THE deployment of router-based IP multicast has been

Size: px
Start display at page:

Download "THE deployment of router-based IP multicast has been"

Transcription

1 88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad Ye Xia Abstract Applicatio-level multicast is a promisig alterative to IP multicast due to its idepedece from the IP routig ifrastrucre ad its flexibility i costructig the delivery trees. The existig overlay multicast systems either support a sigle data source or have high maiteace overhead whe multiple sources are allowed. They are iefficiet for applicatios that require ay-source multicast with varied host capacities ad dyamic membership. This paper proposes ACOM, a ay-source capacity-costraied overlay multicast system, cosistig of three distributed multicast algorithms o top of a o-dht overlay etwork with simple strucres (radom overlay with a o-dht rig) that are easy to maage as odes joi ad depart. The odes have differet capacities, ad they ca support differet umbers of direct childre durig a multicast sessio. No explicit multicast trees are maitaied o top of the overlay. The distributed executio of the algorithms arally defies a implicit, roughly balaced, capacity-costraied multicast tree for each source ode. We prove that the system ca deliver a multicast message from ay source to all odes i expected Oðlog c Þ hops, which is asymptotically optimal, where c is the average ode capacity ad is the umber of members i a multicast group. Idex Terms Ay-source overlay multicast, peer-to-peer etworks, distributed multicast algorithms. Ç INTRODUCTION THE deploymet of router-based IP multicast has bee slow due to the requiremet for global deploymet of multicast-capable routers, the lack of ISP support, ad the state scalability problem caused by a large umber of multicast groups. Applicatio-level multicast becomes a promisig alterative that ca be quickly deployed without the depedecy o the router ifrastrucre [], [2], [3], [4]. Recet papers [5], [6], [7], [8], [9], [0] sdied overlay multicast from differet aspects. However, they are isufficiet i supportig applicatios that require aysource multicast with varied host capacities ad dyamic membership. May works focus o desigig a optimized overlay multicast tree for a sigle data source [], [2], [3], [4]. They are suitable for video or software distributio but ot for distributed games, telecoferecig, viral classrooms (discussio sessios), or multimedia chat groups, where may or all odes ca potetially be the data sources at ay time. A multicast tree that is optimal for oe source may be bad for other sources. O the other had, oe tree per member will be too costly. To add to the problems, member hosts may vary widely i their capacities i terms of upload badwidth, memory, ad CPU power. Some are able to support a large umber of direct childre, but others support few. Furthermore, members may joi ad leave at ay time, which makes the maiteace of the overlay etwork ad the multicast trees. S. Che is with the Network Ceter, Uiversity of Shaghai for Sciece ad Techology, Shaghai, , Chia. chesp@usst.edu.c.. B. Shi is with the Departmet of Computer ad Iformatio Techology, FuDa Uiversity, Shaghai, , Chia. bshi@fuda.edu.c.. S. Che ad Y. Xia are with the Departmet of Computer ad Iformatio Sciece ad Egieerig, Uiversity of Florida, Gaiesville, FL {sgche, yx}@cise.ufl.edu. Mauscript received 2 Nov. 2005; revised 7 Jue 2006; accepted 0 July 2006; published olie 9 Ja Recommeded for acceptace by Y. Pa. For iformatio o obtaiig reprits of this article, please sed to: tpds@computer.org, ad referece IEEECS Log Number TPDS Digital Object Idetifier o. 0.09/TPDS a critical issue. Fially, the system should be fully distributed ad scalable to a large Iteret group. The goal of this paper is to sdy low-maiteace overlay systems that support distributed applicatios requirig ay-source capacity-costraied multicast with dyamic membership. Noe of the existig systems to be surveyed i the ext sectio meets all these requiremets. I order to hadle ay-source multicast i dyamic groups, ovel proposals were made to implemet multicast o top of strucred P2P etworks [5], [6], [7]. However, the overhead of maitaiig DHT-based multicast overlays is a major desig cocer [8]. Moreover, these systems assume each ode has the same umber of childre. Host heterogeeity is ot addressed. Eve though overlay multicast ca be implemeted o top of overlay uicast, they have very differet requiremets. I overlay uicast, low-capacity odes affect oly traffic passig through them ad, therefore, they create bottleecks of limited impact. I overlay multicast, all traffic will pass all odes i the group ad the multicast throughput is decided by the ode with the smallest throughput, particularly i the case of reliable delivery. The strategy of assigig a equal umber of childre to each itermediate ode is far from optimal. If the umber of childre is set too big, the low-capacity odes will be overloaded, which slows dow the etire sessio. If the umber of childre is set too small, the highcapacity odes will be uderutilized. CAM-Chord [9], a multicast extesio of Chord, allows odes to have a differet umber of eighbors. It achieves roughly balaced multicast trees, which helps reduce both delay ad delay jitter, but its maiteace overhead is large for highly dyamic multicast groups. This paper proposes ACOM, a ay-source capacitycostraied overlay multicast service, cosistig of three distributed multicast algorithms o top of a o-dht overlay etwork with simple strucres (radom overlay with a o- DHT rig) that are easy to maage as odes joi ad depart. At rutime, the distributed executio of a proposed algorithm arally defies a implicit, roughly balaced, capacity-costraied multicast tree for deliverig a message /07/$25.00 ß 2007 IEEE Published by the IEEE Computer Society

2 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 89 from a arbitrary source ode. No explicit multicast trees are built ad maitaied. I ACOM, the odes may have differet capacities ad the umbers of direct childre that they ca support i a multicast sessio may vary. Each ode keeps a umber of radom eighbors equal to its capacity. We prove that the system ca deliver a multicast message from ay source to all odes i a expected Oðlog c Þ hops, which is asymptotically optimal, where c is the average ode capacity ad is the umber of members i a multicast group. I compariso, CAM-Chord requires Oðlog c Þ times more eighbors per ode. Our observatio is that the DHT-based overlay strucres desiged for file lookup are ot optimal for multicast; other, simpler strucres should be explored. We perform extesive simulatios to evaluate the performace of the proposed system, ad we provide detailed discussios o a variety of implemetatio issues, icludig how to maitai the overlay, how to measure the system parameters, ad how to hadle low-capacity odes, proximity, as well as dyamic capacities. The rest of the paper is orgaized as follows: Sectio 2 discusses the related work. Sectio 3 defies the problem ad the etwork model. Sectio 4 motivates our approach, gives a basic versio of the distributed multicast algorithm, ad provides a thorough aalysis. Sectio 5 discusses the implemetatio issues. Sectio 6 describes two improved multicast algorithms. Sectio 7 presets the simulatio results. Sectio 8 draws the coclusio. 2 RELATED WORK Shi et al. proved that costructig a miimum-diameter degree-limited spaig tree is NP-hard [20]. Note that the terms degree ad capacity are iterchageable i the cotext of this paper. Cetralized heuristic algorithms were proposed to balace multicast traffic amog multicast service odes (MSNs) ad to maitai low ed-to-ed latecy [20], [2]. The algorithms do ot address the dyamic membership problem, i.e., MSN joi/deparre. A umber of overlay multicast systems have bee proposed to optimize a sigle-source multicast tree. Bullet [] is desiged to improve the throughput of data dissemiatio from oe source to a group of receivers. A overlay tree rooted at the source is first established. Disjoit data objects are delivered from the source via the tree to differet receivers. The receivers the commuicate amog themselves to retrieve the missig objects. The direct commuicatio betwee receivers adds more badwidth to the tree dissemiatio. Overlay Multicast Network Ifrastrucre (OMNI) [2] dyamically adapts its degree-costraied multicast tree to miimize the latecies to the etire cliet set. Riabov ad Zhe Liu proposed a cetralized costatfactor approximatio algorithm for the problem of costructig a sigle-source degree-costraied miimumdelay multicast tree [3]. Yamaguchi et al. described a distributed algorithm that maitais a degree-costraied delay-sesitive multicast tree for a dyamic group [4]. The above algorithms are desiged for a sigle source. They are ot suitable for multisource scearios (e.g., distributed games ad multimedia chat groups), which are the target applicatios of this paper. Buildig oe tree for each possible source is too costly. Usig a sigle tree for all sources is also problematic. First, a miimum-delay tree for oe source may ot be a miimum-delay tree for other sources. Secod, the sigle-tree approach cocetrates the traffic o the liks of the tree. Third, a sigle tree may be partitioed beyod repair for a dyamic group. Bayeux [5] ad Borg [6] were proposed to support applicatio-level multicast based o Tapestry [22] ad Pastry [23], respectively, ad CAN-based Multicast [7] was implemeted o top of CAN [24]. El-Asary et al. sdied efficiet broadcast i a Chord etwork, ad their approach ca be adapted for the purpose of multicast [25]. Castro et al. compares the performace of tree-based ad floodig-based multicast i CAN-style versus Pastry-style overlay etworks [8]. Oe of the coclusios is that the overhead of maitaiig DHT-based multicast overlays is a major desig cocer. With each ode havig the same umber of childre, the above systems do ot cosider the heterogeeity i host capacities. 3 MODEL Cosider a multicast group G of odes. Each ode x 2 G has a capacity c x, specifyig the umber of direct child odes to which x is willig to forward the received multicast messages. The value of c x should be made roughly proportioal to the upload badwidth of ode x. The upload badwidth is likely to be the bottleeck because the commo cable-modem or DSL liks are highly asymmetric ad biased agaist upload. Moreover, a ode x may have to forward c x copies for each received message. I a heterogeeous eviromet, the capacities of differet odes may vary i a wide rage. The capacity of the same ode may also chage over time (Sectio 5.6). We wat to costruct a multicast service, which meets the capacity costraits of all odes, allows frequet membership chages, ad delivers multicast messages from ay source to the group members via a dyamic, balaced multicast tree. To achieve this goal, a overlay etwork is established for each multicast group, which trasforms the multicast problem to a broadcast oe withi the scope of the overlay. A sigle delivery tree for all data sources is ot a good idea because it cocetrates traffic o a small umber of overlay liks. O the other had, oe tree per source is too costly to maitai for highly dyamic groups. A ideal approach is to use implicit per-source multicast trees that are ot explicitly built ad thus icur o maiteace overhead. These implicit trees chage arally at zero cost as the overlay topology chages. Before presetig how this ca be achieved, we shall describe the o-dht (Distributed Hash Table) overlay etwork that we use. The overlay etwork cosists of two compoets. Oe is a urestricted rig that coects all odes. The other is a radom graph amog the odes. The urestricted rig is fudametally differet from the DHT-based rig foud i may strucred P2P etworks. I the DHT-based rig, each ode has a specific locatio, which makes the maiteace of the rig difficult whe a ew ode jois the etwork. I the urestricted rig, a ode ca be aywhere i the rig. The rig maiteace is trivial. Each ode keeps the ext ode o the rig as oe of its eighbors, called the successor. As log as a ew ode x kows aother ode z that is already i the rig, it iforms z to set x as the successor, ad the it sets its ow successor to be z s previous successor. I additio to the successor, a ode x has c x or more other eighbors radomly selected from the set of odes. Details about topology maiteace ad proximity will be discussed later i Sectio 5. We assume that x is willig to support both the successor ad the. These copies follow differet Iteret paths to their respective destiatios, which makes the upload lik of x the oly shared bottleeck.

3 90 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 c x radom eighbors as its childre i a multicast sessio. A TCP coectio is established betwee two eighbors for data ad cotrol commuicatio. Whe there is o data commuicatio, TCP trasmits keep-alive segmets. The deparre of a eighbor is detected whe the TCP coectio times out due to the lack of keep-alive segmets. To prevet the rig from beig broke after a abrupt ode deparre, each ode should also kow a umber of odes after the successor dow the rig. It also kows the previous ode o the rig, called the predecessor. However, these odes will ot be used as eighbors for data commuicatio. I the existig literare, the strucred P2P etworks all use DHT, ad the ustrucred P2P etworks do ot use DHT. I this sese, our overlay etwork belogs to the ustrucred category. O the other had, it does have (o- DHT) strucres, a rig, ad a radom etwork. We may reclassify P2P etworks i three categories, DHT-based strucred, o-dht strucred, ad ustrucred, with the secod category icludig all P2P etworks that do ot use DHT but have topological strucres, ad the third category icludig all P2P etworks that assume arbitrary topologies. 4 ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST 4. Motivatio Radom Walk, Limited Floodig, ad Probabilistic Floodig. A overlay etwork for multicast is fudametally differet from a overlay etwork for file sharig such as Gutella or Kazaa. I file-sharig applicatios, the existig approaches of radom walk, limited floodig, ad probabilistic floodig work well whe the searched object has may copies stored i dispersed locatios of the etwork. Searchig oly a small portio of the odes will r up the object with a good probability. Missig a existig object with a small probability is ot cosidered to be a serious problem. For multicast, the requiremet is differet. A overlay etwork is costructed amog the odes of a multicast group. Multicast is implemeted as broadcast. Every ode of the group is supposed to receive a copy of every message, which either radom walk or limited floodig ca guaratee. By forwardig a message (received for the first time) to eighbors with a certai probability, the approach of probabilistic floodig also caot guaratee reachig every ode, eve whe the overlay topology itself is coected. Efficiet broadcastig i a o-dht overlay has bee a challegig problem. Hop Complexity ad Commuicatio Complexity. We itroduce two performace metrics for overlay multicastig with odes havig differet capacities. Let c be the average ode capacity. Other performace cosideratios will be discussed later. The hop complexity is defied as the expected umber of overlay hops it takes for a multicast message to reach ay ode. The commuicatio complexity is the expected umber of copies of a multicast message that are trasmitted i order to esure that the message is delivered to all odes. Wheever a ode forwards a message to a eighbor, that couts as oe copy. A smaller hop complexity meas a more balaced multicast tree ad a smaller average delivery latecy. A smaller commuicatio complexity meas less etwork badwidth cosumed. I the followig, we use two multicast schemes to demostrate a trade-off betwee these two complexities. Oe complexity ca be optimized at the expese of the other. TABLE Compariso of Complexities Full Floodig. I this scheme, each ode forwards a message to its radom eighbors whe the message is received for the first time. It ca be show that ) the hop complexity is Oðlog c Þ, which is optimal because floodig follows the shortest paths, ad 2) the commuicatio complexity is c, with each ode x forwardig c x copies. Rig Traversal. O the other ed of the spectrum, we ca achieve the best commuicatio complexity of by forwardig a message alog the rig that serially coects all odes. However, the hop complexity is =2, which is the worst amog all schemes. ACOM. We demostrate that there are other alteratives betwee these two extremes. I particular, we desig a multicast scheme, called ACOM, that realizes a favorable trade-off betwee the hop complexity ad the commuicatio complexity. It achieves asymptotically optimal hop complexity of Oðlog c Þ at suboptimal commuicatio complexity of þ Oð log c Þ. A quick referece to the complexity compariso is give Table. 4.2 Idea Give the overlay topology defied i Sectio 3, we wat to desig a multicast routie such that. it ca deliver a message from ay source to every ode, 2. its hop complexity is Oðlog c Þ, which is asymptotically optimal, 3. its commuicatio complexity is close to, which is optimal, ad 4. it does so without buildig ad maitaiig explicit multicast trees o top of the overlay. The idea is to perform two-phase multicast. Phase oe is partial radom distributio, ad phase two is segmeted rig traversal. Combied, they defie implicit per-source trees that are embedded i the strucre of the existig overlay without additioal cost. These implicit trees are roughly balaced ad capacity-costraied. They are differet for each source ad, cosequetly, spread the workload to as may overlay liks as possible. Because we do ot establish ay explicit multicast tree, we avoid the problem (ad the overhead) of tree maiteace o top of the uderlyig overlay etwork. Phase oe. It forwards the message via radom eighbors to odes withi K hops from the source, where K is a system parameter that will be determied later. This phase delivers the message to a subset of odes that are radomly located across the etwork. They are called phase-oe odes. A illustratio is give by the first two plots of Fig.. Suppose the capacity of the source ode s is 3 ad the capacities of odes i, j, ad l are 2, 2, ad 3, respectively. I

4 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 9 Fig.. Two-phase multicast. phase oe, the message is delivered to 0 odes i a tree strucre, where the umber of childre of a ode is costraied by its capacity. Phase two. Each phase-oe ode will deliver the message to its eighborhood. If we had used the traditioal cocept of a eighborhood cosistig of odes withi a certai umber of hops away, phase two would become distributed limited floodig performed by all phase-oe odes. I order to cover the etire etwork, the phase-oe odes would have to flood the messages deep eough i their eighborhoods, causig overlaps where some odes would receive multiple copies of the message. To avoid this problem, we use the urestricted rig istead. The phaseoe odes partitio the rig ito segmets. As illustrated i the third plot of Fig., each phase-oe ode is resposible for oe adjacet segmet. It forwards the message to its successor, which further forwards the message to the successor s successor,..., util the message reaches a ode that has already received the message. The two phases are completely decetralized with o global coordiatio. Together, they deliver a message i a tree strucre, as illustrated i the fourth plot of Fig.. The tree follows the fabric of the uderlyig overlay etwork ad does ot eed maiteace. Phase oe restricts floodig i K hops. The problem with full floodig is at its fial stage whe most odes forward the message to eighbors that have already received the message. The segmeted rig traversal i phase two avoids such collisios while still esurig that every ode receives a copy of the message. If the value of K is small eough, the partial radom distributio i phase oe is likely to deliver the message to distictive radom odes, ad the probability of a ode receivig more tha oe copy will be small, which helps to reduce the commuicatio complexity. If the value of K is large eough, there will be eough phase-oe odes to partitio the rig ito small segmets, which reduces the hop complexity i phase two. These two coflictig requiremets o K lead to a iterestig questio. Ca we choose a right value for K such that the hop complexity is asymptotically optimal, Oðlog c Þ, ad the commuicatio complexity is close to? Nodes are allowed to have differet umbers of eighbors, which makes the questio more iterestig ad more realistic, but also much harder. Below, we first give a basic versio of the algorithm. Its simple strucre serves the purposes of brigig out the idea ad alleviatig aalysis from optimizatio details. We the aalyze the properties of the algorithm, address the implemetatio issues, ad, fially, discuss two improved versios of the algorithm. 4.3 Basic Algorithm (ACOM-) A multicast message is deoted as Mðk; idþ, where M is the message, k is the TTL field whose iitial value is K, ad id is a globally uique idetifier, cosistig of the source ID (e.g., IP address) ad a sequece umber. To deliver a multicast message, the source ode s begis by forwardig MðK;idÞ to c s radom eighbors. Whe a ode x receives Mðk; idþ, if it has ot received M with id before ad k>0, it decreases k by oe ad forwards the message to c x radom eighbors. If k ¼ 0, it oly forwards the message to its successor. The pseudocode of the algorithm is give i Fig. 2. The key questio is how to determie the value of K. For this purpose, we itroduce some otatios below that will also be used i the aalysis. I phase oe, whe a ode receives a multicast message for the first time, it forwards the message to its radom eighbors. Collectively, the message is delivered i a tree strucre, called the phase-oe tree, formed by radom eighbors. The depth of the tree is K. The source ode s is at level 0. Let q i be the umber of odes at level i. q 0 ¼, q ¼ c s, ad q i, i 2½2::KŠ, is a radom umber because the radom eighbors of odes at level ði Þ may overlap at level i. The umber of odes at levels zero through i i the phase-oe tree is Q i ¼ P i q j. The total umber of odes i the phase-oe tree is Q K. All of the leaves of the phase-oe tree are at level K. The umber of iteral odes is Q K. The umber of childre of a iteral ode is bouded by its capacity. Let c i;, c i;2,..., ad c i;qi be the capacities of the odes at level i. The summatio of the capacities of all iteral odes, plus oe for the source, i.e., þ P K P qi i¼0 c i;j, gives a upper boud for the tree size Q K. To avoid excessive duplicate receipts of the same message, our desig philosophy is for phase oe to reach oly a small fractio of odes i the Fig. 2. Basic algorithm (ACOM-).

5 92 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 multicast group. From those odes, the message is delivered i a circular fashio to reach all other odes i phase two. Therefore, we wat to choose K coservatively such that the tree size Q K is far smaller tha. Defie a system parameter as follows: X K i¼0 c i ¼ : characterizes the iteded percetage of odes i N that are covered by the phase-oe tree. We emphasize that is a system parameter that we pick. After we pick the value of, the value of K ca be calculated from (). Hece, the problem of determiig a appropriate value for K becomes the problem of determiig a appropriate value for. I the followig, we show that, if we choose ¼ ð log c Þ, the hop complexity will be Oðlog c Þ ad the commuicatio complexity will be þ Oð log c Þ. How to measure ad c will be addressed i Sectio Aalysis The mai aalytical results are give below. The ode capacities are ot fixed but, istead, are treated as radom variables, which makes the aalysis cosiderably tougher. The proofs ca be foud i the Appedix. Theorem (Hop Complexity). The expected umber of overlay hops for a multicast message to reach ay ode is bouded by log c ðþþ 2 : c c c Corollary (Hop Complexity). If ¼ ð log c Þ ad c 2, the the expected umber of overlay hops for a multicast message to reach ay ode is Oðlog c Þ. Theorem 2 (Commuicatio Complexity). The expected umber of copies of a multicast message that are trasmitted is bouded by ð þ Þ. Corollary 2 (Commuicatio Complexity). If ¼ ð log c Þ, the the expected umber of copies of a multicast message that are trasmitted is bouded by þ Oð log c Þ. 5 IMPLEMENTATION ISSUES 5. Maitaiig the Rig Ulike Chord [26], i our overlay etwork, there is o restrictio o where a ode should be placed o the rig. Whe a ew ode x jois the multicast group, it must kow a ode z that is already i the group. 2 x jois as z s successor, ad z s previous successor becomes x s successor. I compariso, Chord or most other DHT etworks must perform a lookup i order to determie the specific locatio where x ca joi i the etwork. 2. Whe a ode jois a P2P etwork, it must kow a existig ode i the overlay. The ode caot joi if it has zero clue about where the overlay etwork is. This requiremet is true for Gutella, Kazaa, or ay other P2P etwork. I the IP multicast, a ew member may query a directory server for the root of the multicast tree. I ACOM, a ew member may query the server for a existig ode i the overlay. The ower (creator) of a multicast group is a permaet member that is resposible for updatig the server with a umber of existig odes. ðþ As we discussed i Sectio 3, each ode kows a umber of odes after the successor dow the rig to prevet the rig from beig broke after the successor s abrupt deparre. This method was used by Chord to keep its successor rig from beig broke, ad it was iherited by other systems [27], [9] that used Chord s etwork maiteace protocols. I the rare case that all of those odes depart abruptly together, a broadcast is performed to idetify the odes that do ot have predecessors or successors so that they ca be coected to form a rig. 5.2 Establishig Radom Neighbors After a ew ode x jois the rig, it ca ask a multicast source s to help fid its c x radom eighbors. Whe s multicasts a message, it attaches c x tokes, cotaiig x s IP address. Each toke, piggybacked i the message, idepedetly chooses a radom path i the phase-oe tree, ad the traverses a rig segmet i phase two, durig which it will pick a radom ode from the segmet. More specifically, the toke tetatively picks the first ode of the segmet, sets L ¼, ad begis the segmet traversal. At each hop, L is icreased by oe ad the toke has a probability of =L of replacig the previously picked ode with the curret ode. At the ed of the rig segmet, the ode that is picked last is reported to x as a radom eighbor. Because a multicast message is received by every ode i the group, every ode will have a chace to be x s eighbor. As a low-probability special case i phase oe, whe a message carryig a toke arrives at a ode that has already received the message, the ode discards the message ad reports itself to x. Without the kowledge of a multicast source, whe x jois as z s successor, it ca ask z s help to fid radom eighbors. z seds out c x tokes. Each toke idepedetly performs a radom walk of Oðlog c Þ hops ad the reports the reached ode to x. I total, the tokes travel Oðc x log c Þ hops to fid c x radom eighbors. Whe a ode loses a radom eighbor (that departs), it adds a ew eighbor by radom walk. The eighbor liks are directed, which meas, eve if y is a radom eighbor of x, x may ot be a radom eighbor of y.i a radom etwork, each ode is expected to serve as a eighbor for roughly the same umber of other odes. Based o this observatio, we desig a simple optimizatio method to improve the radomess i eighbor selectio. Let I x be the set of odes for which x is a radom eighbor. x has the kowledge of I x. Periodically x exchages ji x j with its eighbors. If ji x j is greater tha the smallest ji y j value that x receives from eighbors y, x will iform a ode i I x to use y (with the smallest ji y j value) istead of x as a radom eighbor. This will gradually equalize ji x j ad ji y j. I additio, x selects a arbitrary eighbor z ad swaps a ode i I x with a ode i I z. All of the above commuicatio ca be piggybacked i the keep-alive messages betwee eighbors. 5.3 Estimatig ad c Because a multicast message will reach every ode, the measuremet of ca be carried out durig the process of multicast. Periodically, a multicast source piggybacks a flag i a multicast message. As the message with the flag is distributed, each ode temporarily remembers who the paret is. The ode cout iformatio is propagated backward from the ed odes of the Phase-two rig segmets back to the source ode, where the value of is

6 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 93 Fig. 3. Improved algorithm (ACOM-2). determied. The source ode the distributes to all other odes, piggybacked i the ext multicast message. To guard agaist some odes leavig the etwork durig the process, whe a ode x fids the coectio to a child ode is broke or it has t received the ode cout from the child after a timeout period, it will artificially assig that child the average ode cout reported by other childre mius oe (due to the deparre of that child). x will the report the total ode cout from all childre plus oe to its paret. To further improve the accuracy, the source may perform a umber of measuremets of i a period of time. It may also receive the measuremets from other sources. It will take the average measured value of durig that period as the ew estimatio of. The value of c is measured alog with. Together with the ode cout, the iformatio of the average ode capacity will also be propagated backward from the odes to the source. 5.4 Group Members with Very Small Upload Badwidth A ode x with very small upload badwidth should oly be a leaf i the implicit multicast trees ulessit is the data source. I order to make sure that we do ot select x as a itermediate ode i ay phase-oe tree, x should ot be a regular member of the overlay etwork. Istead, it jois as a exteral member. x asksaode y kowto be i the overlay to perform aradom walk of Oðlog c Þ hops to idetify a radom ode z. x the attempts to joi z as a exteral member. If z caot support x, z forwards x to successorðzþ. Ifz admits x as a exteral member, z will forward the received multicast messages to x ad x will multicast its messages via z.ifz leaves the group, x must rejoi via aother ode i the overlay. 5.5 Proximity The purpose of phase oe is to spread a message across the etire etwork such that each regio is likely to receive a copy. Therefore, radom eighbors are desirable. I phase two, the message travels alog rig segmets. There is o restrictio o where a ode should be located o the rig. Hece, proximity measures ca come ito play. We wat to reduce the latecy of the overlay liks o the rig. Oe approach uses viral coordiates [28]. Whe a ew ode x jois the overlay, it pigs a set of ladmark machies. From the delays to the ladmarks, a set of viral coordiates are calculated. Whe c x radom walks are performed to idetify x s radom eighbors (Sectio 5.2), x s viral coordiates are carried. As a radom-walk cotrol message travels aroud, it fids the ode o its path that is closest to x based o the distace calculated from the viral coordiates. This ode is reported to x at the ed of the radom walk. Amog all reports, x picks the best oe to joi as its successor. 5.6 Dyamic Capacities The capacity of a ode does ot have to be fixed. It may chage as the ode s upload badwidth chages. Accordig to the algorithms i Figs. 2, 3, ad 4, a ode x forwards a multicast

7 94 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 aroud, the phase-oe tree should have levels 0 through bkcþ, but the ðbkcþþth level should have bee oly partially populated. Not all odes at level ðbkcþþ will be icluded i the tree. Istead, each ode at this level oly has a probability p of beig icluded. p is calculated below. Fig. 4. Ticket algorithm (ACOM-3). message to c x selected radom eighbors based o the curret value of c x, which may be differet for fure messages. If c x becomes greater tha the curret umber m of radom eighbors, the x will oly forward the message to the m eighbors. If c x is cosistetly greater tha m for a period of time, x will perform radom walks to add more eighbors. 5.7 Termiatig Duplicate Copies Cosider a ode x forwardig a message to a eighbor y. Oce y receives the message header, it kows whether the message has already bee received based o the message idetifier id. If this is a duplicate copy ad the message is very log, y immediately seds a cotrol message to x ad asks x to stop forwardig, which sigificatly reduces the overhead. 6 IMPROVED ALGORITHMS (ACOM-2 AND ACOM-3) By the desig of the algorithm ACOM-, a source ode first chooses a value for i the order of log c. For a estimated phase-oe tree size i the order of, we calculate K from () as follows: K ¼ log c ððc ÞþÞ: Because K may ot be a iteger, the source has to sed either MðbKc;idÞ or MðdKe;idÞ to iitiate the executio of the distributed algorithm ACOM- i Fig. 2. The roudig itroduces iaccuracy. If MðbKc;idÞ is used, the estimated size of the phase-oe tree is o loger. Istead, it is P bkc i¼0 ci, which ca be as small as c. O the other had, if MðdKe;idÞ is used, the estimated size of the phase-oe tree is P dke i¼0 ci, which ca be as large as c. To keep the tree size ð2þ X bkc i¼0 c i þ c bkcþ p ¼ ; p ¼ cbkcþ c : c bkcþ The source s seds out MðbKc;p;idÞ with a additioal field p. Whe a ode x receives a message Mð0;p;idÞ, it forwards the message to each of its c x radom eighbors with a probability p. This algorithm, called ACOM-2, is give i Fig. 3. Alteratively we ca use a differet cocept, called tickets, to cotrol the phase-oe tree size. Istead of usig a k field to carry the depth of the tree, we use a t field to carry the size of the tree. The message format is Mðt; idþ, where t is the umber of tickets, each represetig the permissio of icludig oe ode i the subtree rooted at the receiver of the message. The source ode seds out Mð ;idþ. Whe a ode x receives Mðt; idþ, it cosumes oe ticket by subtractig oe from t. It the evely distributes the remaiig tickets amog its c x childre at the ext level of the tree. The algorithm is called ACOM-3 ad is give i Fig. 4. Whereas gives a upper boud o the expected size of the phase-oe tree i ACOM- ad ACOM-2 accordig to Lemma 5, it sets the upper boud o the acal tree size i ACOM-3. 7 SIMULATION 7. Sep A overlay etwork is costructed amog 0,000 odes. We assume the odes come from all over the Iteret, rather tha beig clustered i a few places. I [29], Mukherjee foud that the ed-to-ed packet delay o the Iteret ca be modeled by a shifted Gamma distributio, which is a log-tail distributio. The shape parameter varies from approximately.0 durig low loads to 6.0 durig high loads o the backboe. I this paper, we set the shape parameter to be 4.0 ad the average packet delay to be 50 ms. 3 Because every ode ca be a potetial data source, we do ot maitai oe explicit multicast tree per ode. Istead, the multicast is performed (as broadcast) directly o top of the overlay etwork, cosistig of a radom graph ad a optioal augmeted rig, as described i Sectio 3. No cetral elemet is available to coordiate the overlay costructio or the multicast procedure. Nodes have differet capacities. Whe the average ode capacity is set to be c, the ode capacities are take from ½2; 2ðc ÞŠ with uiform probabilities. If ot specified otherwise, c ¼ 6 by default. We will vary the value of c i a wide rage i some simulatios. We implemet seve multicast algorithms ad their variats. The algorithms are floodig, probabilistic floodig, limited-degree (LD) floodig, ACOM- with bkc, ACOM-2, 3. Chagig the average packet delay i the simulatio will proportioally scale the curves i the latecy compariso, but will ot chage the shape of the latecy curves.

8 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 95 Fig. 5. Compariso of differet algorithms of traffic volume for deliverig oe multicast message. ACOM-3, ad CAM-Chord [9]. Floodig is oe of the most popular broadcast algorithms o the IP etworks; reverse path forwardig is oe example. I our case, each ode forwards a copy of a message to all radom eighbors whe it receives the message for the first time. I order to cotrol the overhead, probabilistic floodig forwards a copy of the message to a radom eighbor with a certai probability, which meas ot all eighbors of a ode will receive the message forwarded by the ode. O the other had, LD floodig oly forwards a copy of the message to a fixed umber of radom eighbors. ACOM- with bkc is the algorithm i Fig. 2 with K calculated from (2). Because ACOM-2 ad ACOM-3 are better algorithms (Sectio 6), we oly preset their results i most cases. Proximity o the rig is implemeted by default. The above six algorithms are all desiged based o a radom etwork. CAM-Chord is desiged based o a more complex DHT etwork. It has Oðlog c Þ times more eighbors per ode, which meas multiple times higher overhead for maitaiig the etwork, but it is more efficiet i deliverig a multicast message. ACOM ad CAM-Chord represet a trade-off betwee cheaper etwork maiteace ad more efficiet multicastig (Sectio 7.6). The performace metrics that we sdy iclude. the traffic volume for deliverig oe message, which is measured by the umber of copies that are forwarded by all odes, 2. the average legth of the delivery paths, which is measured by the average umber of overlay hops it takes a message to reach a ode, 3. the average delivery latecy, which is measured by the average time it takes a message to reach a ode, 4. hop distributio, which is the distributio of the delivery-path legths for all odes, 5. delay distributio, which is the distributio of the latecy values for all odes, ad 6. the maiteace overhead, which is the average umber of cotrol messages set for each ode joi/deparre. 7.2 Performace Evaluatio The first set of simulatios compares the average performace of various algorithms i deliverig messages. Fig. 5 shows the traffic volumes caused by these algorithms with respect to the average ode capacity. I probabilistic Fig. 6. Number of odes reached by a multicast message. Not all algorithms deliver the message to all odes. floodig, the probabilistic for a ode to forward a message to a eighbor is 30 percet. I LD floodig, each ode forwards a message to two eighbors. I ACOM-2 ad ACOM-3, ¼ 0:25. Accordig to the figure, floodig is the clear loser because of too much traffic. The traffic volume of probabilistic floodig is small whe the average ode capacity is small. The traffic volume of LD floodig is modest ad isesitive to the ode capacity. The problem is that either of them esures that a message will reach all odes, as demostrated i Fig. 6. Oe way to solve this problem is to icorporate the segmeted rig traversal proposed i this paper. A rig is augmeted to the overlay etwork. Whe a ode receives a message for the first time, it ot oly forwards the message to radom eighbors but also starts traversig the adjacet rig segmet util reachig a ode that has also received the message. But, the segmeted rig traversal comes with a cost; it forwards ð¼ 0;000Þ copies of the message, which brigs up the traffic volume as show i Fig. 7. I compariso, the traffic volumes caused by ACOM-2 ad ACOM-3 are both much smaller. Fig. 8 compares the average legths of the delivery paths. It takes the least umber of hops for floodig to reach the odes. ACOM-2 performs slightly better tha ACOM-3. Both ACOM-2 ad ACOM-3 perform better tha LD floodig, but worse tha floodig. Probabilistic floodig performs well Fig. 7. Compariso o traffic volume for deliverig oe message. All algorithms perform segmeted rig traversal.

9 96 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 Fig. 8. Compariso of the algorithms o average legth of delivery paths. Fig. 0. Scalability compariso o traffic volume for deliverig oe message with respect to etwork size. Fig. 9. Compariso of the algorithms o average latecy of deliverig a message. whe the average ode capacity is large, but that comes with a large overhead, show i Fig. 7. Due to the proximity measure that is implemeted o the rig (Sectio 5.5), ACOM-2 ad ACOM-3 perform closer to floodig i terms of latecy tha i terms of hops. As show i Fig. 9, proximity has less impact o LD floodig because it traverses o shorter rig segmets tha ACOM-2 ad ACOM-3. The average latecy values of ACOM-2 ad ACOM-3 are slightly worse tha that of floodig but much better tha that of LD floodig. We also perform scalability evaluatio with the umber of odes i the etwork ragig from 2,000 to 20,000. Fig. 0 shows that the traffic volume icreases liearly with the etwork size for all four algorithms uder compariso. Fig. shows that, except for probabilistic floodig, the average latecy values of the algorithms are ot very sesitive to the etwork size. 7.3 Performace Trade-off i ACOM The secod set of simulatios sdies the performace of ACOM with respect to the value of. Figs. 2, 3, ad 4 demostrate a trade-off i ACOM betwee commuicatio complexity (traffic volume) ad hop complexity (umber of hops ad latecy). By icreasig, ACOM ca reduce the latecy at the cost of higher traffic volume, ad vice versa. I Fig. 2, a larger value meas a larger phase-oe tree, which icreases the traffic volume that costructs the Fig.. Compariso of the algorithms o average legth of delivery paths with respect to etwork size. Fig. 2. Compariso of ACOM algorithms o traffic volume with respect to. tree. Note that the traffic volume of phase two is always ð¼ 0; 000Þ forwarded copies. O the other had, a larger phase-oe tree meas smaller rig segmets, which reduces the umber of hops ad, thus, latecy i phase two, also causig overall hop/latecy decrease (Figs. 3 ad 4). The performace curve of ACOM- with bkc is a staircase with respect to. That is because chagig does ot cotiuously chage the value of bkc, accordig to (2).

10 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 97 Fig. 3. Compariso of ACOM algorithms o average legth of delivery paths with respect to. Fig. 5. Hop distributio. Fig. 4. Compariso of ACOM algorithms o average latecy with ad without implemetig proximity. 7.4 Delay ad Proximity The third set of simulatios sdies the impact of proximity. Our rig is a urestricted rig, where a ode ca be located aywhere. This gives us the freedom of movig earby odes adjacet o the rig (Sectio 5.5), which reduces the latecy of performig the segmeted rig traversal i phase two. Fig. 4 shows that the impact of proximity is greater whe is smaller. That is because a smaller value for meas a smaller phase-oe tree ad, cosequetly, larger rig segmets i phase two, which gives proximity more impact. 7.5 Hop ad Delay Distributios The fourth set of simulatios sdies the hop distributio ad the delay distributio, which are show i Fig. 3 ad Fig. 4, respectively. Because the average delay of a overlay lik is 50 ms, 20 hops i Fig. 5 correspods to,000 ms i Fig. 6. The value of is chose to be I Fig. 5, over 93.2 percet of all odes receive the message withi twice the average umber of hops, which is 9.43 for ACOM-2 ad 8.4 for ACOM-3. The delay distributio is more cocetrated. I Fig. 6, over 96.4 percet of all odes receive the message withi twice the average latecy, which is ms for ACOM-2 ad ms for ACOM-3. Fig. 6. Delay distributio. 7.6 Network Maiteace Overhead ad ACOM versus CAM-Chord The algorithms evaluated so far are all based o radom overlay etworks. Because these algorithms use the same uderlyig overlay topology i the simulatios, the etwork maiteace overhead is the same for them. The goal of ACOM is to support ay-source capacitycostraied multicast with dyamic membership. We have elaborated i the itroductio ad the related work that most existig systems do ot meet these requiremets. CAM- Chord is a exceptio, but it is DHT-based ad requires Oðc log c Þ eighbors per ode, which is Oðlog c Þ times more tha ACOM. The fifth set of simulatios compares CAM- Chord ad CAM i terms of multicast efficiecy ad etwork maiteace overhead. Thaks to its more complex topological strucre, CAM- Chord forwards oly oe copy of a multicast message to each ode. Therefore, it is more efficiet i terms of multicastig (Fig. 7), but less efficiet i terms of etwork maiteace (Fig. 8). Assume a TCP coectio is established betwee two eighbors. The maiteace overhead is the summatio of ) the umber of cotrol messages used to idetify the eighbors, 2) the umber of cotrol messages for establishig ew TCP coectios betwee eighbors, ad 3) the umber of cotrol messages for tearig dow the TCP coectios betwee odes that cease to be eighbors. The maiteace overhead of ACOM icreases slowly with the etwork size, ad it is far less tha that of CAM-Chord.

11 98 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 Fig. 7. CAM-Chord forwards oe copy of the multicast message for each ode, which is optimal. I total, ACOM forwards about 24 percet more copies tha ecessary due to its radom strucre. CAM-Chord achieves the optimality at the cost of Oðlog c Þ times more eighbors per ode ad the more complex DHT-based etwork strucre, which is harder to repair oce it is fracred. CAM-Chord ad ACOM represet a trade-off betwee topology maiteace overhead ad multicast overhead. They provide differet optios for practitioers to choose based o the system requiremets that may be i favor of more efficiet multicastig or low overhead maiteace. The average latecy values of CAM-Chord ad ACOM are comparable ad the simulatio results are omitted. 8 CONCLUSION This paper proposes a ay-source overlay multicast service o top of a radom overlay etwork with a augmeted rig. It is able to deliver a multicast message from ay source with a hop complexity of Oðlog c Þ ad a commuicatio complexity of þ log c. Remarkably, this is achieved without maitaiig ay explicit multicast trees. We provide a rigorous aalysis ad perform extesive simulatios to evaluate the performace of the system. We preset three distributed multicast algorithms ad address a variety of issues, icludig overlay maiteace, parameter measuremet, low-capacity odes, proximity, ad dyamic capacities. APPENDIX PROOFS We first give the upper ad lower bouds of Q K ad the derive the hop complexity ad the commuicatio complexity of the algorithm. The defiitios for Q K ad other symbols ca be foud i Sectio 4.3 ad Sectio 3. Lemma. EðQ i Þ P i cj. Proof. The umber of odes at level i is bouded by the summatio of the capacities of all odes at level ði Þ. Namely, q i Xq i c i;j : j¼ The expected value of q i, uder the coditio that there are q i odes at level ði Þ, is calculated below. c i;j, j 2½::q i Š, is a radom variable whose expected value is c. Fig. 8. CAM-Chord has may more eighbors per ode tha ACOM. Its overhead, i terms of umber of cotrol messages per ode joi/ deparre, is much higher tha that of ACOM, which is a strucrallysimpler o-dht etwork. Therefore, CAM-Chord ad ACOM represet a trade-off betwee topology maiteace overhead ad multicast overhead. Eq ð i j q i Þ E Xq i c i;j ¼ Xq i Ec i;j ¼ qi c: j¼ j¼ Take the expected value o both sides with respect to q i ad, because EðEðq i jq i ÞÞ ¼ Eðq i Þ, we have Eðq i ÞEðq i Þc: By recursively applyig the above iequality, we have It follows that Eðq i Þc i Eðq 0 Þ¼c i : EðQ i Þ¼E Xi q j Xi Lemma 2. For ay set S of coditios, it must be true that EQ ð i jsþ E Q i j Q i Xi c j ;S : Proof. EQ ð i j SÞ is the expected value of Q i amog all possible multicast istaces that satisfy S. E Q i Qi Xi c j ;S is the expected value of Q i amog all possible multicast istaces that ot oly satisfy S but also Q i P i cj. The differece betwee them is that EðQ i Q i P i cj ;SÞ excludes all Q i istaces that are greater tha P i cj. Sice it excludes large values, we certaily have that EQ ð i j SÞ E Q i Qi Xi c j ;S : c j : ut

12 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 99 Lemma 3. For ay set S of coditios that place o artificial restrictio o a ode s capacity, it must be true that E Q i j Q i Xi c j ;S > c E Q i Qi Xi C Ki c j ;S : Proof. Let T i be the subtree that cosists of levels 0 through i of a phase-oe tree. The size of T i is Q i. Durig the formatio of T i, each ode x at levels 0 through ði Þ makes c x attempts to iclude its radom eighbors i the tree at the ext level. Because there are less tha Q i odes i the tree, each attempt has a probability of at least ð Q i Þ of fidig that a radom eighbor is outside the tree ad thus ca be brought i, which icreases the tree size by oe. P There are, i total, i P ql l¼0 j¼ c l;j attempts at levels 0 through ði Þ. Therefore, Q i > Xi X q l c l;j l¼0 j¼ Q i : ð4þ Oe may be puzzled by the above iequality amog radom variables. The correct iterpretatio is that the iequality will hold for ay give multicast istace. Give ay set of values, q l, l 2½::i Š, which appears i fq ;...;q i jq i P i cj ;Sg, we compute the coditioal expected value of Q i. E Q i j q l ;l2½::i Š; Q i Xi c j ;S >E Xi X q l c l;j l¼0 j¼ E ¼ Xi X ql c l;j l¼0 j¼ P i cj Q i ql ;l2½::i Š; Q i Xi c j ;S P i cj Q i Xi X i X ql l¼0 j¼ Q i Xi by ð4þ ql ;l2½::i Š; c j ;S by coditio Q i Xi E c l;j ql ;l2½::i Š; c j ;S c j Basedotheaboveiequality,taketheexpectedvalueofQ i over q l, l 2½::i Š, uder the coditio of Q i P i cj ad S. E Q i j Q i Xi c j ;S > cð C KiÞEðQ i j Q i Xi Lemma 4. EðQ i Þ > ð c Ki ðcþ Þci. Proof. By Lemma 2, EðQ i ÞE Let S 0 ¼;. By Lemma 3, Q i j Q i Xi c j ;SÞ: c j : EðQ i Þ >c E Q i Qi Xi C Ki c j ;S 0 : Let S ¼ S 0 þfq i P i cj g. By Lemmas 2 ad 3, EðQ i Þ >c C Ki EQ i S c E Q i Qi Xi c j ;S C Ki >c 2 C Ki E C Kiþ Q i2 Qi Xi c j ;S : Repeat this process by recursively applyig Lemmas 2 ad 3. We have EðQ i Þ >c i Yi Eðq 0 Þ j¼ ¼ c i Yi j¼ c Kj c Kj : It ca be show by iductio that Q i j¼ð Þ > c Kj c Ki ðcþ. Therefore, EðQ i Þ > c Ki c i : ðc Þ ¼ c P i cj P i cj X i ¼ c >c c Ki Q i X q l l¼0 j¼ Q i by lemma assumptio; S places o restrictio o c l;j by ðþ: Lemma 5. ð c cþð c Þ < EðQ KÞ. Proof. By Lemma, EðQ K Þ P K i¼0 ci ¼. By Lemma 4, EðQ K Þ > c c K : ð5þ c From (), c K ¼ ðcþþ c have > ðcþ c. Applyig this to (5), we

13 200 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 EðQ K Þ > c : c c X is the summatio of Q K idepedet radom variables, where Q k ¼ P K i¼0 q i. Q K is itself a radom variable. Give a value of Q K, the coditioal expected value of X is Theorem (Hop Complexity). The expected umber of hops for a multicast message to reach ay ode is bouded by log c ðþþ 2ð c cþð c Þ : Proof. By (), P K i¼0 ci ¼. Hece, c K <. K<log c ðþ, which meas that phase oe termiates i o more tha log c ðþ hops. By Lemma 5, after phase oe, the rig is partitioed ito more tha ð c cþð cþ segmets. Phase two delivers the message i parallel alog these segmets. The expected legth of a segmet is bouded by c ¼ c c c : c I phase two, the average umber of hops for the message to reach a ode is half of the segmet legth. Combiig phase oe ad phase two, the expected umber of hops for a multicast message to reach ay ode is bouded by log c ðþþ 2 : c c c Corollary (Hop Complexity). If ¼ log c ad c 2, the the expected umber of hops for a multicast message to reach ay ode is Oðlog c Þ. Proof. By Theorem, the upper boud o the expected umber of hops is log c ðþþ 2 c c c ¼ ðlog c ðlog c log c ÞÞ þ 2 c ¼ ðlog c Þþ log c log c c c c log c ¼ ðlog c Þþðlog c Þ¼ðlog c Þ: Theorem 2 (Commuicatio Complexity). The expected umber of copies of a multicast message that are trasmitted is bouded by ð þ Þ. Proof. The umber X of copies that are trasmitted i phase oe is equal to the summatio of the capacities of all odes at levels zero through K. X ¼ XK i¼0 X q i j¼ c i;j : EX QK ¼ X K i¼0 X qi j¼ Ec i;j ¼ X K i¼0 X qi j¼ c ¼ cq K : Take the expected value o both sides with respect to Q K. By (3) ad (), we have EðXÞ ¼cEðQ K Þ c XK c i < : Phase two seds a fixed umber of copies i the segmeted rig traversal. Therefore, the expected umber of copies that are trasmitted for a multicast message is ð þ Þ. Corollary 2 (Commuicatio Complexity). If ¼ ð log c Þ, the the expected umber of copies of a multicast message that are trasmitted is bouded by þ Oð log c Þ. Proof. Directly from Theorem 2. ACKNOWLEDGMENTS This work is i part supported by the Natioal Naral Sciece Foudatio of Chia uder grat ad by Shaghai Leadig Academic Disciplie Project (Project Number T0502). REFERENCES [] G. Baavar, M. Chadra, B. Nagarajaro, R. Strom, ad C. Srma, A Efficiet Multicast Protocol for Cotet-Based Publish- Subscribe System, Proc. It l Cof. Distributed Computig Systems (ICDCS 98), May 998. [2] Y.H. Chu, S. Rao, S. Sesha, ad H. Zhag, A Case for Ed System Multicast, IEEE J. Selected Areas i Comm., vol. 20, o. 8, Oct [3] J. Jaotti, D. Gifford, K. Johso, M. Kaashoek, ad J. O Toole, Overcast: Reliable Multicastig with a Overlay Network, Proc. Symp. Operatig Systems Desig ad Implemetatio (OSDI 00), Oct [4] C.K.S. Baerjee ad B. Bhattacharjee, Scalable Applicatio Layer Multicast, Proc. ACM SIGCOMM 02, Aug [5] B. Zhag, S. Jami, ad L. Zhag, Host Multicast: A Framework for Deliverig Multicast to Ed Users, Proc. INFOCOM 02, Jue [6] G.-I. Kwo ad J.W. Byers, ROMA: Reliable Overlay Multicast with Loosely Coupled TCP Coectios, Proc. INFOCOM 04, Mar [7] P.M. Zhi Li, Impact of Topology o Overlay Routig Service, Proc. INFOCOM 04, Mar [8] Y. Shavitt ad T. Takel, O the Curvare of the Iteret ad Its Usage for Overlay Costructio ad Distace Estimatio, Proc. INFOCOM 04, Mar [9] F. Baccelli, A. Chaitreau, Z. Liu, A. Riabov, ad S. Sahu, Scalability of Reliable Group Commuicatio Usig Overlays, Proc. INFOCOM 04, Mar [0] V. Pappas, B. Zhag, A. Terzis, ad L. Zhag, Fault-Tolerat Data Delivery for Multicast Overlay Networks, Proc. It l Cof. Distributed Computig Systems (ICDCS 04), Mar [] J.A. Deja Kosti, A. Rodriguez, ad A. Vahdat, Bullet: High Badwidth Data Dissemiatio Usig a Overlay Mesh, Proc. Symp. Operatig Systems Priciples (SOSP 03), Oct i¼0

14 CHEN ET AL.: ACOM: ANY-SOURCE CAPACITY-CONSTRAINED OVERLAY MULTICAST IN NON-DHT P2P NETWORKS 20 [2] S. Baerjee, C. Kommareddy, B.B.K. Kar, ad S. Khuller, Costructio of a Efficiet Overlay Multicast Ifrastrucre for Real-Time Applicatios, Proc. INFOCOM 03, Mar [3] A. Riabov ad L.Z. Zhe Liu, Overlay Multicast Trees of Miimal Delay, Proc. It l Cof. Distributed Computig Systems (ICDCS 04), Mar [4] H. Yamaguchi, A. Hiromori, T. Higashio, ad K. Taiguchi, A Autoomous ad Decetralized Protocol for Delay Sesitive Overlay Multicast Tree, Proc. It l Cof. Distributed Computig Systems (ICDCS 04), Mar [5] S. Zhuag, B. Zhao, A. Joseph, R. Katz, ad J. Kubiatowicz, Bayeux: A Architecre for Scalable ad Fault-Tolerat Wide- Area Data Dissemiatio, Proc. th It l Workshop Network ad Operatig System Support for Digital Audio ad Video (NOSSDAV 0), Jue 200. [6] R. Zhag ad Y.C. Hu, Borg: A Hybrid Protocol for Scalable Applicatio-Level Multicast i Peer-to-Peer Networks, Proc. It l Workshop Network ad Operatig System Support for Digital Audio ad Video (NOSSDAV 03), [7] S. Ratasamy, M. Hadley, R. Karp, ad S. Sheker, Applicatio- Level Multicast Usig Cotet-Addressable Networks, Proc. It l Workshop Networked Group Comm. (NGC 0), 200. [8] M. Castro, M. Joes, A.-M. Kermarrec, A. Rowstro, M. Theimer, H. Wag, ad A. Wolma, A Evaluatio of Scalable Applicatio-Level Multicast Built Usig Peer-to-Peer Overlays, Proc. INFOCOM 03, Apr [9] Z. Zhag, S. Che, Y. Lig, ad R. Chow, Capacity-Aware Multicast Algorithms i Heterogeeous Overlay Networks, IEEE Tras. Parallel ad Distributed Systems, special sectio o algorithm desig ad schedulig techiques (realistic platform models) for heterogeeous clusters, vol. 7, o. 2, pp , Feb [20] S. Shi, J. Turer, ad M. Waldvogel, Dimesioig Server Access Badwidth ad Multicast Routig i Overlay Networks, Proc. It l Workshop Network ad Operatig System Support for Digital Audio ad Video (NOSSDAV 0), Jue 200. [2] S. Shi ad J. Turer, Routig i Overlay Multicast Networks, Proc. INFOCOM 02, Jue [22] B.Y. Zhao, J.D. Kubiatowicz, ad A.D. Joseph, Tapestry: A Ifrastrucre for Fault-Tolerat Wide-Area Locatio ad Routig, Uiv. of Califoria Berkeley Techical Report UCB/CSD-0-4, Apr [23] A. Rowstro ad P. Druschel, Pastry: Scalable, Decetralized Object Locatio, ad Routig for Large-Scale Peer-to-Peer Systems, Proc. Middleware 0, Nov [24] S. Ratasamy, P. Fracis, M. Hadley, R. Karp, ad S. Sheker, A Scalable Cotet Addressable Network, Proc. ACM SIG- COMM 0, Aug [25] S. El-Asary, L.O. Alima, P. Brad, ad S. Haridi, Efficiet Broadcast i Strucred P2P Networks, Proc. It l Workshop Peerto-Peer Systems (IPTPS 03), Feb [26] I. Stoica, R. Morris, D. Karger, F. Kaashoek, ad H. Balakrisha, Chord: A Scalable Peer-to-Peer Lookup Service for Iteret Applicatios, Proc. ACM SIGCOMM 0, pp , Aug [27] M. Kaashoek ad D. Karger, Koorde: A Simple Degree-Optimal Distributed Hash Table, Proc. Secod It l Workshop Peer-to-Peer Systems (IPTPS 03), Feb [28] T.S.E. Ng ad H. Zhag, Predictig Iteret Network Distace with Coordiates-Based Approaches, Proc. IEEE INFOCOM 02, Jue [29] A. Mukherjee, O the Dyamics ad Sigificace of Low Frequecy Compoets of Iteret Load, Iteretworkig: Research ad Experiece, vol. 5, o. 4, pp , 994. Shipig Che received the BS degree i electrical egieerig from JiagXi Uiversity of Chia i 984. He received the MS ad PhD degrees i computer sciece from the Istite of Computig Techology of the Chiese Academy of Scieces ad Fuda Uiversity i 990 ad 2006, respectively. He joied the Uiversity of Shaghai for Sciece ad Techology i 990 ad is curretly a full professor i the Computer Sciece Departmet. He is also the director of the etwork ceter of the uiversity. His research iterests iclude peerto-peer etworks, etwork commuicatios, ad database systems. Baile Shi joied the Departmet of Computer ad Iformatio Techology of Fuda Uiversity i 975. He was promoted to a associate ad the a full professor i 980 ad 985, respectively. He was the departmet chair from 985 to 996. His research field is database theories ad applicatios. He has published more tha 70 papers i the top Chiese jourals ad writte more tha 0 textbooks. He has wo umerous awards, icludig oe atioal sciece ad techology advacemet award, oe Guaghua award, ie Shaghai sciece ad techology advacemet awards, ad four textbook awards. Shigag Che received the BS degree i computer sciece from the Uiversity of Sciece ad Techology of Chia i 993. He received the MS ad PhD degrees i computer sciece from the Uiversity of Illiois at Urbaa-Champaig i 996 ad 999, respectively. After graduatio, he worked with Cisco Systems for three years before joiig the Uiversity of Florida as a assistat professor i His research iterests iclude etwork security, peer-to-peer etworks, ad sesor etworks. He received a IEEE Commuicatios Society Best Tutorial Paper Award i 999. He was a guest editor of the ACM/Baltzer Joural of Wireless Networks (WINET) ad the IEEE Trasactios o Vehicle Techologies. He served as a techical program committee cochair for the Computer ad Network Security Symposium of IEEE IWCCC 2006, a techical program committe vice chair for IEEE MASS 2005, a vice geeral chair for QShie 2005, a techical program committee cochair for QShie 2004, ad a techical program committee member for may cofereces icludig IEEE ICNP, IEEE INFOCOM, IEEE SANS, IEEE ISCC, IEEE Globecom, etc. Ye Xia received the PhD degree from the Uiversity of Califoria, Berkeley, i 2003, the MS degree i 995 from Columbia Uiversity, ad the BA degree i 993 from Harvard Uiversity, all i electrical egieerig. He became a assistat professor i the Computer ad Iformatio Sciece ad Egieerig departmet at the Uiversity of Florida i August Betwee Jue 994 ad August 996, he was a member of the techical staff at Bell Laboratories, Lucet Techologies i New Jersey. His research iterests are i the computer etworkig area, icludig performace evaluatio of etwork protocols ad algorithms, cogestio cotrol, resource allocatio, ad load balacig o peer-to-peer etworks. He is also iterested i probability theory, stochastic processes, ad queuig theory.. For more iformatio o this or ay other computig topic, please visit our Digital Library at

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

CIS 121. Introduction to Trees

CIS 121. Introduction to Trees CIS 121 Itroductio to Trees 1 Tree ADT Tree defiitio q A tree is a set of odes which may be empty q If ot empty, the there is a distiguished ode r, called root ad zero or more o-empty subtrees T 1, T 2,

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

c-dominating Sets for Families of Graphs

c-dominating Sets for Families of Graphs c-domiatig Sets for Families of Graphs Kelsie Syder Mathematics Uiversity of Mary Washigto April 6, 011 1 Abstract The topic of domiatio i graphs has a rich history, begiig with chess ethusiasts i the

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and Massachusetts Istitute of Techology Lecture.89: Theory of Parallel Systems Feb. 5, 997 Professor Charles E. Leiserso Scribe: Guag-Ie Cheg Lecture : List cotractio, tree cotractio, ad symmetry breakig Work-eciet

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information