, and J. J.W. O Toole. Overcat: Reliable Multicating with an Overlay Network. In th Sympoium on Operating Sytem Deign and Implementation OSDI), San Diego, CA, USA, Oct.. [] M. Mauve, J. Vogel, V. Hilt, and W. Effelberg. Local-lag and Timewarp: Providing Conitency for Replicated Continuou Application. To appear in: IEEE Tranaction on Multimedia. [] S. Ratnaamy, P. Franci, M. Handley, R. Karp, and S. Shenker. A Scalable and Content-Adreable Network. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] I. Stoica, R. Morri, D. Karger, M. Kahoek, and H. Balakrihnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Application. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] W. Wang, D. Helder, S. Jamin, and L. Zhang. Overlay Optimization for End-hot Multicat. In Proc. NGC, Boton, MA, USA, Oct.. [] B. Zhang, S. Jamin, and L. Zhang. Hot Multicat: A Framework for Delivering Multicat to End Uer. In Proc. IEEE INFOCOM, New York, NJ, USA, June. [] S. Zhuang, B. Zhao, A. Joeph, R. Katz, and J. Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Diemination. In th International Workhop on Network and Operating Sytem Support for Digital Audio and Video NOSSDAV), Port Jefferon, NY, USA, June. APPENDIX A. PSEUDO CODE Figure 7 give the peudo code to compute the on a graph z < for a ender with priority function H. Firt, the weight Š of the directed graph are calculated a decribed in Section. Second, the directed minimum panning tree i determined according to the algorithm publihed by Edmond []. Thi algorithm i deigned to contruct a branching! with maximum total cot +-,/. on bai of. Thu, to build a minimum panning tree, we define all weight Š to be negative and enure that the branching contain QnM edge maximizing with negative weight i equal to minimizing with poitive weight). The baic idea of Edmond algorithm i to calculate an initial graph! by electing for each node except ) the incoming edge with maximum cot. While! contain any cycle, thee are broken up by exchanging appropriate edge. A branching i a directed graph without cycle where each node ha at mot one incoming edge, i.e., a branching i not necearily connected.
10 ) Compute weight Š for all edge in E: v = =< n o Š e Qy: VpHu/B ) Compute the directed minimum panning tree with ourceg on : Dicard all edge 7 entering the ource node. v node n = : elect the edge Y with maximum weight Š edge. While! o P E Š contain a cycle o r y= "Œ e= P" Š do -. Let Š be the et of elected Find the edge with minimum weight Š. Modify the weight Š of each edge T = : Š Ro 9 Š gvk Š 'Q Š, with b/r being the predeceor node with edge. ^ Select the edge J = with maximum weight Š, and et Š o ^ Š '. Build a new graph! by contracting all node into a peudo-node : *o. Modify and Š by replacing all edge with tail node or head node by or ^, and delete edge =. Create new weight Š accordingly. Replace all peudo-node p and the correponding edge in Š by the original node and edge.! repreent the directed with root. Figure 7: Peudo code for the computation of the optimum ditribution tree
Priority-Based Distribution Trees for Application-Level Multicast
Priority-Based Distribution Trees for Application-Level Multicast Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelsberg Praktische Informatik IV, University of Mannheim, Germany vogel,
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationOn Peer-to-Peer Media Streaming Λ
On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationEmbedding Service Function Tree with Minimum Cost for NFV Enabled Multicast
1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationSECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS
SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department
More informationSoftware Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks
Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationStream: Low Overhead Wireless Reprogramming for Sensor Networks
Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationThrough the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview
I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationPolicy-based Injection of Private Traffic into a Public SDN Testbed
Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationSemi-Distributed Load Balancing for Massively Parallel Multicomputer Systems
Syracue Univerity SUFAC lectrical ngineering and Computer Science echnical eport College of ngineering and Computer Science 8-1991 Semi-Ditributed Load Balancing for aively Parallel ulticomputer Sytem
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationAalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces
Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding
More informationA Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology
A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationChapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service
Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationEfficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics
Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity
More informationCHAPTER 4: INTERPROCESS COMMUNICATION AND COORDINATION
CHAPTER : INTERPROCESS COMMUNICATION AND COORDINATION Chapter outline Dicu three level of communication: baic meage paing, requet/reply and tranaction communication baed on meage paing Dicu name ervice
More informationDistributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks
Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization
More informationDomain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures
Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationDesign of a Stewart Platform for General Machining Using Magnetic Bearings
eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented
More informationAnalytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation
Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationETSI TS V ( )
TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationImplementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost
Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult
More informationDynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array
Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science
More informationMeasuring Link Bandwidths Using a Deterministic Model of Packet Delay
Meauring Lin Bandwidth Uing a Determinitic Model of Pacet Delay Kevin Lai Stanford Univerity lai@c.tanford.edu Mary Baer Stanford Univerity mgbaer@c.tanford.edu ABSTRACT We decribe a determinitic model
More informationIntegration of Digital Test Tools to the Internet-Based Environment MOSCITO
Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according
More informationA Unicast-based Approach for Streaming Multicast
A Unicat-baed Approach for Streaming Multicat Reuven Cohen and Gideon Kaempfer Department of Computer Science Technion, Haifa 32000, Irael Abtract Network layer multicat i know a the mot efficient way
More informationPerformance Evaluation of search engines via user efforts measures
IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1
More informationAn efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed
Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network
More informationOptimal Gossip with Direct Addressing
Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More information