Modelling and Performance Evaluation of Router Transparent Web cache Mode

Size: px
Start display at page:

Download "Modelling and Performance Evaluation of Router Transparent Web cache Mode"

Transcription

1 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering, Nahrain University Baghdad, Iraq Abstract This paper modes and evauates the performance of router transparent web cache mode in oca area networks. A nearby transparent cache server intercepts cient s requests; forwarded by a ayer 3 router or a ayer 4 switch, and ooks for a copy in its oca cache store; if the object requested exits in its oca cache, then a cache resuts and the object is forwarded to the router immediatey which in turns deivers it to the cient. Otherwise, the cache estabishes a one-time TCP connection with the origin server and downoads that object. The anaytica modeing is carried out using state transition diagrams and open queuing network modeing where the average response time is evauated for different parameters ike probabiity of cache, cient requests arriva rate and externa arrivas at the origin server. We aso incude the deay effects of transmission media between the oca network and the Internet where the origin servers reside. Resuts obtained vaidate the mode and show the significance of depoying cache server in a network. Keywords cache mode, performance of transparent cache, cache state transition diagram. I. INTRODUCTION caching has been empoyed to improve the efficiency and reiabiity of data deivery over the Internet. A nearby cache can serve a cached page quicky even if the originating server is swamped or the network path to it is congested [1. Whie this argument provides the sefinterested user with the motivation to expoit caches, it is worth noting that using widespread use of caches aso engenders a genera good: if requests are intercepted by nearby caches, then fewer go to the source server, reducing oad on the server and network traffic to the benefit of a users. Besides the advantage of reducing oad on webservers, caching frequenty visited internet objects reduces ISPs bandwidth effectivey. This fact may change when these objects are dynamic non-cacheabe contents [2. This is due to the cache-contro pragma webservers issue in their headers which in turn cause cache rate percentage number of requested objects fetched from the cache store to the tota number of cients requests to be ow when most of cients requests are for dynamic contents. To overcome this imitation, an vioation shoud be enabed in the cache to modify this cache-contro pragma and have that object cached. The other advantage of using web cache servers is reated to cient speed directy. If we assume that the cient has a imited bandwidth controed by his ISP, then in genera the overa speed is enhanced especiay for oaded webservers. This is done by aowing temporariy high speed for cients requesting objects from the cache storage. The most obvious approach, of providing a group of users with a singe, shared caching server in standaone mode, has severa drawbacks. If the caching machine fais, a users are cut off from the. Even whie running, a singe cache is imited in the number of users it can serve, and may become a botteneck during periods of intense use. This is directy reated to hardware and software used for web caching. The hardware part is the storage media and dynamic memory aocation. The software contros the way web cache reads, writes, swap-out and repace objects. cache depoyment incudes: standaone, router transparent and switch transparent modes [3. In standaone mode, the cache server acts as a gateway between cients and web. In transparent mode, cient requests are redirected using a router or a ayer 4 switch to cache as shown in Fig. 1. Cients Cients Cients Cache Cache Standaone mode Layer 4 Switch First it marks a requests that contain destination port. Then uses destination NAT to cache server transparent mode Cache It examines the destination port of a incoming requests, if it contains port, then it forwards them to the cache Switch transparent mode Fig. 1 cache depoyment methods II. RELATED WORK content deivery using caches has been discussed in the iterature for quite ong time. There have been recent 1316

2 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, researches on using open network queuing modes for web cache performance evauation. The foowing is a ist of reated works in this area: Bose and Cheng [4 examine the impact of instaing a proxy cache server PCS on overa response time to requests. They anayzed how various factors affect the performance of that server. Their anaysis is based on modeing the proxy cache server using open queuing network approach and the research specificay identifies a crossover probabiity, the minimum cache rate probabiity at which instaing a proxy cache server becomes beneficia. Berczes and Sztrik [5 modified the performance mode in [4 to a more reaistic case when externa visits are aso aowed to the remote servers and the servers have imited buffer. They anayzed how many parameters affect the performance of a Proxy Cache. Numerica resuts for the overa response time with and without a PCS are obtained. These resuts show that the benefit of a PCS depends on various factors. Severa numerica exampes iustrate the effect of visit rates, visit rates for the externa users, and the cache rate probabiity on the mean response times. Berczes [6 evauates the performance of a PCS when the incoming arrivas and service time are generay distributed. The work considers the network mode of [4 as the first step then an expression for the overa system time is evauated using the proposed distributions. For other iterature references, we point to other reated references [7-[10. In this paper, we evauate the performance of a transparent cache depoyed in a oca area network where we first mode the network using state transition diagrams then we give anaytica formuation to the average response time with and without cache server. arrivas from cients denoted by λ. In Fig. 2, the state transition probabiities are given as foows: : the probabiity that the router detects an request port of an arriva and direct it to the cache. The rest are directed to the corresponding non- servers. : the probabiity of cache, in which the cache finds a copy of the requested object in its oca cache and deivered it to the router immediatey. : the probabiity of cache miss, in which the cache does not find a copy of the requested object in its oca cache and forced to downoad it from the origin server. : the probabiity that the cache response back to router with requested object cache-miss. : the probabiity that the non- server responds back to the router for non- requests : the probabiity that the server responds back to cache request for cache-miss requests III. TRANSPARENT WEB CACHE OPERATION In transparent cache mode, a router or a ayer 4 switch is configured to intercept cient s request for object of the type request with destination port and redirect it to a nearby cache caed an interceptor cache sometimes [11. The atter resoves that request and ook for any avaiabe not expired copy of the requested object in its oca cache. If the object exists then a cache is resuted and the object is deivered to that cient with an overa response time dependent on the cache speed and ink speed. On the other and, a cache miss is resuted when the requested object is not found in the oca cache store which forces the cache to contact the origin server and fetches that object, deivered to the cient whie creating a copy in its oca cache for future requests of the same object. The overa response time in the case of cache miss depends on many factors ike cache speed, ink speed between the cache and the origin server, its Network bandwidth and the probabiity of bocking at the origin server itsef. We wi adopt state transition diagrams to mode the network response time with transparent cache server. Fig. 2 shows the state transition diagrams of cache and cache miss for transparent router mode operation with incoming The state transition diagram shown in Fig. 2 can be converted into the equivaent open queuing network mode shown in Fig. 3. The foowing section gives detaied anaytica formuation to the overa response time based on the queue mode given in Fig. 3. To Cient From Cient Non 1-p 1-p From Cient To Cient wr Non 1-p cache cache State transition diagram for cache hw State transition diagram for cache miss Fig. 2 State transition diagrams of router transparent cache mode Network e p 2 p H it 1 3 L1 1-p server TCP handshake - L2 Net Bandwidth Cache Net Bandwidth Non- server Cient Network TCP handshake L2 Miss p L1 Fig. 3 open queuing network mode of router transparent cache mode

3 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, IV. ANALYTICAL MODELLING As shown in Fig. 3, the incoming arrivas λ from cient network are handed by the gateway router which examines the destination port and route the traffic into two directions. traffic with probabiity wi be routed to the cache server and non- traffic with probabiity wi be routed to their destination servers node 1. The cache server upon an arriva of a request searches its oca cache store for a copy of the requested object, if the object exists then represents the probabiity of cache. represents the probabiity of cache Otherwise, misses and the requested object is fetched from the origin server node 2. Since the connection between the router or/and the cache to the origin servers is done through internet, then we incude this ink as a queue mode as shown in Fig. 3. We aso assume that this connection starts with a one-time TCP 3-way handshake which is represented by the two circes in Fig. 3. This handshake depends on the round trip time RTT of the ink between the two ends i.e., ISP ink. Therefore, we have represented each one-way ink with a queue to highight the deay amount this ink adds to the overa response time. The performance of the origin servers are characterized by the capacity of its output buffer, the static server time, and the dynamic server rate [7,12. In our mode we assume that the server has a buffer of capacity. Let be the probabiity that a request wi be denied by the server i.e., probabiity of bocking. From basic queuing theory the bocking probabiity for the M/M/1/K queuing system is given by [13: 1 with [12, is the average router system time in seconds, is the average cache system time in seconds and is the average non- system time in seconds The average response time spent in the router queue in Eq. 5 can be represented by an M/M/1 queue. Assuming the processing rate of this router is much more than the arriva rate, then: 6 is the router service rate. Considering a FIFO router queue discipine, incoming requests from cients wi have to pass the router input queue then processed by the NAT chain and redirected to the corresponding destination. The same process wi occur when a response comes from the cache. The second term in Eq. 5 is the average response time for the cache for both cache and cache miss as shown in Fig 3: 7 is the average cache ookup time to check whether the requested object exists in its oca cache store or not. This is derived from the waiting time in an M/M/1 queue where the arrivas form a Poisson process with rate λ and the service rate is. It can be formed as: The second term in Eq. 7 is the response time of a cache. This can be obtained by summing the average response time of the cache object fetch, deivered to the router and finay to the cient network. Thus: 3 server 9 4 Externa arrivas Arrivas from cache Where the subscript wi denote the server and is the sum of arrivas from our cache server and externa arrivas denoted by as shown in Fig. 4. Then: [ 5 8 gives, 2 In order to find the response time for the modeed transparent router mode, we must consider the sum of responses from cache, cache miss and non- requests. Then, the overa response time can be stated as: µ Dropped arrivas Fig. 4 The origin server queuing mode showing externa arrivas Inside the brackets of Eq. 9, the first item is the system time in the cache, where is the cache output buffer in bytes, is the cache static server time in seconds, is the cache dynamic server rate in bytes/seconds and is the average object fie size in bytes. The second item in Eq. 9 corresponds to the required time for the router to route the requested object to cient. Finay, the ast term is the time required to transfer the object over the 1318

4 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, cient network bandwidth where is the cient network bandwidth in bits/seconds. The ast term in Eq. 7 is the average response time when there is a cache miss. Therefore: [ When there is no cache server, then the state transition diagram is as shown in Fig. 5 and the average response time can be formed as: To Cient Non 1-Pb 1-p From Cient Fig. 5 State transition diagram without transparent cache mode The reader can notice that the service rate of the cache server is the same as the server! This is due to the fact that the cache acts as an server reative to cient when deivering objects, and as a cient when connecting to the origin server. Returning back to Eq. 10, the first term represents the internet ink deays where Equation 12 is the same as Eq. 5 except for the second term that corresponds to the response time from the server. It is given by: is the ink service rate which is a function of the ISP s ink speed and object size. When the cache does not find a copy of the requested object in its oca cache store, it estabishes a one-time TCP connection with the origin server to fetch that object. This operation is modeed by the second term in Eq. 10 where is the TCP handshake service ookup rate. The response time of the server for deivering the object is shown in the third term of Eq. 10 and the server network response time is shown in the fourth term, where is the server network bandwidth. The rest terms in Eq. 10 are the same as those in Eq. 9 which modes the response from the cache server when it receives the requested object from the server. If the size of the requested object is greater than the server's output buffer it wi start a ooping process unti the deivery of a requested objects is competed [6. This operation is expressed by the vaue in the third term of Eq. 10 and the first term in Eq. 9. Finay, the time for non- requests can be modeed by: [ [ 11 [ [ 13 V. SIMULATION RESULTS To evauate the performance of the modeed router transparent mode cache network, we adopt the foowing parameters vaue: We conduct severa tests for the modeed network with and without transparent cache to evauate the overa average response time for a cient request. The foowing subsections discuss these tests. A. Effect of existence of transparent cache and its probabiity of cache The first resut obtained by evauating the average response time versus arriva rate λ for different vaues of probabiity of rates as shown in Fig. 6. The dotted ine in Fig. 6 is the average response time for the network without a transparent cache, whie the other curves are the responses when is varied from 0 to 50% cache rates. It is cear that a transparent cache with higher cache rates improve the overa network response time. For exampe, 10% cache rate has cose performance to that without the cache. Whie for λ above 20% the response time dramaticay changes to ower vaues. In practice however, cache rate is reated to the amount of stored frequenty visited objects in 1319

5 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, cache disks and therefore cannot be configured to have fixed vaues. Fig. 6 Average response time versus arriva rate. %, L K=100. the router and the effect of cient network bandwidth. Verification of the anaytica modeing is carried out using numerica anaysis where different outcomes are discussed. The resuts obtained indicate that the network average response time can be enhanced using a transparent cache given that the atter one can produce considerabe amount of cache rates more than of 20% and more. On the other hand, we aowed through anaytica modeing that the origin server can hande externa arriva rates from other users over the Internet. When we increase this rate, we found that the performance of the depoyed transparent router mode cache is satisfactory which confirms one of the advantages of depoying cache in a network; that is, reducing the amount of traffic on the origin servers. REFERENCES =100, [1 B. Effect of Externa Arrivas rate at the Origin One of the advantages of depoying cache server in a network is to improve the performance of interna cients browsing heaviy oaded servers. Fig. 7 shows the resuts obtained when we vary the externa incoming rate to the server L from 90 to 140 req/s and evauate the average response time versus λ with. The upper curves denote performance without cache whie the ower curves are for transparent cache. It is cear that even when the origin server response time is increased due to increase in incoming externa arrivas, the average response time for the network with a transparent web cache remains at ower eves. [2 [3 [4 [5 [6 [7 [8 [9 [10 Fig. 7 Average response time versus arriva rate with variabe externa arriva rates at the origin server. %, L =100, 20% cache rate, K=100 [11 [12 VI. CONCLUSIONS In this paper, we use anaytica modeing to find the average response time of a network with transparent cache using state transition diagrams and open network queuing modeing. To examine this mode, we carried numerica tests by varying different parameters ike the cient arriva rate, probabiity of cache and externa arrivas to the origin server. The modeed network in this work incudes effects of transmission deay between the oca network and the origin servers, the processing deay time of [ D. M. Karger, A. Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Yoav Yerushami, caching with consistent hashing, Int. Journa of Computer and Teecommunications Networking Vo. 31, Issue 11-16, pp , May C. Amza, G. Soundararajan, E. Cecchet and R. Aes, Transparent caching with strong consistency in dynamic content web sites, Proc. 19th annua int. conf. on Supercomputing, pp , G. Barish and K. Obraczke, Word Wide caching: trends and techniques, IEEE Comm. Magazine, Vo. 38, Issue 5, pp , May I. Bose and H. K. Cheng, Performance modes of a firms proxy cache server, Decision Support Systems and Eectronic Commerce, Vo. 29, Issue 1, pp , Juy T. Berczes and J. Sztrik, Performance Modeing of Proxy Cache s, Journa of Universa Computer Science, vo. 12, no. 9, pp , T. Berczes, Approximation approach to performance evauation of Proxy Cache systems, Annaes Mathematicae et Informaticae, Vo. 36, pp , T. Berczes, G. Guta, G. Kusper, W. Schreiner and J. Sztrik, Anayzing a Proxy Cache Performance Mode with the Probabiistic Mode Checker PRISM, Proc. 5th Int. Workshop on Automated Specification and Verification of Systems WWV 2009, J. Z. Wang, Z. Du and P.K. Srimani, Network cache mode for wireess proxy caching IEEE Int. Symposium on Modeing, Anaysis, and Simuation of Computer and Teecommunication Systems, pp , T. Berczes and J. Sztrik, A queueing network mode to study Proxy Cache s, Proc. of the 7th Int. Conf. on Appied Informatics Eger, Hungary, Vo. 1. pp , Jan R. Srivastava, Estimation of Proxy Cache Size using G/G/1 Queuing Mode, Int. Journa of Appied Research on Information Technoogy and Computing IJARITAC, Vo. 1, No. 1, pp.46-58, Apri K. Saini, Squid Proxy 3.1, Packt Pubishing Ltd, L. P. Sothouber, A Mode of Performance, Proc. 5th Int. Word Wide Conference, C. G. Cassandras, S. Lafortune, Introduction to Discrete Event Systems, Springer, 2008.

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Performance Modeling of Proxy Cache Servers

Performance Modeling of Proxy Cache Servers Journal of Universal Computer Science, vol. 2, no. 9 (2006), 39-53 submitted: 3/2/05, accepted: 2/5/06, appeared: 28/9/06 J.UCS Performance Modeling of Proxy Cache Servers Tamás Bérczes, János Sztrik (Department

More information

Error Control Strategies for WiMAX Multi-hop Relay Networks

Error Control Strategies for WiMAX Multi-hop Relay Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Infinite Server Queueing Networks with Deadline Based Routing

Infinite Server Queueing Networks with Deadline Based Routing Infinite Server Queueing Networks with Deadine Based Routing Nea Master and Nichoas Bambos BCMP networks in the more genera framework of Key networks [8]. Key networks have been used and buit upon in severa

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Data Management Updates

Data Management Updates Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A queueing network model to study Proxy Cache Servers

A queueing network model to study Proxy Cache Servers Proceedings of the 7 th International Conference on Applied Informatics Eger, Hungary, January 28 31, 2007. Vol. 1. pp. 203 210. A queueing network model to study Proxy Cache Servers Tamás Bérczes, János

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Quick Start Instructions

Quick Start Instructions Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

RST. Radar System Tester

RST. Radar System Tester RST Radar System Tester Radar System Tester The Radar System Tester (RST) is a reiabe and convenient test too for anaysis, maintenance and repair of a ong ine of equipment attached to anaogue radars, and

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet. Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

OVSF based fair and multiplexed priority calls assignment CDMA Networks

OVSF based fair and multiplexed priority calls assignment CDMA Networks OVSF based fair and mutipexed priority cas assignment CDMA Networks VIPIN BAYAN 1, DAVINDER S SAINI 2, GUNJAN GUPTA 3 Department of Eectronics and Communication Engineering, Jaypee Institute of Information

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

HTTP Random Access and Live Resources IETF 100

HTTP Random Access and Live Resources IETF 100 HTTP Random Access and Live Resources IETF 1 Barbara Stark bs7652@att.com Darshak Thakore d.thakore@cabeabs.com Craig Pratt pratt@acm.org / craig@ecaspia.com Use existing bytes Range Unit with very arge

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

ON-DEMAND video services encompass many important

ON-DEMAND video services encompass many important IEEE TRANSACTIONS ON COMPUTERS, VOL. 5, NO. 7, JULY 00 907 Modeing and Dimensioning Hierarchica Storage Systems for Low-Deay Video Services S.-H. Gary Chan, Member, IEEE, and Fouad A. Tobagi, Feow, IEEE

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

Modeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks

Modeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks Internationa Journa of Eectrica and Eectronics Engineering 4:1 2010 Modeing and Anaysis of Adaptive Buffer Saring Sceme for Consecutive Packet Loss Reduction in Broadband Networks Saksi Kausa, R.K Sarma

More information

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

Portable Compiler Optimisation Across Embedded Programs and Microarchitectures using Machine Learning

Portable Compiler Optimisation Across Embedded Programs and Microarchitectures using Machine Learning Portabe Compier Optimisation Across Embedded Programs and Microarchitectures using Machine Learning Christophe Dubach, Timothy M. Jones, Edwin V. Bonia Members of HiPEAC Schoo of Informatics University

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

3GPP TS V7.1.0 ( )

3GPP TS V7.1.0 ( ) TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

Feedback-Free Packet Loss Recovery for Video Multicast

Feedback-Free Packet Loss Recovery for Video Multicast Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 2014

5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 2014 5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 014 Modeing IEEE 80.15.4 Networks Over Fading Channes Piergiuseppe Di Marco, Member, IEEE, Caro Fischione, Member, IEEE, Fortunato

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Crossbars with Minimally-Sized Crosspoint Buffers

Crossbars with Minimally-Sized Crosspoint Buffers Crossbars with Minimay-Sized Crosspoint Buffers Nikos Chrysos and Manois Katevenis Inst. of Computer Science (ICS), Foundation for Research and Technoogy - Heas (FORTH) - member of HiPEAC FORTH-ICS, Vassiika

More information

DESIGN AND SOFTWARE ARCHITECTURE OF BUFFERING MECHANISM FOR PEER-TO-PEER STREAMING NETWORK SIMULATION

DESIGN AND SOFTWARE ARCHITECTURE OF BUFFERING MECHANISM FOR PEER-TO-PEER STREAMING NETWORK SIMULATION DESIGN AND SOFTWARE ARCHITECTURE OF BUFFERING MECHANISM FOR PEER-TO-PEER STREAMING NETWORK SIMULATION Yuiya V. Gaidamaka Andrey K. Samuyov Ekaterina G. Medvedeva Ivan Yu. Vasiiev Pave O. Abaev Appied Probabiity

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Eaton 93PM Remote Monitoring Device. Installation and Operation Manual

Eaton 93PM Remote Monitoring Device. Installation and Operation Manual Eaton 93PM Remote Monitoring Device Instaation and Operation Manua IMPORTANT SAFETY INSTRUCTIONS SAVE THESE INSTRUCTIONS This manua contains important instructions that you shoud foow during instaation

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information