A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees
|
|
- Lily Gibbs
- 5 years ago
- Views:
Transcription
1 A Network Bandwdth Computaton Technque for IP Storage wth QoS Guarantees Young Jn Nam 1, Junkl Ryu 1, Chank Park 1, and Jong Suk Ahn 2 1 Department of Computer Scence and Engneerng Pohang Unversty of Scence and Technology/PIRL Kyungbuk, Republc of Korea {yjnam,lancer,cpark}@postech.ac.kr 2 Department of Computer Engneerng Dongguk Unversty, Seoul, Republc of Korea jahn@dgu.ac.kr Abstract. IP storage becomes more commonplace wth the prevalence of the SCSI (Internet SCSI) protocol that enables the SCSI protocol to run over the exstng IP network. Meanwhle, storage QoS that assures a requred storage servce for each storage clent has ganed n mportance wth ncreased opportuntes for multple storage clents to share the same IP storage. Consderng the exstence of other competng network traffc n IP network, we have to provde storage I/O traffc wth guaranteed network bandwdth. Most mportantly, we need to calculate the requred network bandwdth to assure a gven storage QoS requrement between a storage clent and IP storage. Ths paper proposes a network bandwdth computaton technque that not only accounts for the overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. Performance evaluatons wth varous I/O workload patterns on our IP storage testbed verfy the correctness of the proposed technque; that s, allocatng a part (0.6 20%) of the entre network bandwdth can assure the gven storage QoS requrements. 1 Introducton Storage Area Networks (SAN), such as Fber Channel and Ggabt Ethernet, have enabled a plethora of storage systems to be mantaned as a storage pool, resultng n reduced total cost of ownershp, effectve storage resource management, etc. Such SAN-based storage systems are advantageous n terms of scalablty and confgurablty, compared wth SCSI bus-based storage systems. Accordngly, a few data transmsson protocols have newly emerged to support the SAN envronment. Fber Channel protocol (FCP) s developed for FC-based SAN, and SCSI recently ratfed by Internet Engneerng Task Force s made for IP SAN. A man advantage of SCSI s that the SCSI can operate on standard network components, such as Ethernet [1]; that s, t explots exstng features and tools that have been developed for the IP network. Thus, ths paper focuses H. Jn et al. (Eds.): NPC 2004, LNCS 3222, pp , c IFIP Internatonal Federaton for Informaton Processng 2004
2 474 Y.J. Nam et al. on the storage envronment usng IP-based SAN (IP storage), where storage devces are attached to IP networks, and storage clents communcate wth the storage devces va the SCSI protocol [1]. An ntator-mode SCSI protocol runs on the storage clent, whereas a target-mode SCSI protocol operates on the IP storage. Note that the tradtonal SCSI protocol operates on top of the SCSI protocol layer that transmts a gven SCSI command to ts assocated IP storage over the IP network. Wth the advance n storage technologes n terms of storage space and I/O performance, the chances ncrease that multple storage clents share the same storage. A dfferent storage clent may requre a dfferent storage servce, called storage Qualty of Servce (QoS); that s, each storage clent requres recevng a guaranteed storage servce, ndependently of the status of the I/O servces n other storage clents. Unfortunately, the storage tself does not contan any feature of assurng storage QoS. As a result, recent research efforts [2,3] try to add the QoS feature to varous types of storage systems. However, notce that the prevous research emphaszes the QoS ssue only wthn the storage system, whereas t s assumed that the SAN tself has no QoS ssues. Note that, FCbased SAN s used only for storage I/O traffc. IP storage, however, transmts ts data over the IP network, where storage I/O traffc s lkely to coexst wth the other network traffc. Consderng ths stuaton leads us to preserve an amount of network bandwdth for the storage I/O traffc between a storage clent and ts assocated IP storage to avod any probable nterference wth the other network traffc. A nave approach s to allocate the full network bandwdth (or separate dedcated IP network) that s large enough to serve the storage I/O traffc wth QoS guarantee for a par of a storage clent and ts assocated IP storage. However, t can be easly nferred that ths approach ends up beng wth under-utlzaton of IP network resources, even though t can certanly guarantee a gven storage QoS requrement. By contrast, unless enough network bandwdth resdes between the storage clent and the IP storage, the storage QoS requrement s no longer guaranteed wth lower I/O throughput (I/O requests per seconds) and hgher response tme due to ncreased data transfer delays. Ths paper emphaszes the problem of computng the requred network bandwdth to meet a gven storage QoS requrement. It proposes a network bandwdth computaton technque that not only accounts for overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. In the case of FC-based SAN envronments, Ward et. al. n [4] proposed a scheme to automatcally desgn an FC-based SAN that not only serves a gven set of storage I/O traffc between storage clents and storage systems, but also mnmzes the system cost. 2 Problem Descrpton We begn by defnng a few notatons to be used throughout the paper. C and Q represent the storage clent and ts storage QoS requrement, respectvely. Generally, the storage QoS requrement s defned as Q = {f,ops,sz,s,rt }.
3 A Network Bandwdth Computaton Technque for IP Storage 475 The notaton of f represents the rato of read I/O requests. In addton, ops, sz,andrt represent the number of I/O requests per second (brefly IOPS), an average I/O request sze, and an average response tme requested from C, respectvely. I/O access pattern s random wth s = 0 and purely sequental wth s = 1. Note that our network bandwdth computaton does not depend on the value of s.wedenotewthb and b the network bandwdth allocated for the drecton from C and ts assocated IP storage and for ts opposte drecton, respectvely. Then, the problem that ths paper wll solve can be descrbed as follows: Compute b and b that satsfy the gven Q for the storage clent C and ts assocated IP storage. Note that we assume that the storage resources except for network resources (bandwdth) have been approprately reserved to satsfy the storage QoS requrement Q. 3 The Proposed Technque To begn, we wll explan the protocol layerng for SCSI protocol and the specfc behavor of the SCSI protocol for read and wrte I/O requests. The SCSI protocol data unt (PDU) conssts of a 48-byte SCSI header and SCSI data of a varable length. The maxmum SCSI data length reles on the types of underlyng Ethernet cards. Typcally, t ranges from 1,394 through 8,894 bytes. The TCP/IP headers and Ethernet header respectvely occupy 40 bytes and 18 bytes. Fgure 1 presents the protocol behavors for read and wrte I/O requests. In the case of the read I/O request, as shown n Fgure 1(a), the storage clent sends the READ SCSI command to the IP storage. Next, after readng the requested data from ts nternal dsk drves, the IP storage transmts the data to the storage clent n the DATA IN phase. Note that the data are to be fragmented nto smaller peces accordng to the maxmum SCSI data length. Fnally, the IP storage sends the response message to the storage clent. The SCSI CMD-Read PDU (106B) DATA_IN PDU..... DATA_IN PDU CMD-Resp PDU (106B) CMD-Wrte PDU (106B) (w/ DATA_OUT PDU) DATA_OUT PDU..... DATA_OUT PDU R2T PDU (106B) DATA_OUT PDU CMD-Resp PDU (106B) (a) read (b) wrte Fg. 1. SCSI protocol behavors for read and wrte I/O requests: (a) read and (b) wrte
4 476 Y.J. Nam et al. protocol behavor for the wrte I/O request s more complcated than that of the read I/O request because of free buffer management and performance optmzaton technques lke mmedate/unsolcted data transmsson. The storage clent sends the WRITE SCSI command to the IP storage. Unless the data sze s greater than the maxmum SCSI data length, t s transmtted along wth the wrte SCSI command. Ths results n collapsng the COMMAND phase and the DATA OUT phase [1]. It s called mmedate data transmsson [1]. If the data sze s greater than FrstBurstLength, the storage clent transfers the data of the frst FrstBurstLength bytes to the IP storage wthout recevng the Ready to Transfer (R2T) message from the IP storage that s used to secure free buffer space to store the wrte data. Ths process s called unsolcted data transmsson [1]. Note that the mmedate data transmsson s combned wth the unsolcted data transmsson. Afterwards, the storage clent transfers data only when t receves the R2T message from the IP storage. It s called solct data transmsson [1]. In what follows, we derve a set of equatons to compute the requred network bandwdth to meet a gven storage QoS requrement. We start by computng the amount of data transfer, ncludng the underlyng protocol overhead for gven read and wrte I/O requests of sze s.wedenotewthdr (sz ) the amount of data transfer from the storage clent to the IP storage for the read I/O request of sze sz,anddr (sz ) for the opposte drecton. From the protocol behavor for the read I/O request, as shown n Fgure 1(a), we can easly obtan Dr (sz ) and Dr (sz ) as follows: Dr (sz )=ov prot, (1) Dr (sz )=2ov prot + sz S f + sz mod Ŝ Ŝf, f (2) where Ŝf = S f ov prot. The notaton of ov prot represents the 106-byte protocol overhead caused by the Ethernet header, the TCP/IP header, and the SCSI header. The notaton of S f represents the underlyng Ethernet frame sze. Next, we calculate the amount of data transfer for the wrte I/O request. To begn, the storage clent sends the agreed-upon amount of data (unsolcted data transmsson) to IP storage wthout havng an R2T message. We assume that the behavor of each data transfer follows that of the solct data transmsson because the network traffc under our consderaton s heavy enough. However, f the I/O request sze s not greater than the maxmum SCSI data length, the assocated data s delvered to the IP storage by usng the mmedate data transmsson. As wth the read I/O request, we denote wth Dw (sz ) the amount of data from the storage clent to the IP storage for the wrte I/O request, and Dw (sz ) for the opposte drecton. Based on the SCSI protocol behavor for the wrte I/O request, as shown n Fgure 1(b), Dw (sz )anddw (sz )can be obtaned as follows: { Dw (sz ovprot + sz f sz )= Ŝf, (3) ov prot + sz S Ŝ f + sz mod Ŝf otherwse f
5 A Network Bandwdth Computaton Technque for IP Storage 477 { Dw ovprot f sz (sz )= FrstBurstLength. (4) 2ov prot otherwse If the data sze s not greater than the maxmum SCSI data length of Ŝ f, Dw c z(sz )sov prot + sz. Otherwse, t ncludes sz tmes of the maxmum Ŝ f Ethernet frame sze of S f and the remanng data wth the protocol overhead of ov prot.asfordw (sz ), f the data sze s not greater than FrstBurstLength, Dw (sz ) s equal to the sze of the SCSI response message. Otherwse, t becomes two tmes of ov prot, because the R2T message s also delvered to the storage clent as well as the SCSI response message. Next, we defne wth the average amount of data transfer ncludng the underlyng protocol overhead from the storage clent to the IP storage for the sz szed I/O request. In addton, we defne wth for the opposte drecton. From Equaton (1) (4), we can obtan and as follows: = {f Dr (sz )+(1 f )Dw (sz )}ops, (5) = {f Dr (sz )+(1 f )D w (sz )}ops. (6) and s expected to assure the The network bandwdth allocaton wth requested maxmum storage bandwdth derved by multplyng sz and ops. However, they may not guarantee the demanded response tme of rt. For example, notce that Equaton (5) and (6) result n a lower network bandwdth wth a smaller sz ops. Ths mples that the chances ncrease that each I/O request of sze sz experences a longer transmsson delay on IP network that s most lkely to ental a volaton of the demanded response tme. Thus, we ntroduce the mnmum network bandwdth to assure the demanded response tme of rt.wedenotewthm and m the mnmum network bandwdth for each drecton. The values of m and m are determned such that the transmsson delay of each I/O request are not greater than α rt, where 0 <α < 1. Usually, α s determned accordng to the margnal response tme to meet rt n the phase of desgnng the assocated IP storage [2,5,3]. For example, f the IP storage s desgned to assure 15msec for gven rt = 20msec, the values of α can range from 0 through We compute m and m from a smple relatonshp that the expected transmsson delay s nversely proportonal to the allocated network bandwdth wthout accountng for the effects of traffc congeston control, IP routng, the transmsson buffer sze, TCP retransmsson, etc. The m and m m m By denotng wth b are wrtten as follows: = max{ f Dr = max{ f Dr and b the network bandwdth for each drecton re- and b as follows: qured to guarantee a gven Q, we fnally have b b b (sz ), 1 f Dw (sz )}, (7) α rt (sz ), 1 f Dw (sz )}. (8) α rt = max{,m }, (9) = max{,m }. (10)
6 478 Y.J. Nam et al. 4 Performance Evaluatons We set up an expermental testbed for IP storage to evaluate the performance of the proposed technque.we use two Intel Pentum III based desktops for the storage clent and the IP storage. Both systems are attached to a Ggabt IP network va Ggabt Ethernet cards and a swtch. Assume that no other traffc exsts between the two systems. The maxmum sze of the Ethernet frame s 1500 bytes. The Lnux kernel works on top of the storage clent and IP storage. The storage clent ncludes the ntator-mode SCSI drver developed by the Unversty of New Hampshre [6], and the IP storage contans the targetmode SCSI drver for operatng the SCSI protocol. The network bandwdth s controlled by Token Bucket Flterng (TBF) [7]. We beleve that ths type of end-to-end traffc control works because no other traffc exsts between the storage clent and the IP storage. Table 1 shows the measured ops and rt for varous QoS requrements of Q 1 Q 4 when the amount of network bandwdth s computed by the proposed technque. In addton, they are compared wth the results wth the full network bandwdth for the same QoS requrements. We denote wth prot-rt and full for the proposed technque and the full network bandwdth, respectvely. Each Table 1. Results of ops and rt for the varous QoS requrements of Q 1 Q 8 by the proposed technque (prot-rt) and the full network bandwdth allocaton (full) QoS Technque Toward IP storage Toward clent ops rt Q 1 prot-rt 0.05MB/s 0.60MB/s 84(100%) 9.74ms full MB/s 100MB/s 82(100%) 9.70ms Q 2 prot-rt 1.84MB/s 0.17MB/s 265(99%) 2.59ms full MB/s 100MB/s 266(100%) 2.58ms Q 3 prot-rt 0.03MB/s 19.19MB/s 77(100%) 15.66ms full MB/s 100MB/s 76(100%) 15.34ms Q 4 prot-rt 15.67MB/s 0.02MB/s 211(100%) 20.28ms full MB/s 100MB/s 208(100%) 21.54ms of the storage QoS requrements s represented as follows: Q 1 = {f 1 =1,ops 1 = 82,sz 1 = 1KB,s 1 = 0,rt 1 = 10ms}, Q 2 = {f 2 = 0,ops 2 = 266,sz 2 = 1KB,s 2 =0,rt 2 =3ms}, Q 3 = {f 3 =1,ops 3 =76,sz 3 =64KB,s 3 =0,rt 3 = 18ms}, andq 4 = {f 4 =0,ops 4 = 208,sz 4 =64KB,s 4 =0,rt 4 =22ms}. The frst two requrements are for the small read and wrte I/O requests as n OLTP applcatons, and the others are for the large read and wrte I/O requests n scentfc applcatons [5]. Snce the network bandwdth allocaton s ndependent of storage access patterns, we assume that all the storage access patterns are purely random. In addton, the demanded IOPS of ops and ts assocated response tme of rt are confgured by njectng a set of I/O workload patterns and mea-
7 A Network Bandwdth Computaton Technque for IP Storage 479 surng each performance. Note that the ops and rt of the QoS requrements fall nto nether too lght traffc that makes the IP storage mostly dle nor too heavy traffc that overloads the system. The results reveal that the allocaton of only % of the full network bandwdth computed by the proposed technque can meet the gven storage QoS requrements. Observe that the proposed technque can compute an approprate amount of network bandwdth to provde the same qualty of storage servce as the case when the full network bandwdth s allocated. The percentage values n the ops column represent the percentage of the measured IOPS wth respect to the demanded IOPS. Table 2 shows the measured ops and rt for the QoS requrements of Q 1 Q 4 for the prot and nave technques. The prot technque computes the requred network bandwdth only by consderng the underlyng protocol overhead, as shown n Equaton (5) (6); that s, and.thenave technque smply calculates the network bandwdth by multplyng ops and sz. It assgns the same bandwdth for each drecton. As expected, the nave technque cannot guarantee even demanded ops, because t does not account for the underlyng protocol overhead n Ethernet, TCP/IP, and SCSI layers at all. Notce that Table 2. Results of ops and rt for the varous QoS requrements of Q 1 Q 8 by the technque usng Equaton (5) (6) (prot) and the technque usng ops sz (nave) QoS Technque Toward IP storage Toward clent ops rt Q 1 nave 0.06MB/s 0.06MB/s 64(77%) 28.82ms prot 0.01MB/s 0.12MB/s 80(96%) 12.99ms Q 2 nave 0.26MB/s 0.26MB/s 238(89%) 9.25ms prot 0.29MB/s 0.03MB/s 262(98%) 3.54ms Q 3 nave 4.78MB/s 4.78MB/s 69(91%) 22.31ms prot 0.01MB/s 5.19MB/s 74(96%) 19.33ms Q 4 nave 13.06MB/s 13.06MB/s 194(93%) 25.13ms prot 14.08MB/s 0.02MB/s 208(99%) 22.05ms the smaller szed I/O request causes hgher protocol overhead, as expected from Equaton (1) (4). In addton, the results show that read I/O requests creates more protocol overhead than wrte I/O requests. It can be expected manly from Equaton (2) (3). By contrast, the prot technque guarantees more than 96% of the requred ops. However, t does not satsfy the demanded response tme of rt because of the transmsson delay on IP network. Recall that, as shown n Table 1, the proposed prot-rt technque can meet both the ops and the rt by effectvely allottng the network bandwdth for each drecton between the storage clent and the IP storage.
8 480 Y.J. Nam et al. 5 Concluson and Future Work Ths paper addressed the problem of effectvely allocatng network bandwdth to assure a gven QoS requrement for IP storage. It defned a specfcaton of the storage QoS requrement, and t proposed a technque to compute the demanded network bandwdth to meet the storage QoS requrement that not only accounts for the overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. Performance evaluatons wth varous I/O workload patterns on our IP storage testbed verfed the correctness of the proposed technque; that s, allocatng a part (0.6 20%) of the entre network bandwdth can assure the gven storage QoS requrements. Currently, we have been revsng Equaton (9) (10) to addtonally account for real-world I/O workload patterns featured by self-smlarty and the condton of traffc congeston. Acknowledgments The authors would lke to thank the Mnstry of Educaton of Korea for ts fnancal support toward the Electrcal and Computer Engneerng Dvson at POSTECH through ts BK21 program. Ths research was also supported n part by the Korea Scence and Engneerng Foundaton (KOSEF) under grant number R and by HY-SDR IT Research Center. References 1. Meth, K., Satran, J.: Desgn of the scs protocol. In: Proceedngs of the Mass Storage Systems and Technologes/20th IEEE/11th NASA Goddard Conference. (2003) 2. Nam, Y.J.: Dynamc Storage QoS Control for Storage Cluster and RAID Performance Enhancement Technques. Ph.D Dssertaton, POSTECH (2004) 3. Anderson, E., Hobbs, M., Keeton, K., Spence, S., Uysal, M., Vetch, A.: Hppodrome: Runnng rngs around storage admnstraton. In: Proceedngs of Conference on Fle and Storage Technologes. (2002) 4. Ward, J., O Sullvan, M., Shahouman, T., Wlkes, J.: Appa: Automatc storage area network desgn. In: Proceedngs of Conference on Fle and Storage Technologes. (2002) 5. Alvarez, G., Borowsky, E., Go, S., Romer, T., Becker-Szendy, R., Goldng, R., Merchant, A., Spasojevc, M., Vetch, A., Wkes, J.: Mnerva: An automated resource provsonng tool for large-scale storage systems. ACM Transactons on Computer Systems 19 (2001) UNH: scs reference mplementaton. (2004) 7. Hurbert, B.: Lnux advanced routng & traffc control. (2003)
A Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationQuantifying Performance Models
Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationNeeded Information to do Allocation
Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationGoals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture
Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationA QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target
A QoS-aware Schedulng Scheme for Software-Defned Storage Orented SCSI Target Xanghu Meng 1,2, Xuewen Zeng 1, Xao Chen 1, Xaozhou Ye 1,* 1 Natonal Network New Meda Engneerng Research Center, Insttute of
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationDesign of the Application-Level Protocol for Synchronized Multimedia Sessions
Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationResearch Article. ISSN (Print) s k and. d k rate of k -th flow, source node and
Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationTwo-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture
Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*
ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationDynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks
Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy
Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationRouting in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationIR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication
Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationA RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood
A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationWITH rapid improvements of wireless technologies,
JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationOptimized caching in systems with heterogeneous client populations
Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationRemote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information
Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097
More informationKent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming
CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationEvaluation of TCP Variants and Bandwidth on Demand over Next Generation Satellite Network
Evaluaton of TCP Varants and Bandwdth on Demand over Next Generaton Satellte Network Songrth Kttperachol, Zhl Sun and Hatham Cruckshank Centre for Communcaton Systems Research Unversty of Surrey Guldford,
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationHarmonic Placement: File System Support for Scalable Streaming of Layer Encoded Object
Harmonc Placement: Fle System Support for Scalable Streamng of Layer Encoded Obect Sooyong Kang Department of Computer Scence Educaton Hanyang Unv., Seoul, 133-791, Korea syang@hanyang.ac.r Youp Won Seunghyun
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationInstantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 8, Aug. 2016 3753 Copyrght c2016 KSII Instantaneous Farness of TCP n Heterogeneous Traffc Wreless LAN Envronments Young-Jn Jung 1 and
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationMaximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches
Maxmum Weght Matchng Dspatchng Scheme n Buffered Clos-Network Packet Swtches Roberto Roas-Cessa, Member, IEEE, E Ok, Member, IEEE, and H. Jonathan Chao, Fellow, IEEE Abstract The scalablty of Clos-network
More informationPARNIAN: A TWO-STAGE NESTED-AUCTION FOR DYNAMIC BANDWIDTH ALLOCATION IN ETHERNET PASSIVE OPTICAL NETWORKS *
IJST, Transactons of Electrcal Engneerng, Vol. 35, No. E1, pp 45-61 Prnted n The Islamc Republc of Iran, 2011 Shraz Unversty PARNIAN: A TWO-STAGE NESTED-AUCTION FOR DYNAMIC BANDWIDTH ALLOCATION IN ETHERNET
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationBurst Round Robin as a Proportional-Share Scheduling Algorithm
Burst Round Robn as a Proportonal-Share Schedulng Algorthm Tarek Helmy * Abdelkader Dekdouk ** * College of Computer Scence & Engneerng, Kng Fahd Unversty of Petroleum and Mnerals, Dhahran 31261, Saud
More informationDynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationA Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network
, pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationChannel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7
Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca
More information