Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Size: px
Start display at page:

Download "Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs"

Transcription

1 Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk, arxiv: v1 [cs.ni] 23 Feb 2017 Abstract Network Function Virtuaization (NFV) is enabing the softwarization of traditiona network services, commony depoyed in dedicated hardware, into generic hardware in form of Virtua Network Functions (VNFs), which can be ocated fexiby in the network. However, network oad baancing can be critica for an ordered sequence of VNFs, aso known as Service Function Chains (SFCs), a common coud and network service approach today. The pacement of these chained functions increases the ping-pong traffic between VNFs, directy affecting to the efficiency of bandwidth utiization. The optimization of the pacement of these VNFs is a chaenge as aso other factors need to be considered, such as the resource utiization. To address this issue, we study the probem of VNF pacement with repications, and especiay the potentia of VNFs repications to hep oad baance the network, whie the server utiization is minimized. In this paper we present a Linear Programming (LP) mode for the optimum pacement of functions finding a trade-off between the minimization of two objectives: the ink utiization and CPU resource usage. The resuts show how the mode oad baance the utiization of a inks in the network using minimum resources. I. INTRODUCTION Network Function Virtuaization (NFV) is a new paradigm that virtuaizes the traditiona network functions and paces them into generic hardware and couds, as opposed to the designated hardware. The pacement of the virtua network functions (VNFs) can happen either in remote data centers or by depoying singe servers or custers of servers. Pacing VNFs in remote data center can ower the cost of depoyment, but is known to typicay increasing the deay and create churns of network oad, due to the fix and often remote ocation. Instaing new services (or, mini data centers) inside the network can mitigate the distance-to-datacenter probem. At the same time, the depoyment of new servers forming sma data centers in reguar nodes requires new investment costs, which requires a gradua upgrade of the network. Therefore, the optima pacement of these servers in the network is a must for network operators to reduce the operationa costs. Whie most of the current work concentrates on the optima pacement of VNFs under some specific objective minimizing the network costs under some specific resources constraints, e.g. costs of power consumption or the number of physica servers, ess effort has been on addressing the network oad baancing probem with VNF pacement. In this paper, we address, jointy, the network oad baancing and resource cost probem with VNF pacement, where the concept of VNF repications is used to find a trade-off between network oad baancing and network costs. The Fig. 1 iustrates the idea, whereby we assume a service chain which is composed by non-repicabe VNFs and, depending on the number of repicas, may be spitted to one or more parae sets of an ordered sequence of VNFs towards the service end-point. The VNF repicas in a service chain can be impemented as many time as needed in the network. The major advantage is to spit the traffic fows in a controed way such that network traffic oad baancing can be optimized when the service is running. As commony in network services, the service chain starts with a non-repicabe VNF, e.g. a oad baancer or gateway, and is aocated in a dedicated data center which generates service requests. Whie the rest of the functions are aocated on sma servers, maintaining the sequence order. To find the optimum pacement of servers required for the depoyment of VNFs, we formuate the probem as a Integer Linear Programming (ILP) mode. The rest of the paper is organized as foows. Section II presents reated work. Section III describes the reference architecture. In Section IV, the reated optimization mode is described. Section VI anayzes the performance, and Section VII concudes the paper and discusses future research. II. RELATED WORK Eary work in [1] studies the optima VNFs pacement in hybrid scenarios, where some network functions are provided by dedicated physica hardware and some are virtuaized, depending on demand. They propose an ILP mode mode with the objective to minimize the number of physica nodes used, which imits the network size that can be studied due to compexity of the ILP mode. In [2], a context-free anguage is proposed for the specification of VNFs and a Mixed Integer Quadraticay Constrained Program (MIQCP) for the chaining and pacement of VNFs in the network. The paper finds that the VNF pacement depends on the objective, such as atency, number of aocated nodes, and ink utiizations. In mobie core networks, [3] discuss the virtuaization of mobie gateways, i.e., Serving Gateways (S-GWs) and Packet Data Network Gateways (P-GWs) hosted in data centers. They anayze the optimum pacements by taking into consideration the deay and network oad. In [4] aso propose the instantiation and pacement of PDN-GWs in form of VNFs. Unike previous work, we sove the VNF pacement probem by considering VNF repications which is the nove idea that we aready proposed in [5]. In this work, we extend [5] to sove the optimum pacement of VNFs by minimizing the network

2 enb S-GW Internet P-GW + Services Legacy system VNF1 S-GW P-GW LB Service Function Chain VNF4 LB FW NAT enb VNF1 S-GW LB P-GW VNF4 LB FW NAT VNF1 VNF4 S-NE Physica ocation Fig. 1: Use case on Mobie Core Networks P-NE cost whie maximizing oad baancing with constraints on the avaiabe resources in mobie core networks. Therefore, we propose a more reaistic approach to enabe an scaabe growth of the mobie data traffic over years. This paper aso incudes a new traffic mode which aso considers the end-user traffic generated in the Radio Access Network which previous paper did not consider. We aso consider mutipe VNFs pacement per node with repications, which is new. III. REFERENCE ARCHITECTURE The NFV architecture is basicay described by three components: Services, NFV Infrastructure (NFVI) and NFV Management and Orchestration (NFV-MANO). A Service is the composition of VNFs that can be impemented in virtua machines running on operating systems or on the hardware directy. The hardware and software resources are provided by the NFVI that incudes connectivity, computing, storage, etc. Finay, NFV-MANO is composed by the orchestrator, VNF managers and Virtuaized Infrastructure Managers responsibe for the management tasks appied to VNFs. In NFV-MANO, the orchestrator performs the resource aocation based on the conditions to perform the assignment of VNFs chains on the physica resources. The sub-task running in the orchestrator, known as VNF Forwarding Graph Embedding (VNF-FGE) or VNF pacement probem, tries to find the optimum pace to aocate VNFs with regard to some specific objective, such as minimization of computation resources, minimization of power consumption, network oad baancing, etc. A. Gateway Virtuaization: The EPC Use-Case In the focus area of VNF pacement probem, we propose to study a concrete scenario from egacy mobie systems, namey the Evoved Packet Core (EPC) networks, where we beieve that the VNF pacement in Service Function Chaining can bring most benefits. The proposed case study is shown in Fig. 1. The Serving Gateway (S-GW) and PDN Gateway (P-GW) are connected to e-nodeb and send the end-user traffic towards Internet. This traffic usuay requires various additiona services, currenty depoyed using traditionay enb Background traffic End-user traffic Fig. 2: Network traffic considerations Data Center traffic embedded network functions, such as oad baancers, TCP optimizers, firewas and NATs. Considering the virtuaization of the S-GW and P-GW on sma data centers, as proposed in [3], both the data-pane and contro-pane functions of the current egacy gateways are moved to an operator s datacenter. At the paces of the egacy gateways, an off-the-shef network eement (NE) is used to redirect the traffic from the origin access point of the Radio Access Network (formey done by the S-GW) to the DC and from the DC to the externa backbone interface, which is, in the most cases, the former pace of the P-GW. Typica VNFs reated to contro-pane functionaities of the S-GW and P-GW can not be further distributed on the network. In contrast, due to the arge traffic voumes handed by the data-pane, parae transmission paths can be used in the transport network, and thus, VNFs reated to datapane functions with high intensives tasks, e.g. TCP optimizers (TCP opt) or Performance Enhancement Proxies (PEP), may aso be repicated and be used in parae at different network ocations, as proposed in [6]. Thus, we study the chaining and virtuaization of the additiona functions reated to the datapane on different physica ocations (sma data centers) in the mobie core network. The number of required repicas wi be in reation with the network traffic demands. Therefore, by knowing how many repicas are necessary we can pace them to maintain a good network oad baancing. On the other hand, the usage of additiona network ocations can increase the number of required servers and DCs, which potentiay wi increase the network costs. To this end, we define the probem as finding the optimum pacement for these functions subject to the network costs in form of used DC ocations whie at the same time oad baancing the network. B. Network Traffic Mode In a rea network, not a services wi be virtuaized at once. Thus in this paper, we assume two kinds of network traffic, defined as the background traffic and data center traffic. This is iustrated in Fig. 2. The background traffic is reated to the egacy not virtuaized services and the traffic is

3 generated from each core node to the rest of nodes and routed by a traditiona network core protoco, e.g. IP routing. The virtuaized services are responsibe for the data center traffic. This traffic is generated at the S-NEs (former S-GW paces) and has to be transported towards the Internet gateways (P- NE s at former P-GW ocations), as shown in Fig. 1. Since the atter category of traffic, usuay TCP connections, is generated by end users, it has to traverse a set of network functions to match the required service before accessing to Internet. In our approach, we assume that the background traffic can be generated randomy and forwarded foowing the rues of a specific Traffic Engineering (TE) mode defined by the traditiona singe path destination oriented IP routing. The TE mode written in form of ILP formuation (detaied in the next section) minimizes the ink utiization of a inks in the network using a inear cost functions approach. Once the background traffic is oad baanced, it wi not be affected by the contro of the data center traffic, but it has to be considered as a fixed input parameter for the next mode caed Resource Aocation (RA). This mode is used to aocate optimay VNFs in the network trying to minimize the cost associated to the used resources, maximizing the network oad baancing. The optimum pacement of VNFs and repicas can provide the optimum ocations for the data centers, which wi be responsibe for the instantiation of VNFs in the network. IV. OPTIMIZATION MODELS This section formuates the Link Capacity Dimensioning, TE and RA modes as optimization probems subject to a set of constraints, as described next. The notation of a parameters and variabes is summarized in Tabe I. A. Link Capacity Dimensioning Mode This mode aows the initia ink dimensioning with the aim to minimize the required capacities for a given topoogy and a given traffic matrix. Then: Minimize: C L t T t (1) The constraint (2) assures that for the given ink traffic (eft side) the capacity of each ink is dimensioned according to an over-provisioning factor ϑ. So, L: λ R p t p P p ϑ C λ t T t t (2) λ Λ b To be sure that every ink is of exacty one bandwidth type: L : Ct = 1 (3) t Finay, the next constraint assures that every traffic demand exacty uses one admissibe path: λ Λ b : R p P p λ = 1 (4) λ B. Traffic Engineering Mode The TE mode minimizes the utiization cost of a inks in the network given as Parameter N = {n 0, n 1,..., n (N 1) } L = { 0, 1,..., (L 1) } P = {p 0, p 1,..., p (P 1) } T = {t 0, t 1,..., t (T 1) } Y = {y 0, y 1,..., y (Y 1) } S = {s 0, s 1,..., s (S 1) } V s = {v 0, v 1,..., v (Vs 1)} Λ = {λ 0, λ 1,..., λ (Λ 1) } Λ b Λ Λ s Λ P λ P P s P t p {0, 1} r v {0, 1} r max w max c ϑ Variabe TABLE I: Notation Meaning set of a nodes set of a inks set of a paths set of a bandwidths types set of inear cost functions set of service chains set of VNFs in service chain s set of a traffic demands subset of background traffic demands subset of demands of service chain s subset of paths for a specific λ subset of paths for service chain s 1 if path p traverses ink 1 if function v can be repicated maximum number of aowed repicas per service chain maximum number of VNFs per DC maximum capacity of ink over-provisioning capacity ratio Meaning K utiization cost of ink Rp λ {0, 1} 1 if traffic demand λ is using path p Ct {0, 1} 1 if ink is of of bandwidth type t Rp s {0, 1} 1 if service chain s is using path p Rp λ,s {0, 1} 1 if traffic demand λ from service chain s is using path p Fn v,s {0, 1} 1 if VNF v from service chain s is aocated in node n F n {0, 1} 1 if node n is running some VNF Minimize : L K (5) where the cost of every ink is reated to its ink utiization U T E and defined by the resuting vaue from a inear cost functions y i (U T E ) = a i U T E b i as foows: ( ) L, y Y : K y U T E where constants a i and b i are chosen in a way that the sope of the incrementa cost vaues y i Y approximatey foows an exponentia function [7]. The ink utiization is given by U T E = λ Λ b p P λ (6) λ R λ p t p c (7) The summation takes into account each traffic demand λ out of the set of a background demands Λ b whose specific path p P λ is traversing ink, divided by the ink capacity. The ony routing constraint for this mode assures that every traffic demand exacty uses one admissibe path: λ Λ b : R p P p λ = 1 λ

4 C. Resource Aocation Mode The second optimization mode, caed RA mode, uses a simiar objective function than the previous one, but adding a new term using the binary variabe F n (1 means the node is used by at min 1 VNF, 0 no VNF is assigned) which minimizes the number of nodes that are aocating VNFs subject to the constraints expained beow: ( ) ( ) Minimize : α K + β F n (8) L n N Both terms are weighted by α and β parameters to enabe the desired tradeoff between oad baancing and network costs. In this paper we restrict to use them as seection parameter for one of the objective functions. The RA traffic mode is different to the TE mode and defined as foows. For each service chain s S a tota number of Λ s traffic demands λ Λ s are defined, where each of them coud not be spitted and have to be forwarded over one service chain specifc path p P s, which is taken (is ony 1 if path p is used by demand λ). Furthermore, the number of paths P s may be different than the number of demands. Thus, without the usage of VNF repicas a demands of a service chain must use the same path. As a resut, the ink utiization due to the RA mode is given by: into account by binary variabe R λ,s p U RA = s S λ Λ s p P s λ Rp λ,s t p (9) c In the RA mode, the inear utiization cost functions take into account the superposition of the fix given background TE traffic with the RA traffic specified as: ( ) L, y Y : K y U T E + U RA (10) Because each demand has to be assigned to a path, the routing constraint is given by s S : R λ #» p P p λ,s = Λ s (11) s Λ s Then, to know if an specific node is being used or not, the binary variabe F n wi ony be 1 if 1 VNFs are assigned to a node n, which is assured by the constraint n N : s S v V F v,s n W F n s S v V F v,s n (12) where the binary variabe Fn v,s indicates, if VNF v from service chain s is aocated to node n. W is a arge constant to assure, that the eft side of the equation is aways ess than 1. The next constraint (13) assures that a certain traffic demand λ can ony use a path p if the requested service chain is aso using the same path. Thus (13) takes into account, that more than one demand can use the same path. On the other hand, constraint (14) guarantees, that a service schain s can not estabish an active path without traffic assigned to it. V1 p1 p2 V2 V2_rep Node n V3 Fig. 3: VNF repication strategy s S, p #» P s, λ #» Λ s : R λ,s p R s p (13) s S, p #» P s : R s p R λ,s λ Λ #» s V4 p (14) Furthermore, the number of admissibe paths for each service chain s is constrained by the number of repicas. Then, for [0, 1, 2,..., r max ] repicas, each service chain can use at maximum [1, 2, 3..., (r max + 1)] paths to forward traffic, i.e., s S : 1 p #» P s R s p r max + 1 (15) Therefore, with no repicas, a certain service chain can ony use one path, whie increasing number of repicas, the number of admissibe paths proportionay increases. Then, for each activated path in service chain s defined by Rp, s the next constraint aocates a VNFs of the service chain: s S, p P s, v Fn v,s (16) V s : R s p n p On the other hand, the sequence order of VNFs in the service chain has to be maintained. Then, for a certain path p, the function v can not be aocated in the node n, if the previous function v 1 is not aready aocated in any of the previous nodes of the same path. So, v V s, p P s, n p: ( n ) m=0 F (v 1),s m F v,s n R s p 1 when v > 0 (17) The next two constraints imit the maximum number of VNFs that can be aocated in the network. First, the maximum number of VNFs aocated in some specific node n is constrained by the parameter w max : n N : F s S v V n v,s w max (18) s Second, if a certain function v can be repicated r v, then, the maximum number of repicas is constrained by the maximum number of active paths Rp. s If the function can not be repicated, then can ony be paced once. So, s S, v V s : Fn v,s r v R n N p P p s + 1 r v (19) s To improve the oad baancing feature using repicated VNFs, we introduce an additiona constraint. In the proposed repication mode, we excude the case where two seected

5 Fig. 4: Janos-us network paths p 1 and p 2 from the service chain s are choosing the same shared node n to pace the same function (origina and repica). So, foowing the exampe shown in Fig. 3, v 2 and v 2 rep can never be aocated in the same node n. Then, for v V s, p 1 P s, p 2 P s, n 1 p 1, n 2 p 2 : R s p 1 + R s p 2 + 2F v,s n r v 3 { n1 = n 2 = n v 0 V s 1 (20) To be noted that, this constraint is added for a possibe pairs of admissibe paths of each service chain. To reduce the computing compexity we restrict, in this work, to ink disjoint paths. V. PERFORMANCE EVALUATION In this section, we show the resuts for four different optimization scenarios: 1) network oad baancing (minlb), 2) minimization of network costs (minnc) given by the number of required data centers (DCs), 3) minimization of network costs with imited number of VNFs per DC (minnc constr) and4) network oad baancing with imited number of DCs to pace VNFs and imited number of VNFs per DC (minlb constr). The LP modes are impemented using the Gurobi Optimizer [8] and the topoogy (26 nodes and 84 inks) is chosen from SNDLib website [9] and shown in Fig. 4. The background traffic is generated for each sourcedestination node pair randomy within the interva [1, 4] Gbps. Since the aocation of VNFs is known to be NP-hard, we restrict to 9 S-GWs and 3 P-GWs paced in the network, which are responsibe for the data-center traffic (see Fig.4). Unike other proposas, where the traffic between the S-GW and P- GW is assumed to be non-spittabe, each S-NE generates 10 traffic demands of 4.4 Gbps to its associated P-NE, which can be routed aong different path. For the ink dimensioning, the background and data-center traffic is optimay oad baanced by soving the TE mode, where the GWs are not virtuaized and paced at the origina ocations. Based on the traffic fows, we assume an overprovisioning factor of 1.2 to cacuate the ink capacities c, which are chosen from different granuarities (2.5, 10, 40, 100 and 200 Gbps). For the RA mode the background traffic is routed over the singe path derived above, which yieds the partia ink utiization U T E. Ony the DC traffic is now optimay routed, possiby using parae paths. A traffic demands of one S/P- NE are handed by one service chain. The service chain anayzed is shown in Fig. 2, which is composed by V NF 1 (i.e. S-GW, P-GW, LB), which can not be repicated, V NF 2 (i.e. TCP-optimizer) and V NF 3 (i.e. PEP), which can be repicated, and finay, V NF 4 (i.e. LB, FW, NAT), which again can not be repicated. Depending of the optimization objective, a VNFs may be paced in the same or in different DCs, where aso the S/P-NEs are possibe ocations. Repicated VNFs can be paced ony at DCs on different paths. We assume the ocation of the DCs and the assignment of the VNFs to DCs are the variabes to optimize. A. Network Load Baancing vs Minimum Network Node Costs We study optimization resuts obtained for the excusive minimization of the oad baancing (minlb, α = 1, β = 0) and excusive minimization of the network costs (minnc, α = 0, β = 1). In the Fig. 5, we show the comparison of the average ink utiization, maximum ink utiization, number of used DCs and maximum number of VNFs per DC with no repication, with one and two repicas, respectivey. Due to Eq.(15) the number of repications are restricted to the maximum vaue r max, ater shown in the figures as repicas. For the minnc scenario we observe expected resuts. Due to the cost optimization a VNFs are paced in 3 DCs which are reated to the number of P-NEs and ony singe paths between the S-NEs and P-NEs are used. Thus the average and maximum ink utiization is maintained constant for any case. The maximum number of VNFs per DC for the NC scenario changes if one VNF repication can be used (see Fig. 5c ) athough the optimized vaue of the objective function remains the same. This comes from the fact that the soution is ony unique with respect to the number of used DCs and not to the number of assigned VNFs per DC, which is an important behavior and for further studies. Whie, in the minlb scenario, the average ink utiization increases with repication (Fig. 5a) because the optimization mode tries to decrease number of overoaded inks using onger paths with underutiized inks, which can be seen from the reduction of the maximum ink utiization (Fig. 5b). In more detai Fig. 6 shows a histogram of the ink utiization, which verifies, that an increment of the avaiabe parae paths to forward traffic decreases the number of overoaded inks due to repication. The improvement between one and two repicas is not significant, but it is totay dependent on the chosen topoogy. The effect on the objective function?? is quite arger, as can be seen from the chart embedded in Fig. 6. On the other hand, as shown in (Fig. 5c), the number of used DCs increases because of onger paths more DCs are required to aocate repicas. Accordingy the maximum number of VNFs assigned to a DC decreases. B. Network Optimization under DC and VNF Constraints In the minnc case, the objective is to minimize the number of used DCs without restricting the number of VNF per DC. However, in a reaistic DCs the number of VNFs aocated to a virtua maschine (VM) wi be restricted due to performance

6 Percentage of inks Percentage of inks a) Average Link Utiization b) Maximum Link Utiization c) Max. num of VNF per DC - max. num. of used DCs No repication 1 repica 2 repicas Load Baancing Network Cost No repication 1 repica 2 repicas Load Baancing Network Cost 5 0 No repication 1 repica 2 repicas LB - max VNF LB - used DCs NC - max VNF NC - used DCs Fig. 5: Comparison between Load Baancing and Network Cost modes No repication Normaized cost 1 repica 2 repicas No repication 1 repica 2 repicas No repication Normaized cost 1 repica No repication 1 repica Link utiization Fig. 6: Link Utiization of minlb Mode TABLE II: Node Cost mode with at most 8 VNFs per node Case avg utiization path ength avg vnf No repication With repication boundaries of the avaiabe computation resources, e.g. the service processing time. Furthermore the number of VMs per DC wi be constrained as we. Due to our sma scae exampe we wi dea with this probem by simpe constraining the maximum number of VNFs per DC to 8 VNFs. The soution of the constraint optimization probem minnc constr resuts into 6 DCs, which doubes the network costs as shown in Fig.5. Due to the increased number of DCs the use of VNF repications offers some advantages, as shown in Tabe II. The constraint reduces the average number of VNFs (avg-vnf) per node and further, the usage of repicas aows to use some aternative paths in parae, which reduces the average path ength (in hops). As a consequence, the tota network traffic decreases as we as the average ink utiization. Finay we want to optimize the oad baancing under constraints given by the maximum number of usabe DCs as we as the maximum number of VNFs per DC, where the constraints are taken from the optima resuts given by the minnc constr probem. In the Fig. 7, we show the resuts for the histogram of the ink utiization. Here, we can see that one repica is sti abe to improve the oad baancing, but due to the sma exampe with ess effect. VI. CONCLUSIONS As VNFs can ony be paced onto servers ocated in data centers, the traffic directed to these DCs has not ony Link utiization Fig. 7: Link Utiization of minlb constr mode significant impact on the network costs but aso on the oad baancing. To enabe a cost efficient DC pacement by jointy improve the oad baancing we introduce the VNF pacement with repications in this paper, and especiay show how the repications of VNFs can hep to oad baance the network. ACKNOWLEDGMENT This work has been performed in the framework of SENDATE-PLANETS (Project ID C2015/3-1), and it is party funded by the German BMBF (Project ID 16KIS0470). REFERENCES [1] H. Moens and F. De Turck, VNF-P: A mode for efficient pacement of virtuaized network functions, Proceedings of the 10th Internationa Conference on Network and Service Management, CNSM 2014, [2] S. Mehraghdam, M. Keer, and H. Kar, Specifying and pacing chains of virtua network functions, 2014 IEEE 3rd Internationa Conference on Coud Networking, CoudNet 2014, pp. 7 13, [3] A. Basta, W. Keerer, M. Hoffmann, H. J. Morper, and K. Hoffmann, Appying NFV and SDN to LTE mobie core gateways, the functions pacement probem, AThingsCeuar 14, pp , [4] M. Bagaa, T. Taeb, and A. Ksentini, Service-aware network function pacement for efficient traffic handing in carrier coud, IEEE Wireess Communications and Networking Conference, WCNC, [5] F. Carpio, S. Dhahri, and A. Jukan, VNF Pacement with Repication for Load Baancing in NFV Networks, pp. 1 6, [Onine]. Avaiabe: [6] W. Haeffner, J. Napper, M. Stiemering, D. Lopez, and J. Uttaro, Service Function Chaining Use Cases in Mobie Networks, Internet-Draft, [Onine]. Avaiabe: [7] M. Caria, T. Das, A. Jukan, and M. Hoffmann, Divide and conquer: Partitioning OSPF networks with SDN, in IFIP/IEEE Internationa Symposium on Integrated Network Management, [8] Gurobi, Gurobi Optimizer. [Onine]. Avaiabe: [9] SNDib. [Onine]. Avaiabe:

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Balancing the Migration of Virtual Network Functions with Replications in Data Centers

Balancing the Migration of Virtual Network Functions with Replications in Data Centers Balancing the Migration of Virtual Network Functions with Replications in Data Centers Francisco Carpio, Admela Jukan and Rastin Pries Technische Universität Braunschweig, Germany, Nokia Bell Labs, Germany

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Improving Reliability of Service Function Chains with Combined VNF Migrations and Replications

Improving Reliability of Service Function Chains with Combined VNF Migrations and Replications Improving Reliability of Service Function Chains with Combined VNF Migrations and Replications Francisco Carpio and Admela Jukan Technische Universität Braunschweig, Germany Email:{f.carpio, a.jukan}@tu-bs.de

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication 6th Asia-Pacific Conference on Communications Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication Xu Huang Facuty of Information Sciences and Engineering

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Relocation of Hopping Sensors

Relocation of Hopping Sensors 28 IEEE Internationa Conference on Robotics and Automation Pasadena, CA, USA, May 9-23, 28 Reocation of Hopping Sensors Zhiwei Cen Googe Inc. 6 Amphitheatre Pky Mountain View, CA 9443, USA Matt W. Mutka

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

CLOUD computing has become commercially popular,

CLOUD computing has become commercially popular, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT VOL:11 NO:1 YEAR 2014 Consistency as a Service: Auditing Coud Consistency Qin Liu, Guojun Wang, IEEE, Member, and Jie Wu, IEEE Feow Abstract Coud storage

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

Using data flow analysis for the reliability assessment of safety-critical software systems

Using data flow analysis for the reliability assessment of safety-critical software systems Recent Researces in Circuits, Systems, Communications and Computers Using data fow anaysis for te reiabiity assessment of safety-critica software systems BÖRCSÖK J., SCHAEFER S. Department of Computer

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet DaVinci: Dynamicay Adaptive Virtua Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, Mung Chiang Princeton University {jhe, rz, yingi, chengee, jrex,

More information

A Model for Enhancing Connection Rerouting Using Active Networks

A Model for Enhancing Connection Rerouting Using Active Networks A Mode for Enhancing Connection Rerouting Using Active Networks Kwan Wu Chin, Mohan Kumar Department of Computer Science, Curtin University of Technoogy, GPO Box U 1987, Perth 6845, Western Austraia (chinkw,kumar)@cs.curtin.edu.au

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information