Priority-Based Distribution Trees for Application-Level Multicast

Size: px
Start display at page:

Download "Priority-Based Distribution Trees for Application-Level Multicast"

Transcription

1 Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer, farin, mauve, ABSTRACT In thi paper, we propoe a novel multicat routing algorithm that i baed on application-level prioritie and network characteritic: The application may pecify an individual priority for each packetreceiver pair. The multicat ditribution tree i then contructed uch that the higher the priority, the more direct the path from the ender to the packet detination and the lower the reulting endto-end delay. Thi algorithm can be ued to realize applicationlevel multicat for delay-enitive application uch a networked computer game. However, optimizing the multicat tree with repect to the end-to-end delay come at the cot of an increae in link tre the more direct a path, the le likely it i that it can be integrated efficiently into an overlay ditribution tree. Our algorithm take thi tradeoff into account and contruct efficient prioritybaed multicat tree. We demontrate the performance and characteritic of the algorithm through imulation. Keyword Application-Level Multicat, Multicat Routing, Ditribution Tree.. INTRODUCTION Group communication, or multicat, i needed by ditributed interactive application to deliver data from one ender to multiple receiver. Example are video conference, groupware ytem, and networked computer game. In many cae, realizing group communication by etting up a direct connection from a ender to each receiver i not a viable olution becaue of reource limitation. In the Internet, IP multicat provide efficient group communication by duplicating packet within the network router o that data travere phyical link only once. But due to variou technical and adminitrational reaon, IP multicat ha not been widely deployed. A promiing alternative i application-level multicat ALM) [-8]: The key idea i to ue the end-ytem a node in a multicat ditribution tree. The contruction and maintenance of the tree i done at the application level without any upport from the network. Router within the network do not have to keep tate information about group memberhip. Furthermore, ALM can be deployed immediately without any change to the network. Thi eliminate two key problem of IP multicat. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. NetGame May -,, Redwood City, CA, USA Copyright ACM -8-7-//...$.. Exiting approache for ALM focu on network characteritic e.g., latency) to contruct the multicat ditribution tree. A long a thoe characteritic remain contant and no change in the et of eion member occur, all packet from a ender will take the ame path toward the detination. Thi approach i well uited when all packet hould be delivered to all receiver with the ame priority e.g., in a multi-detination file tranfer). However, a number of application exit where the priority of a packet may be different for the receiver. In a networked computer game, for example, the action of a player i very important to competing player that are cloe by. Thee player hould receive information about uch action with a very low delay. Other player may be able to tolerate a higher delay, depending on their location and orientation within the game. Furthermore, a packet priority may change over time for ome or all receiver. For example, if enor data i tranmitted by a ender, thi data may typically have a low priority for all receiver, unle an extreme enor reading occur which require the tranmiion of a packet with very low latency to ome receiver. Traditional tree routing algorithm are unable to handle thee ituation. In thi paper, we propoe to ue a combination of applicationlevel prioritie and network characteritic in order to build and maintain a multicat ditribution tree. Since multicat routing i handled at the application level, integrating application knowledge into the routing deciion come natural and introduce little overhead. The general idea of our approach i to allow the ending application to aign a priority to each pair of packet and receiver. The higher the priority, the more direct will be the path that the packet take toward it detination. The cot for reduced latency i a poible increae in link tre i.e., the number of copie of a packet that travere the ame link). Thu, the key challenge i to find an appropriate algorithm for the contruction of a multicat ditribution tree which take thi tradeoff into account. The remainder of thi paper i tructured a follow: in Section we briefly outline exiting approache for application-level multicat. The algorithm for the contruction of multicat ditribution tree which take application-level emantic into account i decribed in Section. In Section we dicu practical iue uch a the maintenance of a ditribution tree that may change on a perpacket bai and how to efficiently ditribute topology information to other node. Section contain an evaluation of the preented algorithm by mean of imulation. We conclude the paper and give an outlook on future work in Section.. RELATED WORK Typically, application-level multicat algorithm contruct their ditribution topologie baed on path characteritic uch a endto-end) latency, available bandwidth and packet lo rate. Their

2 aim i to build ditribution tree that minimize the additional routing overhead compared to native IP multicat. Yoid [7] create a ingle multicat tree for all end-ytem that participate in a eion, independently of a pecific ender. Each node elect another node a parent, preferably a node with a low network delay to. Receiver gather a lit of poible parent on bai of periodic control meage and explicit querie. An initial lit can be obtained from a o-called rendezvou hot during the boottrap phae. Aide from the network delay, the maximum number of children that can be attached to a potential parent i.e., the fan-out) i conidered in the choice of a parent node. Becaue the lit of poible parent i uually incomplete and the fan-out i contrained, the reulting ditribution tree may be uboptimal. A a conequence, node periodically ping other eion member in order to find a better parent and optimize the tree tructure. An alternative method to elect a parent node in Yoid i provided for the tranfer of large data file: node connect to the parent that cache the larget amount of data. Other example for tree building ALM protocol are HMTP [], BTP [8], and Overcat [9]. They all form elf-organizing ditribution tree where node elect an appropriate parent, and they implement mechanim for integrating new member, detecting loop and partition, and for optimizing the tree by rearrangement. Unlike the other protocol, Overcat build ender-pecific tree intead of a ingle hared tree. With TMeh [], the author propoe to add additional link to the multicat tree. While thee hortcut reduce the number of hop on the way from a ender to the receiver, TMeh eek to optimize the average end-to-end delay for the whole group and build a rather table ALM tree. Thu, TMeh eem not to be flexible and fat enough to facilitate delay optimization for certain receiver in an environment where prioritie change dynamically. Intead of contructing a tree directly, Narada [] employ a twotep proce. Firt, a meh i built among the participating endytem. For the actual data tranport, Narada run a ditance vector protocol with latency and bandwidth [] a the routing metric on top of the meh. The reulting tree i a ender-pecific hortet path tree ) baed on the underlying meh. The crucial factor in thi approach i the quality of the meh that mut balance the number and the characteritic of the ued unicat link. If there are too many link in the meh, the reulting ditribution topology will reemble a tar of unicat connection from the ender to all receiver. A in Yoid, joining end-ytem obtain a lit of current eion member by a boottrap mechanim and connect to one or more lited node. Then, member periodically add link that improve the routing performance and remove link that are rarely utilized by a ditribution tree. Like Narada, Goamer [] alo employ the tree-over-meh approach where the meh i contructed in order to minimize latencie of the ditribution tree. The number of connection that a node can maintain at a certain point in time i explicitly retricted with Goamer in order to take bandwidth limitation into account. Approache where application-level emantic are ued for routing can be found in the area of content delivery network. The common idea of Bayeux [], Chord [], and Content Addreable Network [] i to realize a calable lookup ervice for object e.g., end-ytem) where the reponibility for managing the object pace i hared equally among a network of peer node. The multi-hop lookup path for a target object e.g., the receiver of a meage) i determined on bai of certain propertie of the hahgenerated) detination addre. For example, in Bayeux the current node ue the i-th digit of an object addre to reolve the next hop toward the detination. In contrat to the previouly dicued ap- A 7 B C Figure : Joint path to ditant receiver plication level multicat protocol, thee content delivery network bae their routing deciion almot) excluively on application emantic. Conequently, the reulting ditribution tree may be very inefficient with repect to end-to-end delay and link tre.. APPLICATION-LEVEL MULTICAST ROUTING An ALM routing algorithm build a data ditribution tree with the end-ytem a node connected by unicat link. The reulting tree hould ue the reource of the underlying network efficiently. Since on the application level there i no direct acce to network topology information, obervable parameter e.g., latency) may be ued to deduce a certain amount of knowledge about the actual topology: When node ha a high delay to both node and, and ha a low delay to, then it i likely that the route hare a ignificant portion of the phyical link with route ee Figure ). In the following, we will concentrate on unicat latencie a the network parameter that determine the ALM tree. Two well-known type of tree are the minimum panning tree ) and the hortet path tree ). The optimize the reource uage of the multicat tree but the path length i not conidered and can caue very large end-to-end delay. Hence, uing an i only reaonable when end-to-end delay are not an iue e.g., for non-interactive data diemination). When building an from the unicat delay, the ditribution tree will conit of eparate unicat connection from the ender to each receiver commonly, thi would be regarded a normal unicat rather than application-level multicat). With repect to end-to-end delay the i optimal but it caue a very high conumption of network reource. Furthermore, building a i not poible when the ender bandwidth i not ufficient to erve all receiver imultaneouly. Our aim i to contruct application-aware ditribution tree that balance the characteritic of and : For each packetreceiver pair the application may provide a priority. Depending on thi priority, the path along which the packet i forwarded hould gradually change from the path to the path. In order to find an algorithm with thi property, we firt invetigate well-known metric for the aement of ditribution tree. The optimization of reource uage lead to an, while the optimization of the cumulative end-to-end delay lead to an. We combine thoe two metric by uing one common application priority for the whole ditribution tree. The optimization of the combined metric allow the gradual tranition from path to path a the application priority increae. In a econd tep, we generalize the met- We will ignore that unicat routing protocol may give uboptimal route and aume that the underlying unicat routing algorithm caue direct path to a node to be horter than any indirect path over intermediate node.

3 8 ) ric uch that one priority may be given for each detination. It optimization lead to a tree where each path from the ender to a detination change from the path to the path. Finally, we preent an efficient algorithm which provide a very good approximation for the optimal ditribution tree with repect to the lat metric.. Ditribution Tree Metric Let be a fully connected, directed graph, where denote the et of node and the et of edge, where connect the node and. We define the node a ource and the remaining node a receiver. Edge weight are aigned according to the delay of the correponding link. For %$ each ditribution '& tree!#", we can define two cot function and : Reource uage, defined a the product of link tre and link delay, ummed over all phyical link of the underlying network. Thi um i equivalent to the um of all edge delay in the overlay ditribution tree : $ *) +-,/. Cumulative end-to-end delay, meauring the total delay for the ditribution of a packet from the ource to all receiver. Let 798 :<;=>>>= -?@BA denote the route from the ource '& to the receiver on the current ditribution tree. Then i given by: '& ) C<DE $ ) +EGF-D When optimizing $ '&, the minimum cot tree i equal to the, when optimizing, it i equal to the.. Introducing Application-Level Semantic For many application, electing either of thee two metric a the optimization criterion doe not give the deired reult. While minimizing the total reource uage i deirable, overly large endto-end delay reduce the utility of the application. Hence, ome tradeoff between reource uage and end-to-end delay i required. Let HJI KL MON be the application priority with which it want to deliver data, where M mean that the end-to-end delay for the receiver hould be a low a poible, while K denote no pecial delay requirement. A balancing cot function can be defined a follow: ) P-M'QRHST) +-,U. WVXHY) C<D< $ ) +F D Figure viualize the effect of H when building the optimum ditribution tree according to ) for a ample ALM eion. The participant of the eion are numbered from M to Z, while intermediate router of the underlying network appear a unmarked node. The correponding table contain the pairwie end-to-end delay. Let node [ be the ender. The reulting ditribution tree that are optimal with repect to are depicted in Figure. When H i increaed, node farther away move up in the tree, reducing the end-to-end delay to the ender, ^]`_ until for H\#M K a tar-like _ba Given the ditribution tree = in Figure, the reource uage in the underlying network i MbcedeVf[gcgM`V\Mhch[ikj, which i equal to the um of edge weight in the overlay tree ZlVnm. The link tre i implicitly contained in the end-to-end delay. i reached. A can be een from the graph, the number of poible tree for a mall overlay network with only node i very limited. Following, we generalize the cot function for the cae of individual per-receiver prioritie, where information may be of high importance to ome receiver and hould therefore be delivered on a direct path) and of lower importance to other receiver. Let Hpo@ rqi K@ MON be the per-node prioritie for a ender. They can eaily be integrated into & t &, defining the cot function : & ) C<D< $ Hu e) +EGF D %$ Integrating the per-node prioritie into i more difficult ince the cot are calculated over the edge of the tree and not per receiver. However, in an, the relevant cot for a receiver i the weight of the edge over which it i connected to the ret of the tree. Conequently, the priority of a node can be aigned to thi edge. Thi lead to the following cot function $ : The total cot t $ *) -M'QRHu B +-,/. are defined a $ V & ) Note that pecialize to & if vwhulyxm, and to $ if vyhulz{k. Thi mean that the node prioritie determine the tructure of the minimum cot tree with the extreme and. Direct optimization of thi cot function i computationally complex. Thu, we approximate the cot term in a way that allow u to directly modify edge weight and compute an baed on thee modified weight. In order to calculate the modified weight, the cot function need to be baed olely on the weight of the edge of the tree, and not on complete path to individual receiver. The general idea i to plit the complete path to a receiver into the lat edge of the path and the path of all previou edge :<;= <;}-~=>>>>= -?@ A. We can approximate the cot of the path from to with the cot of the direct edge -, where - i a lower bound for the actual path cot. Thi lead to a implified approximate formulation for the global cot : *) -M'QRHu B +-,U. ) -M'QRHu >B +-,U. WV ) C<DE $ Hu e) +GF D V C<DE $uƒ HuB - `V\ C, G e +, D G ) VpHb B - +-,U. The lat equality follow from the property that a panning tree of a graph ha the ame number of edge a there are target node in the graph. Conequently, both um are calculated over the ame et of edge. In order to minimize, we can apply an algorithm on the graph with modified weight. The new weight are et to 7Š Œ `VpHuOB /--ˆ - ) With increaing HuO, indirect link to the target node > will become more expenive and eventually uch link will be removed from the ditribution tree. Note that a directed algorithm ha to be applied to obtain correct reult a it i not a priori known in which direction data i ditributed over the edge and the cot for

4 End-to-end delay 7 Figure : Example graph a) H I K@ KKyQ KL K@M^ b) H I KL K@MLQiKL [K c) H I K@ [KWQ K@ ZG[ d) H I KL Z[WQ KL j 8 e) H fi K@ j Q M KKG Figure : Optimal ditribution tree

5 oppoing direction may differ. We call the combination of modified edge weight and directed computation priority-baed directed minimum panning tree ) algorithm. Algorithm to contruct in directed graph have been decribed in [, ]. Peudo code for the implementation that wa ued for the imulation can be found in Appendix A.. DESIGN CONSIDERATIONS The preented algorithm improve the application influence on the data ditribution proce through the incluion of application emantic in the contruction of the ditribution tree. However, it i very cotly to recalculate the ditribution tree for each packet. Moreover, node in a pecific ditribution tree need to know which other node or node to forward a packet to and thu require ome information about the tree topology whenever the topology change. Thi information ha to be ditributed to the node in an efficient way. In thi ection, we will dicu how the algorithm can be integrated into application while avoiding exceive calculation in the end-ytem and meage overhead through the ditribution of topology information.. Maintenance of the Ditribution Tree Intead of rebuilding the ditribution tree whenever topology information or application prioritie change, an improved update mechanim can ignificantly reduce the number of neceary tree recomputation. The tree will not change under the following condition: the cot delay) of a link that i not in the directed increae, the cot of a link within the directed decreae, the priority for a receiver which i connected directly to the ender increae, and the priority for a receiver which i connected indirectly via another receiver decreae. In thee cae, it i only neceary to update the link weight. Furthermore, a change in receiver prioritie or link delay may be too mall to caue a tree change. An increae in link delay on a direct link between ender and receiver may caue the receiver to be connected through an indirect link correponding to a priority decreae). An increae in the delay of an indirect link may caue a node to be connected directly correponding to a priority increae). Similar conideration hold for a delay decreae on direct or indirect link. When computing a directed, it i poible to record for each tep of the algorithm by how much the cot of a link ha to increae before it i excluded from the ditribution tree, or by how much the cot of a link ha to decreae before it will be included in the tree. With thee conideration, rebuilding the tree can be limited to the cae where the tree tructure will change. If change to the tree tructure are neceary, it i deirable to keep the number of update mall. When a number of link delay or prioritie change imultaneouly, recomputing the whole tree i reaonable. For minor change, adjuting the exiting tree can be much le cotly. Note that ome of the improvement in the update mechanim are only poible becaue the overlay graph i fully connected and becaue the relative weight increae on the lat hop of an indirect path i baed on the weight of the link from the ender to the tart of the lat hop link and not on the complete path to the receiver. Let u aume that the cot of a ingle link increae ufficiently to caue a change in the ditribution tree. We have to ditinguih two cae: increae for p, : increae for ender. In the firt cae, Š i updated and > i connected to the ret of the tree via a le expenive link. However, the link cot for all node in the tree below > a well a the tree tructure remain unchanged. Becaue of the aymmetric link, it may be poible that it i now le expenive to connect via E, and o on. Hence, we have to revere the direction of link on the path from to a long a the cot Š in the direction toward the ender are le expenive than the link cot in the oppoite direction. In the econd cae when the cot of a link : from the ender increae, the change will alo increae the cot of Š v T. For all with!, it i neceary to check whether the node can be connected to the ret of the tree via a le cotly link i.e., the ret of the tree may grow into the region with the increaed link cot). The tree part below the will not be affected. Thu, in both cae only very limited part of the tree will change. The ame calculation can be applied when link cot decreae. Moreover, priority change affect the cot of all incoming link of a node but ince only one of thee link can be in the current ditribution tree, the above tatement are even valid for priority change. Latly, even though a ditribution tree may no longer be optimal given the current edge weight, it may be ufficient for data ditribution a long a the change are mall i.e., ue a fuzzy update trategy where update are triggered by ignificant weight change only).. Efficient Topology Ditribution For the forwarding proce, a pecific tree topology need to be known by all node of the tree. Either, node may ditribute their priority table o that all other node can locally recalculate all ditribution tree, or node may ditribute the tree they already calculated. The econd alternative eem much better uited for the tak ince the communication overhead i imilar but much le calculation at the receiver are required. Furthermore, for the econd alternative inconitent delay information at the receiver will not reult in routing loop. In fact, node do not require the complete ditribution tree, but only need to know which node or node to forward the packet to. Thi information i updated by a ender whenever it ditribution tree change. It i either poible to include the information in the data packet header, or to end extra tree maintenance packet. The econd alternative i preferable if a ignificant number of packet are ent along the ame ditribution tree. If delay between node remain relatively contant and only ome application priority pattern are valid, the number of different ditribution tree i fairly limited. In thi cae it may be more efficient to precompute all poible tree or a limited ubet of uitable tree), ditribute thi information to all the other node, and then only include an identifier for a pecific ditribution tree in the header of a data packet.. SIMULATIONS We implemented a imple network imulator in order to evaluate the performance of our algorithm compared to the delay-baed and approache. The imulator i event-baed and allow

6 ƒ Table : Router Link End- Avg. # Avg. # of Sytem of Tree Edge Change ratio priority cla packet-level data ditribution on arbitrary network topologie. A network topology i characterized by a et of node connected via edge with a certain delay. We do not conider other factor uch a bandwidth, router load, and packet lo. All network topologie were generated with the Georgia Tech Internetwork Topology Model GT-ITM) [] toolkit. The topologie ue the tranit-tub method without extra tranit-tub or tub-tub edge. Edge between node are placed uing the random model. End-ytem were located on the network edge. Firt, we evaluate the propertie of for different network topologie when all receiver are aigned the ame applicationlevel priority. Following, we give imulation reult for realitic prioritie baed on a multi-player game.. Simulation for with a ingle priority In thi ection, we analyze how many ditinct ditribution tree are built by the algorithm and to what extent thee tree differ. We define the application-level priority H to be equal for all receiver according to Equation )) and calculate the et of tree! i.e., vghf I K@ MON ) for different network topologie. The reult are lited in Table. The firt three column decribe the topology ued in term of the number of router, the number of phyical link, and the number of end-ytem participating in the ALM eion. The average number of different ditribution tree i given in column four. A can be derived from the table, thi figure i correlated with the number of end-ytem. Next, we are intereted in the topological difference between two ucceive ditribution tree! and!, where! i the tree H with at leat one changed with the mallet priority H edge compared to!. The average number of edge change from one tree to the next i relatively mall ee column five). Thu, the optimization of tree maintenance a decribed in Section i able to achieve a ignificant reduction in tree calculation cot.. Simulation for a ample application In the following, we compare the characteritic of our algorithm to the delay-baed and approache on bai of a realitic application cenario... Simulation Setup Event pattern to determine application prioritie for the imulation were generated by tracing a imple multi-player game []. In thi game, each player control a pacehip which can accelerate, decelerate, turn, and hoot at one another with a laer beam of a certain range. The rectangular game field allow player who approach one edge of the field to reappear at the oppoite ide. Each pacehip ha a predefined amount of hit point: each time it i hit by a laer beam, one of the hit point i ubtracted. If no hit Figure : Ditribution of application prioritie point remain, the pacehip i removed from the game. Uer action together with timetamp and information about the current game tate were recorded for game with ix and eighteen player. In our network imulation, each recorded uer action led to one packet exchanged among end-ytem. The application prioritie Hu iki KL MON ued for the tree building algorithm are baed on the relative poition between the pacehip and their orientation. If the pacehip of a player i within hooting range of another player hip, the end-ytemg of et Hu JM. We define that i within hooting range of if the ditance between and i le than the maximum range of the laer beam and i oriented in uch a way that it can hit after conducting at mot one turn operation. For player outide the hooting range of, H i calculated depending on their ditance = to the ender: Hu rm'q, where i the maximum poible ditance. A typical ditribution of prioritie for a game eion with ix player i depicted in Figure. Prioritie cloe to M are common becaue the objective of the game i to core point by hooting other player and hence player will cluter together intead of preading out evenly on the game field... Simulation Reult for End-Sytem To evaluate the characteritic of our priority-baed tree-building algorithm ), we compare it to the and the, repectively. For the imulation, we ue two network topologie of different ize. The firt imulation cenario i baed on a game eion with ix player. The eion lated for econd and during that time pan a total of event were iued. The priority ditribution that reulted from the pacehip poition i depicted in Figure. Figure how the underlying network topology with end-to-end delay between and m and an average value of m. The delay propertie of a pecific ditribution tree can be meaured uing the cot & ee Section ). Figure a) depict the ditribution of & for the, the, and the, repectively. By definition, t the routing algorithm reult in the bet ditribution of, with 9% of all tree having a of le than & 7 & m. However, the difference between and i comparatively mall m at 9%), meaning that the end-to-end delay in the ditribution tree contructed with the algorithm are on average only marginally higher than the delay on the direct path. In comparion, ditribution tree created with the algorithm reult in a ignificantly higher difference for & 7 m at 9%).

7 & priority-baed 7 8 cumulative weighted end-to-end delay [m] a) Ditribution of relative delay penalty..... [.;.) [.;.) [.;.9) [.9;.] priority clae b) Average RDP reource uage [m] c) Ditribution of.. link tre d) Link tre ditribution Figure : Simulation reult for End-Sytem The receiver-pecific end-to-end delay, defined a +F-D, reulted in the following 99% confidence interval for thi imulation cenario: I j I M>KmL j@ M>KZL N. The relative delay penalty of the end-to-end delay: ^M>KLM [N, I MM <e UM M^[@M mn, and ) i a meaure for the optimality +EGF-D -B The compare the end-to-end delay of a receiver to the mallet poible delay i.e., the unicat delay fromg to ). By definition, for the ditribution tree <l#mzv Œ. Figure b) how the average value for different priority clae. In the cae of the algorithm, the decreae continuouly with increaing application-level prioritie from. for receiver with Hu XI KL KL K@/M to. for with Hu z I K@ j@ ^M KN. For application intance with a high priority, a delay cloe to the unicat latency can be achieved. The maximum range of the average i relatively mall.) ince only ix endytem participate in thi imulation cenario and the ditribution tree have path with at mot four hop. The load on the network caued by a certain ditribution tree can be meaured uing the reource uage metric $ a defined in Section. '$ take into account that more than one identical copy of a packet may be ent over the ame phyical link. The ditribution of $ i depicted in Figure c). The algorithm alway elect the ame et of edge for it tree, independently of the ource node. Thu, the '$ ha a contant value of 8 m which i at the ame time the lower bound for the reource uage of the other algorithm. 7% of all ditribution tree built by the algorithm have a $ between 8 m and 7 m which i cloe to the optimum and far better than the value obtained by. Hence, the optimization of end-to-end delay for certain application intance by the caue only a light increae in reource uage when compared to the. Link tre i another indicator for the network overhead caued by an ALM tree. reult in the lowet link tre with 77% of all ditribution tree having a link tre of and a maximum link tre of, a hown in Figure d). Ditribution tree contructed by the algorithm come cloe to thee value with the only difference being that.7% of the tree have a link tre of. The link tre for the tar-haped topologie lie between and and only % of the tree have a link tre of... Simulation Reult for 8 End-Sytem For the econd imulation cenario, we created a more complex network topology with router, 8 link, and 8 end-ytem participating in a virtual game eion. The delay among end-

8 & cumulative weighted end-to-end delay [] a) Ditribution of relative delay penalty.8... [.;.) [.;.) [.;.9) [.9;.] priority clae b) Average RDP reource uage [m] c) Ditribution of link tre d) Link tre ditribution Figure : Simulation reult for 8 End-Sytem ytem lie between m and 8 m with an average value of. m. During the eion duration of econd, a total of event were iued by all player. The reulting application prioritie are imilar to the ditribution hown in Figure. The ditribution for the cumulative weighted end-to-end delay & are depicted in Figure a). Becaue of the increaed complexity of the ALM tree with up to hop on path of the ), the difference in & between and i larger 7 m to 9 m at 9%). However, the doe achieve a good optimization of the latency from the ource node to receiver with a high priority when compared to the value of & for the algorithm 9 m at 9%). The receiver-pecific end-to-end delay reulted in the following 99% confidence interval: I M L M GjL [N, I [ M d O[ m@ N, and I M d [@ M Z@ d^n. The optimization of end-to-end delay become alo viible in the average value for application intance within different priority clae ee Figure b)). For the algorithm, the decreae from. to. for receiver with Hu WkI K@ j@ M KN which i cloe to the optimum value. Thi i a ignificant improvement over multicat tree contructed uing the, even for the receiver within the lowet priority cla. At the ame time, priority-baed minimum panning tree caue a higher network load a can be een from Figure c). It how the reource uage ditribution for the three tree building algorithm: 9% of all have a reource uage that i up to % higher than $ of the. Shortet path tree have a reource uage that i by far larger. A in the firt imulation cenario, the algorithm generate the lowet link tre with 9% of all ditribution tree having a link tre of at mot and a maximum tre of ee Figure d)). The value for the algorithm are only lightly larger with 9% of all multicat tree having a link tre of at mot and a maximum link tre of. In comparion, the link tre of the tree ha a value of 9 at 9% and maximum link tre i 7... Introducing Uncertainty All imulation reult dicued above were calculated under the condition that the application alway had full knowledge about the actual end-to-end delay. In a real network, delay fluctuate depending on router load) and meaurement give approximation only. Thu, we alo conducted imulation for the algorithm when meaured delay differ t from the real value up to a certain &, degrade only by 8 m at 9% percentage. For P[K when compared to the value given in Figure a), and by 7 m for dk. In the highet priority cla, increae only lightly to. for [K, and to. for dk. The reource uage ditribution for [K i almot identical to the

9 one depicted in Figure c). For dk, 9% of all tree have a '$ between m and 88 m. Thee reult indicate that the algorithm i fairly robut againt inaccurate knowledge of delay. Summing up, the imulation reult how that the algorithm optimize the end-to-end delay for receiver for which the ender ha a high application priority. Even delay for end-ytem with a lower priority are in mot cae better than thoe that can be achieved with multicat tree built by the algorithm. At the ame time, the increae in network load i kept at a tolerable level.. CONCLUSIONS AND OUTLOOK We have preented a novel priority-baed routing algorithm for application-level multicat. It allow an application to influence the path that a packet take from the ender to a receiver by pecifying a priority for each packet-receiver pair. A the priority i increaed from K to M, the path change gradually from to. Thu, our can be conidered a a generalization of the and the. We have decribed an efficient algorithm for the contruction of the ditribution tree and dicued how tree maintenance operation can be minimized. Our imulation reult indicate that the algorithm build multicat tree with end-to-end delay that are cloe to the optimum for receiver with a high priority while the total network load increae only lightly. In the future, we plan to invetigate how to bet elect prioritie on the bai of application-layer emantic for performance-critical multicat application. Another important iue i to further reduce the computational complexity and to improve calability. One olution might be to cluter adjacent in repect to latencie and prioritie) end-ytem and to contruct local. Alo, we want to take capacity contraint on the link into account, and we intend to perform imulation for more complex topologie. Our final goal i to integrate the algorithm into a real-world multicat application, uch a an Internet game, and to perform meaurement over the Internet. 7. REFERENCES [] K. Calvert, M. Doar, and E. Zegura. Modeling Internet Topology. IEEE Communication Magazine, ):, 997. [] Y. Chawathe. Scattercat: An Architecture for Internet Broadcat Ditribution a an Infratructure Service. PhD thei, Univerity of California, Berkeley, USA, Dec.. [] Y. Chu and T. Liu. On the Shortet Arborecence of a Directed Graph. Science Sinica, :9, 9. [] Y. Chu, S. Rao, S. Sehan, and H. Zhang. Enabling Conferencing Application on the Internet uing an Overlay Multicat Architecture. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] Y. Chu, S. Rao, and H. Zhang. A Cae For End-Sytem Multicat. In Proc. ACM SIGMETRICS, Santa Clara, CA, USA, June. [] J. Edmond. Optimum Branching. J. Reearch of the National Bureau of Standard, 7B:, 97. [7] P. Franci. Yoid: Extending the Internet Multicat Architecture. unrefereed report, available at Apr.. [8] D. Helder and S. Jamin. End-hot Multicat Communication Uing Switch-tree Protocol. In Proc. GPPC, Berlin, Germany, May. [9] J. Jannotti, D. Gifford, K. Johnon, M. Kaahoek, and J. J.W. O Toole. Overcat: Reliable Multicating with an Overlay Network. In th Sympoium on Operating Sytem Deign and Implementation OSDI), San Diego, CA, USA, Oct.. [] M. Mauve, J. Vogel, V. Hilt, and W. Effelberg. Local-lag and Timewarp: Providing Conitency for Replicated Continuou Application. To appear in: IEEE Tranaction on Multimedia. [] S. Ratnaamy, P. Franci, M. Handley, R. Karp, and S. Shenker. A Scalable and Content-Adreable Network. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] I. Stoica, R. Morri, D. Karger, M. Kahoek, and H. Balakrihnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Application. In Proc. ACM SIGCOMM, San Diego, CA, USA, Aug.. [] W. Wang, D. Helder, S. Jamin, and L. Zhang. Overlay Optimization for End-hot Multicat. In Proc. NGC, Boton, MA, USA, Oct.. [] B. Zhang, S. Jamin, and L. Zhang. Hot Multicat: A Framework for Delivering Multicat to End Uer. In Proc. IEEE INFOCOM, New York, NJ, USA, June. [] S. Zhuang, B. Zhao, A. Joeph, R. Katz, and J. Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Diemination. In th International Workhop on Network and Operating Sytem Support for Digital Audio and Video NOSSDAV), Port Jefferon, NY, USA, June. APPENDIX A. PSEUDO CODE Figure 7 give the peudo code to compute the on a graph z < for a ender with priority function H. Firt, the weight Š of the directed graph are calculated a decribed in Section. Second, the directed minimum panning tree i determined according to the algorithm publihed by Edmond []. Thi algorithm i deigned to contruct a branching! with maximum total cot +-,/. on bai of. Thu, to build a minimum panning tree, we define all weight Š to be negative and enure that the branching contain QnM edge maximizing with negative weight i equal to minimizing with poitive weight). The baic idea of Edmond algorithm i to calculate an initial graph! by electing for each node except ) the incoming edge with maximum cot. While! contain any cycle, thee are broken up by exchanging appropriate edge. A branching i a directed graph without cycle where each node ha at mot one incoming edge, i.e., a branching i not necearily connected.

10 ) Compute weight Š for all edge in E: v = =< n o Š e Qy: VpHu/B ) Compute the directed minimum panning tree with ourceg on : Dicard all edge 7 entering the ource node. v node n = : elect the edge Y with maximum weight Š edge. While! o P E Š contain a cycle o r y= "Œ e= P" Š do -. Let Š be the et of elected Find the edge with minimum weight Š. Modify the weight Š of each edge T = : Š Ro 9 Š gvk Š 'Q Š, with b/r being the predeceor node with edge. ^ Select the edge J = with maximum weight Š, and et Š o ^ Š '. Build a new graph! by contracting all node into a peudo-node : *o. Modify and Š by replacing all edge with tail node or head node by or ^, and delete edge =. Create new weight Š accordingly. Replace all peudo-node p and the correponding edge in Š by the original node and edge.! repreent the directed with root. Figure 7: Peudo code for the computation of the optimum ditribution tree

Priority-Based Distribution Trees for Application-Level Multicast

Priority-Based Distribution Trees for Application-Level Multicast Priority-Based Distribution Trees for Application-Level Multicast Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelsberg Praktische Informatik IV, University of Mannheim, Germany vogel,

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems Syracue Univerity SUFAC lectrical ngineering and Computer Science echnical eport College of ngineering and Computer Science 8-1991 Semi-Ditributed Load Balancing for aively Parallel ulticomputer Sytem

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

CHAPTER 4: INTERPROCESS COMMUNICATION AND COORDINATION

CHAPTER 4: INTERPROCESS COMMUNICATION AND COORDINATION CHAPTER : INTERPROCESS COMMUNICATION AND COORDINATION Chapter outline Dicu three level of communication: baic meage paing, requet/reply and tranaction communication baed on meage paing Dicu name ervice

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Design of a Stewart Platform for General Machining Using Magnetic Bearings

Design of a Stewart Platform for General Machining Using Magnetic Bearings eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented

More information

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

Measuring Link Bandwidths Using a Deterministic Model of Packet Delay

Measuring Link Bandwidths Using a Deterministic Model of Packet Delay Meauring Lin Bandwidth Uing a Determinitic Model of Pacet Delay Kevin Lai Stanford Univerity lai@c.tanford.edu Mary Baer Stanford Univerity mgbaer@c.tanford.edu ABSTRACT We decribe a determinitic model

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

A Unicast-based Approach for Streaming Multicast

A Unicast-based Approach for Streaming Multicast A Unicat-baed Approach for Streaming Multicat Reuven Cohen and Gideon Kaempfer Department of Computer Science Technion, Haifa 32000, Irael Abtract Network layer multicat i know a the mot efficient way

More information

Performance Evaluation of search engines via user efforts measures

Performance Evaluation of search engines via user efforts measures IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information