Exploring non-typical memcache architectures for decreased latency and distributed network usage.
|
|
- Leona Conley
- 5 years ago
- Views:
Transcription
1 Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science Exploing non-typical memcache achitectues fo deceased latency and distibuted netwok usage. Paul G. Talaga Syacuse Univesity Steve J. Chapin Syacuse Univesity Follow this and additional woks at: Pat of the Compute Sciences Commons Recommended Citation Talaga, Paul G. and Chapin, Steve J., "Exploing non-typical memcache achitectues fo deceased latency and distibuted netwok usage." (20). Electical Engineeing and Compute Science Technical Repots This Repot is bought to you fo fee and open access by the College of Engineeing and Compute Science at SURFACE. It has been accepted fo inclusion in Electical Engineeing and Compute Science Technical Repots by an authoized administato of SURFACE. Fo moe infomation, please contact
2 SYR-EECS-20-0 Septembe 5, 20 Exploing Non-typical Memcache Achitectues fo Deceased Latency and Distibuted Netwok Usage Paul G. Talaga Steve J. Chapin ABSTRACT: Memcache is a distibuted in-memoy data stoe designed to educe database load fo web applications by caching fequently used data acoss multiple machines. While memcache aleady offes excellent pefomance, we exploe how data-locality can incease pefomance unde cetain envionments and wokloads. We build an analytical model, then compae typical configuations to a handful of poposed schemes which pomise to educe latency and/o educe coe netwok taffic. An example web application, MediaWiki, is pofiled and shown to benefit fom altenate Memcache configuations when used in a lage web fam. We develop metics to pedict any web application s pefomance unde ou schemes. KEYWORDS: Memcache, Web Technologies, Caching, Data Locality Syacuse Univesity - Depatment of EECS, CST, Syacuse, NY 3244 (P) (F)
3 Exploing Non-typical Memcache Achitectues fo Deceased Latency and Distibuted Netwok Usage Paul G. Talaga Syacuse Univesity Steve J. Chapin Syacuse Univesity Septembe 5, 20 Abstact Memcache is a distibuted in-memoy data stoe designed to educe database load fo web applications by caching fequently used data acoss multiple machines. While memcache aleady offes excellent pefomance, we exploe how data-locality can incease pefomance unde cetain envionments and wokloads. We build an analytical model, then compae typical configuations to a handful of poposed schemes which pomise to educe latency and/o educe coe netwok taffic. An example web application, MediaWiki, is pofiled and shown to benefit fom altenate Memcache configuations when used in a lage web fam. We develop metics to pedict any web application s pefomance unde ou schemes. Intoduction Oiginally developed at Danga Inteactive fo LiveJounal, the Memcache system is designed to educe database load and speed page constuction by poviding a scalable key/value caching laye available to all webseves. The system consists of memcache seves (memcached instances) fo data stoage, and client libaies which povide a stoage API to the web application ove a netwok o local file socket connection. No duability guaantees ae made, thus memcache is best used to cache egeneable content o in font of a eliable stoage system. Data is stoed and etieved via keys, that uniquely detemines the stoage location of the data via a hash function ove the seve list. High scalability and speed ae achieved with this scheme as a key s location (data location) can easily be computed locally. Complex hashing functions allow addition and emoval of memcache seves without seveely affecting the location of the aleady stoed data. This wok exploes diffeent data placement techniques on top of Memcache to educe latency and netwok usage. We pesent six achitectue vaiants, evaluate thei pefomance in a deived usage model, and offe insights into applications which could benefit fom these vaiants. Key to this wok is the fact that moving data any distance takes time and netwok esouces. While moden LAN netwoks in a data cente envionment allow easy and fast tansmission, locating the data vey close to whee it is used can lowe latency and oveall netwok usage esulting in bette oveall system pefomance [2]. The benefits ae amplified fo lage o multiple data centes. Just as CPU caches speed computation, we apply the same ideas to data caches in the webfam. The est of the pape consists of: Section 2 eviews the cuent Memcache seve and client achitectue, with example code. Section 3 sets up an analytical model fo latency, cache usage, netwok utilization, and configuation vaiables fo a memcache instance in a datacente which we use late to compae diffeent configuations. A specific usage example using MediaWiki [7], used by Wikipedia, is also given. Standad memcache achitectues, obvious extensions, as well as ou poposed achitectues inspied by multi-cpu caches [4] is outlined in Section 4. In Section 5 we estimate pefomance fo each achitectue unde ou model looking at aveage latency, netwok usage, and elative available space. We futhe discuss the esults and futue wok in Section 6, elated wok in Section 7, and conclude in Section 8. Appendix A contains all fomula used to estimate latency.
4 2 Memcache Details As peviously mentioned, Memcache is built using a client-seve achitectue. Clients, in the fom of an instance of a web application, set o equest data fom a memcache seve. A Memcache seve consist of a daemon listening on a netwok inteface fo TCP client connections, UDP messages, o altenatively though a file socket fo local clients. Daemons do not communicate with each othe, but athe pefom the equested memcache commands fom a client. An expiation time can be set fo data to automatically emove stale data. If the allocated memoy is consumed, data is geneally evicted in a least-ecently-used manne. Fo speed, data is only stoed in memoy (RAM) athe than pemanent media. The location of a memcache daemon can vay. Fo small deployments a single daemon may exist on the webseve itself. Lage multi-webseve deployments geneally use dedicated machines to un multiple memcache daemons outfitted with lage amounts of memoy (RAM). This facilitates management and allows webseves to use as much memoy as possible fo web scipt pocessing. Clients access data via a libay API. As of Memcached vesion.4.7 (8/6/20), 5 commands ae suppoted, categoized into stoage, etieval, and status commands. Vaious API s witten in many languages communicate via these commands, but not all suppot evey command. Below is an example of a PHP snippet which uses two of the most popula commands, set and get to quickly etun the numbe of uses. function get_num_uses(){ $num = memcached_get("num_uses"); if($num!== FALSE){ etun $num; }else{ $num = get_num_uses_fom_databaase(); memcached_set("num_uses", $num, 60); } etun $num; } Rathe than quey the database on evey function call, this caches the esult in memcache. A timeout is set fo 60 seconds so at most once a second the database would be queied, with the function etuning a numbe at most a minute stale. In this case no elation to the session is made, but session identifying infomation could be integated into the key and thus stoe session data. Using memcache to stoe session infomation combined with sticky load balancing (equests fom the same session end up in the same seve o ack) can allow data to be stoed close to whee it will be used fo geate speed, which we exploe late. Altenatively, as in the above example, some data may be used by all clients. Rathe than each webseve equesting commonly used data ove the netwok, it may make sense fo a local copy to be stoed, negating the need fo epeated netwok access. Some memcache clients, including PHP Memcache, include bulk set and get commands (multi-get) which sets o gets data to memcache seves in paallel, geatly inceasing pefomance. Rathe than loop ove a set of keys, this allows an aay of keys to be sent to the command. We exploit this featue as much as possible in ou implementations as should any memcache enabled web application. 3 Analytic Model To analyze the stengths and weaknesses of diffeent configuations we devise an analytical model to measue pefomance. Fo a ealistic evaluation, we pofile a popula open-souce web application (MediaWiki [7]) fo a sample of memcache usage. We then use the model and usage sample to analyze the pedicted pefomance of diffeent configuations. 3. Assumed Netwok Topology Netwok topology geatly influences the pefomance of any lage inteconnected system. We assume a netwok topology consisting of multiple web, database, and memcache seves oganized into a physical 2
5 Rack... Rack n Figue : Assumed Web Fam Topology hieachical sta topology. See Figue fo an example. Web seves, unning application code, ae gouped conceptually into acks. These can eithe be physical acks of machines, sepaate webseve theads in a single machine, o an entie data cente. Instances within the same ack can communicate quickly though one netwok switch, o within the same machine. The choice of what a ack descibes depends on the oveall size of the webfam. Whateve the ganulaity, communication is faste inta-ack ove ine-ack. Racks ae connected though a backbone link. Thus, fo one webseve in a ack to talk to anothe in a diffeent ack at least 3 switches must be tavesed. Goups of acks can be aggegated togethe into floos, ooms, o datacentes. To genealize the diffeent possible configuations futhe, we assume netwok latency is linealy elated to the switch (o othe device) count a signal must tavel though. Thus, in ou ack topology the estimated latency (ound-tip time) fom one ack to anothe is l 3 because thee switches ae tavesed, whee l 3 = 3 2 switch fo some switch delay value. Similaly l 2 epesents a equest tavesing 2 switches, such as fom a ack to a node on the backbone and back. l epesents tavesing a single switch, but we ll use the tem l local to epesent this closest possible netwok distance. In some cases we ll use l localhost to epesent l 0, whee no physical netwok laye is eached. This metic diffes fom hop count as we count evey device a packet must pass though, athe than only counting outes. 3.2 Netwok & System Constants We define a set of vaiables and constants which ae used to compae memcache configuations. Note we include aveage memcache command and key length in size object and size message to simplify ou calculations. This estimates the on-wie data size. Using these values fo stoage is not exact, but useful due to exta meta-data in the memcache seve pe data item. 3
6 l localhost Aveage latency to localhost s memcached(l 0 ) l local Aveage latency to a neaby node though one device(l ) l n Aveage latency tavesing n devices (ound-tip) whee l n < l m n < m Numbe of acks k Replication value ps Popotion of keys which ae only used fo a specific session [0 ] w Pecent of commands which ae eads switch Delay pe switch tavesed (ms) size object Aveage size of stoed object (bytes) size message Size of message used in Snoop and Di (bytes) 3.3 Assumptions To simplify ou model we assume the following taits:. Computation is instantaneous - Memcache lookup and code evaluate do not take any time. While false in pactice, computes keep getting faste (o moe coes), and the speed of signal tansmission will foeve emain fixed. Netwok latency is about equivalent to cuent compute time, with Facebook claiming a 73µs aveage latency fo Memcache handling UDP equests, well within the µs latency fo ethenet. [0] [3] [6] Thus, we conside this a constant cost. 2. Linea Netwok Latency - Netwok latency is linealy elated to netwok device tavesal count. [6] 3. Sticky Sessions - A web equest in the same session can be outed to a specific ack o webseve. We define a usage sceneio as the elative fequency of memcache commands an application uses. Some commands ae futhe boken down into a hit o miss as these may incu diffeent costs totaling 7 diffeent equest types. In ou case we will use the open souce application MediaWiki, which has built-in suppot fo Memcache, fo an example usage sceneio. Obtaining the fequencies via memcache instumentation is discussed next. 3.4 MemcacheTach Pedicting memcache usage is not easy. Use demand, web application code changes, netwok usage and design all can influence the pefomance of a memcache system. Instumentation of a unning system is theefoe needed, but few tools exist. The memcache seve itself is capable of etuning the keys stoed, numbe of total hits, misses, and thei sizes. Unfotunately this is not enough infomation to answe the following questions: What keys ae used the most/least? How many diffeent clients use the same keys? How many memcache equests belong to a single HTTP equest? How much time is spent waiting fo a memcache equest fom the client pespective? Which memcache seves ae esponding slowly? Which webseves ae expeiencing slow netwok pefomance? To answe these and othe questions we developed MemcacheTach, a memcache client wappe fo PHP which intecepts and logs all equests. While cuently analyzed afte-the-fact, the data could be steamed and analyzed live to give insight into memcache s pefomance and allow live tuning. Analysis povides values fo ps, switch delay, stoed data size, the atio of the 7 memcache equest types, as well as othe 4
7 switch (ms) 3 ps 0.9 Avg. data size (bytes) 92 w 0.6 Mem. equests pe page 6.3 Set 4% Add hit 0% Add miss 0% Replace hit 0% Replace miss 0% CAS hit match 0% CAS hit missmatch 0% CAS miss 0% Delete hit 0% Delete miss % Inc hit % Inc miss 24% Dec hit 0% Dec hit 0% Flush 0% Get hit 45% Get miss 4% Figue 2: MediaWiki usage values useful infomation about a set of memcache equests. Figue 2 shows the measued values fo MediaWiki ove a set of thee sessions of viewing and editing content totaling 2 pages. The aveage page used 6.3 memcache equests and waited 25ms fo memcache equests in ou expeiment. Notice the only memcache commands obseved wee set, incement, delete, and get, a athe limited selection. Supisingly 60% of keys wee only used by one seve, showing heavy use of session stoage, and thus a good fit fo location awae caching. MemcacheTach is available at with installation and usage instuctions. 4 Memcache Achitectues Hee we descibe the achitectue and ules fo configuations we analyze late using the pevious netwok model. As mentioned in the Intoduction, stoage location is detemined by each client. Similaly, all altenate configuations below ae implemented in client code via wappes aound existing clients Standad Deployment Cental - SDC The typical deployment consists of a dedicated set of memcached seves existing on the ack backbone (l 2 ). Thus, all memcache equests must tavese to the memcache seve(s). Data is stoed in one location only, not eplicated Standad Deployment Spead - SDS This deployment places memcache seves in each webseve ack. Thus, some potion of data (/) exists close to each webseve (l ), while the est is fathe away (l 3 ). Remembe the key dictates the stoage location, which could be in any ack, not the local Standad Deployment Replicated - SDR To add some duability to data, we stoe data on moe than one memcache daemon (pefeably on a diffeent machine o ack). While solutions do exist to handle duplication on the memcache seve (epcached [5]), we look at the moe geneal case whee the client pefoms eplication on its own. This allows easy memcached updates and keeps management close to the application. Implementation can be eithe though multiple stoage pools o, in ou case, modifying the key in a known way to choose a diffeent seve o ack. Reads have the advantage of choosing which pool/key to use and thus distibuting load o educing latency by choosing a neaby copy. 5
8 4.0.4 Snooping Inspied - Snoop Based on multi-cpu cache snooping ideas, this achitectue places memcache seve(s) in each ack allowing fast local eads. Wites ae local as well, but a data location note is sent to all othe acks unde the same key. Thus, all acks contain all keys, but data is stoed only in the ack whee it was witten last. An update cleas all notes and data with the same key. To avoid ace conditions deleting all data, notes ae stoed fist in paallel, followed by the actual data. Thus, in the wost case multiple copies could exist, athe than none. A etieval equest fist ties the local seve(s), eithe finding the data, o a note. If a note is found the emote ack is queied and the data etuned. Duability and speed can be gained by pobabilistically copying the data to the local seve if a note was oiginally found, though this limits available stoage space and is not analyzed late Diectoy Inspied - Di An altenate mulit-cpu caching system uses a cental diectoy to stoe location infomation. In ou case, a cental memcache cluste is used to stoe shaing/duplication infomation. Each ack has its own memcache seve(s) allowing local wites, but eads may equie etieval fom a distant ack. A etieval equest will ty the local seve fist, and on failue quey the diectoy and subsequent etieval fom the emote ack. A stoage equest fist checks the diectoy fo infomation, cleas the emote data if found, wites locally, and finally sends a note to the diectoy. The diectoy note can contain a pimay and multiple seconday ack locations allowing duplication fo duability and distibuted load. We diffeentiate this scheme with the Dik option Wite Though (l ) - WTR Hee a small memcache seve(s) exists in the same ack, with a Standad Deployment Cental (SDC) fathe away. Data is witten locally as well as globally. A etieval equest queies the local cache, and on failue eads the SDC fathe away. Due to multiple caches and no emoval system it is impeative to have shot expie times locally othewise stale data could be etieved Wite Though (l localhost ) - WTL Simila to the above WTR, but the local memcache seve exists on the same webseve machine and intefaces though the faste socket inteface. 5 Compaisons We evaluate the above achitectue options by estimating latency, netwok usage, and available stoage space ove each memcache command using ou above descibed model and vaiables. Web application usage heavily detemines pefomance of any memcache system. Thus, given a usage scenaio, netwok model, envionment vaiables, and the above achitectue policies we can estimate the aveage memcache latency, netwok usage, and available stoage. This allows a level compaison between achitectues and lets us exploe how altenate envionment vaiables could impove o hinde pefomance. 5. Latency Fomulas wee deived which pedict the estimated latency fo each of the 7 equest types ove all achitectues given the netwok model and envionment vaiables. Fo example the set command would have a latency of l 2 unde SDC, while the SDS would be l local + because some potion of the keys would be local. SDR and Snoop would take l 3 because multiple sets can be issued simultaneously. Di equies a ound tip to the diectoy to lean about othe acks which may aleady contain the same key. Theefoe, on a set the othe acks must be cleaed of that key so the new data is used in the futue. Thus ps of the time the key is l local, and the othe potion it is 6
9 Figue 3: MediaWiki pofile unde diffeent switch speeds and ps values. l 3 in the non-duplicated case. Finally, the data can be set and a note sent to the diectoy. This esults in a latency of 2 l 2 + ps l local + ( ps)l 3 + l local. Wite Though (both vesions) can set in paallel but must wait fo both commands to etun, thus taking l 2 time. Appendix A povides fomulas fo pedicted latency of all 7 equest types ove all achitectues. With all fomula, weightings fo commands used, and envionment vaiables we can compae how each achitectue pefoms unde diffeent paametes. We fist look at how netwok switch(device) speed can effect pefomance. Remembe we assumed the numbe of devices linealy elates to netwok latency, so we vay the single device speed between 2.7µs and.85ms, with an additional ms OS delay, in the Figue 3 plots. Response time measues ound tip time, so a switch speed of ms would esult in a 2ms latency. Thee plots ae shown with ps values of 0%, 50%, and 90% with weightings deived fom ou MediaWiki pofile above. As seen in Figue 3, ps dives favoable pefomance fo many of these schemes. Next we take a close look at how ps changes esponse time in Figue 4 using a fixed switch latency of 0.925ms and ou MediaWiki usage pofile. Pedictibly all 3 location avese schemes (SDC, SDS, and SDR) exhibit no change in pefomance as ps inceases. Additionally, SDC is the best when ps = 0 due to all othes having added ovehead. As ps inceases the othe 5 schemes impove with Snoop and WTL pefoming bette than SDC. So fa we ve analyzed pefomance using MediaWiki s usage pofile. Now we look at the moe geneal case whee we split the 7 possible commands into two types: ead and wite, whee ead consists of a get equest hit o miss, and wite is any command which changes data. MediaWiki had 60% eads, o 6 eads pe 4 wites. Figue 5 vaies the ead/wite atio while looking at thee ps values. 5.2 Netwok Usage While low latency is ou end goal, analyzing netwok usage is also impotant to pedict hotspots o moe cost-effective configuations. Recall ou assumed sta netwok topology. Webseves ae put in acks possibly including a memcache seve, with each ack connected to a backbone. A cental memcache seve may exist on the backbone. Hee we discuss the pedict the total bytes tansfeed fo the backbone switch compaed to SDC. Fewe bytes tansfeed equates to fewe packets, meaning less usage. We ignoe ack switch analysis fo most schemes since lowe backbone usage usually equates to lowe ack switch usage SDC In the typical situation a single (o cluste of) memcache seve sits on the backbone which sevices all equests. All equests and data must theefoe pass though the ack switch as well the backbone switch. 7
10 Figue 4: MediaWiki pofile unde diffeent ps values. Figue 5: Vaying ead/wite atio and ps values. 8
11 Depending on the numbe of webseves, the memcache link(s) may become a bottleneck as all taffic is funneled though them SDS Since object placement is not location awae, the majoity ( ) of data will still pass though the ack and backbone switch. Unfotunately each ack switch will handle twice the memcache load the majoity of the time ( ) as each equest will leave one ack and ente anothe. The emaining / will only pass though one switch SDR Lacking a location awae policy, the majoity of data ( ) will pass though the ack and backbone switch. Each wite will put k times (eplication value) as much load on all switches. Reads ae the same, though possibly local due to clients having an option whee to quey the data (choose least loaded o closest) Snoop This achitectue is location awae and will stoe data close to whee the the stoe was issued. The downside to this scheme is each set causes a stoe command note to be sent to all acks. Luckily a set command s data is stoed in its own ack s memcache seve, thus bypassing the backbone switch. Depending on the ps value of the application, eads can eithe be identical to SDS (all infomation passing though the backbone and two ack switches) when ps = 0, to the exteme ps = of no ead using the backbone because it can be seviced locally. To pedict backbone switch usage of Snoop we develop the following atio of total backbone taffic to that of SDC fo both ead and wite: o w ( ps) size object + ( w) size message size object w ( ps) + ( w) size message size object Fo example, in ou MediaWiki scenaio we calculate a 94% decease in backbone taffic using the following paametes with Snoop ove SDC: size message 20 (bytes) size object 5 (Kbytes) ps 0.9 w Clealy the diffeence between message, object size, and numbe of acks is impotant. Fo a wite in Snoop to have equivalent load on the backbone switch we have the following equality, size message = size object. Given ou values above we could have 750 acks befoe a wite is equivalent. A small message, lage objects, an application that uses moe eads, o a highe ps value will offe lowe netwok usage in this achitectue Di Since objects ae stoed close to whee they wee changed, the ps value geatly influences the oveall netwok load. Fo a ps value of no object data need coss the backbone switch, with only a single message sent to the epositoy pe change, athe than one message pe ack fo the Snooping inspied. Simila to Snoop, when ps = 0 all objects tavese the backbone. On a local memcache miss the epositoy will be queied, adding some additional netwok load, though all object location messages should be less than 20 bytes and thus smalle than the aveage object. The k option, whee multiple object copies ae stoed, will have slightly less backbone fo eads due to additional copies being local to some queies. 9
12 5.2.6 Wite Though Both vesions, WTR & WTL, pefom identically to the SDC in the wost case, o on statup, but as moe local copies ae stoed we d expect backbone usage to decease fo eads. Pefomance is quite difficult to pedict due to individual key ead/wite atios, local lowe expiation values, and global expiation values, plus oveall memcache usage. In the best case we d expect the backbone to cay each key s change, as well as a single quey fo each ack to fill its local vesion (ps = 0), o only a single ack if ps =. 5.3 Available Stoage Space Each achitectue exhibits diffeent pefomance, but at what additional hadwae cost to stoe the same amount of data? Hee we analyze available space fo each achitectue SDC This seves as ou baseline metic. No exta meta-data is stoed, so all available space is utilized fo object stoage. We ignoe intenal memcache efficiencies as these may change ove time SDS The only diffeence between this and Nomal Rack is the location of memcache seves, thus no exta infomation is stoed. 00% efficiencey compaed to SDC SDR Duplicating data educes available space. With a specific k value (eplication value), we aive at a utilization value of k 00% efficiency compaed to SDC. Fo example with k = 3, you would need thee times the the stoage space to stoe the same amount of data as a SDC Snoop Snoop s stoage of messages educes the efficiency of this achitectue. Fo values of size object, size message, and we aive at the following stoage efficiency fomula: size object size message ( ) + size object = Snoop efficiency compaed to SDC Fo example in ou MediaWiki case whee size object = 5Kb, size message = 20b, and = 0, we aive at an efficiency of 98%, baely enough to waant additional hadwae ove using SDC. Again, a lage aveage data size compaed to message size will incease efficiency Diectoy Inspied Rathe than stoe many messages though out the system like Snoop, Diectoy Inspied only stoes a single note in a cental location, inceasing stoage efficiency futhe. and if some k duplication is used, size object size message + size object = Di efficiency compaed to SDC size object size message + k size object = Di k efficiency compaed to SDC With the same MediaWiki 0 ack example a non-duplicated diectoy configuation has an efficiency of 99%, while simple duplication (k = 2), gives a value of 49%. 0
13 5.3.6 Wite Though Figue 6: Vaying ead/wite atio and ps values with an East and West coast DC Many factos influence the pefomance of wite-though (WTR & WTL), such as w, expiation values, and individual key ead/wite ations, as well as the fact that local stoage will neve be used fo pimay object stoage and thus is only useful fo educing netwok load and latency. Thus, the efficiency is given by the simple fomula: SDC Stoage Space SDC Stoage Space + Rack Stoage Space 6 Discussion & Futue Wok 6. Race Conditions As with any distibuted stoage system ace conditions must be addessed. Luckily fo ou achitectues, and memcache in geneal, eos ae allowed to occu. Data is not guaanteed to be pemanent, o coect, and as a esult geat speed can be gained. Applications using memcache must be awae of its limitations and deal with failues when they occu, usually by equesting the data fom a eliable souce and e-setting the object in memcache. As mentioned befoe, implementation changes can be used to minimize conflicts in specific achitectues. 6.2 Multi-Datacente Case Thus fa we have assumed a Memcache installation within the same datacente, with appopiate estimates on latency. In geneal unning a standad memcache cluste spanning datacentes is not ecommended due to high (elative) latencies and expensive bandwidth. The location-avese achitectues, SDC, SDS, and patly SDR would not be good choices fo this eason. We can apply ou same analysis to the multidatacente situation by viewing the datacente as a ack, with a high l 3, though ealistic, value fo intadatacente latency. SDC is no longe possible with its l 2 latency, with SDS taking its place as the typical off-the-shelf achitectue. If we assume a l 3 value of 40ms, a best case CA to NY latency, with l = 4ms inside the datacente, we aive at Figue 6 giving aveage latencies between the diffeent achitectues ove diffeent ps and ead/wite atios. Fo Di s diectoy we assume it spans both datacentes like SDS. Hee the diffeence between locality awae and avese is moe ponounced. Snoop, Di(k), and WTR ae able to outpefom SDC fo most cases except high wite volume and low ps values. SDR pefoms pooly due to consistency checks between the two copies. Inteestingly as moe datacentes ae added SDC becomes wose due to a highe popotion of data being fathe away while the location awae achitectues can keep it close.
14 Regadless of the lowe latencies ove a standad deployment in the multi-datacente case, caching may not be beneficial ove many isolated caches. 6.3 Selective Replication Replication of a elational database can incease pefomance by distibuting eads. Unfotunately entie tables must be eplicated, possibly including seldom used data. In a key/value system such as Memcache eplication can offe speed benefits as we saw in SDR. We looked at the static case whee all data is eplicated, but why not selectively eplicate fequently used data so we don t waste space? As mentioned in the Snoop desciption, data could be pobabilistically copied locally. Thus, fequently used but infequently changed data would be eplicated allowing fast local eads. Unused Memcache memoy is a waste, so by changing the pobability of eplication on the fly memoy could be used moe optimally. We intend to investigate this in futhe wok. 6.4 Object Expiation In Memcache, if the allocated memoy is consumed objects ae geneally emoved in a least-ecently-used manne. In a standad deployment this woks well, but in ou case whee meta infomation is sepaate fo the data a possibility exists whee meta expiation may cause a miss followed by a set on an aleady stessed node. Adjusting expie times, o modifying Memcache to etun the set expie time could alleviate this issue by pobabilistically etuning a miss when the expie time is nea zeo. This would have the added benefit of placing the subsequent set on a heavily accessed node and place the data close to whee it is used the most. 6.5 Use Space Caching As mentioned in Section 2, the Memcache seve is a sepaate pocess even when used on the same machine as the client. Inte-pocess communication is theefoe necessay, eithe though the loopback o file socket intefaces. Eithe way, tanspotation costs ae incued. By moving the memcache seve, o emulating it, within the same pocess space as the client the tanspotation costs could be eliminated. Object seialization ovehead may also be educed. We plan on investigating this option futhe. 6.6 Oveflow Memcache s standad deployments (SDC,SDS, SDR) all behave well when they each memoy satuation by emoving objects evenly in a least-ecently-used manne due to the hashing stategy. Ou location awae achitectues (Snoop & Di) may ove-stess some acks by stoing all objects on them while neaby acks emain empty. While possible, this situation should not become a poblem as long as web equests ae evenly spead acoss all web seves. Thus, the cache as a whole should not be filled fom a single client, but athe fom each ack. 7 Related Wok Memcache is pat of a lage key/value NoSQL data movement which povides enhanced pefomance ove elational databases by elaxing ACID guaantees. One way key/value systems can scale well is by using a hashing system based on the key to uniquely identify an object s stoage location. To achieve localeawae caching we must use some othe key/location mapping system. Hee we discuss simila systems to Memcache and concentate on those which has some locality component. The Hadoop Distibuted File System [2] is designed to manage distibuted applications ove extemely lage data sets while using commodity hadwae. They employ a ack-awae placement policy able to place data eplicas to impove data eliability, availability, and netwok bandwidth utilization ove andom placement. Reads can ead fom a close copy athe than a emote one. Additionally they identify bandwidth limitations between acks, with inta-ack faste, suppoting ou achitectues. Thei manta of Moving 2
15 Computation is Cheape than Moving Data woks fo lage data sets, but in ou web case we can wite the data close to whee it will be used instead. File meta-data is stoed and managed in a cental location simila to ou Di achitectues. Cassanda can also use a ack and datacente awae eplication stategy [] fo bette eliability and to ead locally. This is convenient when multiple datacentes ae used so a ead will neve quey a emote data cente. Voldemot uses a simila system fo eplicas using zones [9] [2]. While the above thee systems use some locality awae policy fo eplicas they all use a hashing stategy fo pimay stoage, thus possibly witing the data fa fom whee it will be used. We plan on investigating weathe locality awae pimay stoage could be beneficial to these systems, o some mixtue. Micosoft s AppFabic povides vey simila sevices to Memcache with in-memoy seializable object stoage acoss many computes using key/value lookup and stoage [8]. No mention of key hashing is given to locate data, though they do mention a outing table to locate data simila in pactice to ou Snoop achitectue. No mention of how this table is updated. Thei outing table enties efeence a specific cache instance, wheeas ou Snoop note efes to a hash space, o ack, possibly containing thousands of memcache instances, theeby giving moe stoage space and flexibility. Duability can be added by configuing backup nodes to eplicate data, though unlike ou achitectues all eads go to a single node until it fails, unlike ous whee any copy can be ead. EHCACHE Teacotta is a cache system fo Java, containing a BigMemoy module which pemits seializable objects to be stoed in memoy ove many seves. Java s gabage collection (GC) can become a bottleneck fo lage in-application caching, thus a non-gabage collected self-managed cache system can use lage amounts of memoy while ignoing typical Java GC issues. Essentially BigMemoy implements a key/value stoe using key hashing fo Java objects simila to the Memcache client and seve. Unlike memcache, it allows configuations othe than the standad memcache case. Fo example it allows a ead and wite though mode, backed by a duable key/value stoage system, theeby emoving all cache decisions fom the application code. Replication is done by default (2 copies) fo availability, with moe available. Additionally, it can delay witing to the duable stoe fo faste appaent wite speed. Simila to ou wok, a small local cache can be maintained, with many policies available. [] 8 Conclusion We ve seen that when a web application has a high ps value, many eads pe wite, o slow netwoking equipment, a location-awae Memcache achitectues can lowe latency and netwok usage without significantly educing available space. Ou example application, MediaWiki, showed that a significant amount of keys and data is session specific and thus can exploit such achitectues. Ou tool, MemcacheTach, can be used to measue a web application s detailed Memcache usage to estimate pefomance with altenate achitectues unde a simple model. As web applications gow, and thei use base becomes moe geogaphically divese, the need fo systems which can keep latencies low fo all uses is needed. Ou poposed efomulation of multi-pocesso cache systems fo Memcache show that bette pefomance can be cuently gained within the web datacente unde cetain cicumstances, with futhe gains found fo moe geogaphically distibuted data centes ove cuent techniques. Refeences [] N. Bailey. Fontpage - cassanda wiki, [2] D. Bothaku. Hdfs achitectue guide, design.html#data+blocks. [3] S. Cheshie. It s the latency, stupid, [4] J. L. Hennessy and D. A. Patteson. Compute Achitectue, Fouth Edition: A Quantitative Appoach. Mogan Kaufmann Publishes Inc., San Fancisco, CA, USA, [5] K. Inc. epcached - add data eplication featue to memcached, 3
16 [6] R. Inc. Latency on a switched ethenet netwok, notes/latency_on_a_switched_ethenet_netwok.pdf. [7] mediawiki. Mediawiki, [8] A. N. Nithya Sampathkuma, Mualidha Kishnapasad. Intoduction to caching with windows seve appfabic, [9] sumbaly. Voldemot topology awaeness capability, wiki/topology-awaeness-capability, 20. [0] P. Saab. Scaling memcached at facebook, , [] I. Teacotta. Ehcache documentation cache-topologies, distibuted_caching.html. [2] P. Voldemot. Poject voldemot, A Latency Costs ove each Memcache command fo each Achitectue See Section 3.2 fo vaiable definitions. 4
17 Nomal Nom Spead Replicate Snoop Di Di k WT Set l 2 l local + l 3 l 3 2 l 2 + l 3 2 l 2 + l 3 + max(l local, l 2 ) l local Add l 2 l local + 2 l local l 2 l 2 ps l local + hit ( ps) (l 2 + l local ) Add l 2 l local + 2 l local + l 3 l 2 + l local l 2 + l 3 l local + l 2 miss Replace l 2 l local + 2 l local + ps l 2 + ps l 2 + l 3 l local + l 2 hit l local + ( l local + ( ps) ps) Replace l 2 l local + 2 l local l 2 l 2 l local + l 2 miss CAS l 2 l local + 2 l local + ps 2 l 2 + l 3 2 l 2 + l 3 l local + l 2 hit l local + ( match ps) CAS l 2 l local + l 3 l local + ps l 2 l 2 l 2 hit no l local + ( ps) CAS l 2 l local + l 3 l local l 2 l 2 l 2 miss Delete l 2 l local + l 3 l 3 2 l 2 + ps 2 l 2 + l 3 max(l local, l 2 ) hit l local + ( ps)l 3 Delete l 2 l local + l 3 l 3 l 2 l 2 max(l local, l 2 ) miss Inc hit l 2 l local + 2 l local + ps ps l local + l 2 + l 3 l local + l 2 l local + ( ( ps)(l 2 + ps) l 3 ) Inc l 2 l local + l 3 l local l 2 l 2 l 2 miss Dec hit l 2 l local + 2 l 3 ps l local + l 2 + l 3 l local + l 2 ( ps)(l 2 + l 3 ) Dec l 2 l local + l 3 l local l local + l 2 l local + l 2 l 2 miss Flush l 2 l local + l 3 l 3 l 3 l 3 l 2 Get hit l 2 l n local + l local + ( l local + ( l local + ( ps l local + l local + ps) ps)(l 2 + l 3 ) ps)(l 2 + l 3 ) ( ps) (l 2 + n l local ) Get miss l 2 l local + k l local l local + l 2 l local + l 2 l local + l 2 5
Any modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationLecture 8 Introduction to Pipelines Adapated from slides by David Patterson
Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationdc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc
- CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationMultidimensional Testing
Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationDynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing
IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationComparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters
Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,
More informationUsing SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC
Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;
More informationAccelerating Storage with RDMA Max Gurtovoy Mellanox Technologies
Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationCOEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines
1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep
More informationLecture #22 Pipelining II, Cache I
inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationCOSC 6385 Computer Architecture. - Pipelining
COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationCS 2461: Computer Architecture 1 Program performance and High Performance Processors
Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes
CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationModeling a shared medium access node with QoS distinction
Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationGARBAGE COLLECTION METHODS. Hanan Samet
gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationi-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA
i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationPipes, connections, channels and multiplexors
Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok
More informationAdministrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20
Administivia CMSC 411 Compute Systems Achitectue Lectue 5 Basic Pipelining (cont.) Alan Sussman als@cs.umd.edu as@csu dedu Homewok poblems fo Unit 1 due today Homewok poblems fo Unit 3 posted soon CMSC
More informationCLOUD based storage systems are emerging to gain significant
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2017 221 On the Latency and Enegy Efficiency of Distibuted Stoage Systems Akshay Kuma, Student Membe, IEEE, Ravi Tandon, Membe, IEEE, and
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationCS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia
CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationWorst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics
Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More information4.2. Co-terminal and Related Angles. Investigate
.2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationAn Optimised Density Based Clustering Algorithm
Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,
More informationComputer Science 141 Computing Hardware
Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationDynamic Processor Scheduling with Client Resources for Fast Multi-resolution WWW Image Browsing
Dynamic Pocesso Scheduling with Resouces fo Fast Multi-esolution WWW Image Bowsing Daniel Andesen, Tao Yang, David Watson, and Athanassios Poulakidas Depatment of Compute Science Univesity of Califonia
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationCISC 662 Graduate Computer Architecture Lecture 6 - Hazards
CISC 662 Gaduate Compute Achitectue Lectue 6 - Hazads Michela Taufe http://www.cis.udel.edu/~taufe/teaching/cis662f07 Powepoint Lectue Notes fom John Hennessy and David Patteson s: Compute Achitectue,
More informationEthernet PON (epon): Design and Analysis of an Optical Access Network.
Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu
More informationCoded Distributed Computing
Coded Distibuted Computing Salman Avestimeh USC joint wok with Songze Li (USC), Qian Yu (USC), and Mohammad Maddah-Ali (Bell-Labs) Asiloma Confeence Nov. 2016 Infastuctues fo (Big) Data Analytics How to
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationJournal of Network and Computer Applications
Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationA Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes
Poceedings of ACOUSTICS 6 - Novembe 6, Chistchuch, New Zealand A Consistent, Use Fiendly Inteface fo Running a Vaiety of Undewate Acoustic Popagation Codes Alec J Duncan, Amos L Maggi Cente fo Maine Science
More information