Modelling and Performance Evaluation of Router Transparent Web cache Mode
|
|
- Abraham Welch
- 5 years ago
- Views:
Transcription
1 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering, Nahrain University Baghdad, Iraq Abstract This paper modes and evauates the performance of router transparent web cache mode in oca area networks. A nearby transparent cache server intercepts cient s requests; forwarded by a ayer 3 router or a ayer 4 switch, and ooks for a copy in its oca cache store; if the object requested exits in its oca cache, then a cache resuts and the object is forwarded to the router immediatey which in turns deivers it to the cient. Otherwise, the cache estabishes a one-time TCP connection with the origin server and downoads that object. The anaytica modeing is carried out using state transition diagrams and open queuing network modeing where the average response time is evauated for different parameters ike probabiity of cache, cient requests arriva rate and externa arrivas at the origin server. We aso incude the deay effects of transmission media between the oca network and the Internet where the origin servers reside. Resuts obtained vaidate the mode and show the significance of depoying cache server in a network. Keywords cache mode, performance of transparent cache, cache state transition diagram. I. INTRODUCTION caching has been empoyed to improve the efficiency and reiabiity of data deivery over the Internet. A nearby cache can serve a cached page quicky even if the originating server is swamped or the network path to it is congested [1. Whie this argument provides the sefinterested user with the motivation to expoit caches, it is worth noting that using widespread use of caches aso engenders a genera good: if requests are intercepted by nearby caches, then fewer go to the source server, reducing oad on the server and network traffic to the benefit of a users. Besides the advantage of reducing oad on webservers, caching frequenty visited internet objects reduces ISPs bandwidth effectivey. This fact may change when these objects are dynamic non-cacheabe contents [2. This is due to the cache-contro pragma webservers issue in their headers which in turn cause cache rate percentage number of requested objects fetched from the cache store to the tota number of cients requests to be ow when most of cients requests are for dynamic contents. To overcome this imitation, an vioation shoud be enabed in the cache to modify this cache-contro pragma and have that object cached. The other advantage of using web cache servers is reated to cient speed directy. If we assume that the cient has a imited bandwidth controed by his ISP, then in genera the overa speed is enhanced especiay for oaded webservers. This is done by aowing temporariy high speed for cients requesting objects from the cache storage. The most obvious approach, of providing a group of users with a singe, shared caching server in standaone mode, has severa drawbacks. If the caching machine fais, a users are cut off from the. Even whie running, a singe cache is imited in the number of users it can serve, and may become a botteneck during periods of intense use. This is directy reated to hardware and software used for web caching. The hardware part is the storage media and dynamic memory aocation. The software contros the way web cache reads, writes, swap-out and repace objects. cache depoyment incudes: standaone, router transparent and switch transparent modes [3. In standaone mode, the cache server acts as a gateway between cients and web. In transparent mode, cient requests are redirected using a router or a ayer 4 switch to cache as shown in Fig. 1. Cients Cients Cients Cache Cache Standaone mode Layer 4 Switch First it marks a requests that contain destination port. Then uses destination NAT to cache server transparent mode Cache It examines the destination port of a incoming requests, if it contains port, then it forwards them to the cache Switch transparent mode Fig. 1 cache depoyment methods II. RELATED WORK content deivery using caches has been discussed in the iterature for quite ong time. There have been recent 1316
2 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, researches on using open network queuing modes for web cache performance evauation. The foowing is a ist of reated works in this area: Bose and Cheng [4 examine the impact of instaing a proxy cache server PCS on overa response time to requests. They anayzed how various factors affect the performance of that server. Their anaysis is based on modeing the proxy cache server using open queuing network approach and the research specificay identifies a crossover probabiity, the minimum cache rate probabiity at which instaing a proxy cache server becomes beneficia. Berczes and Sztrik [5 modified the performance mode in [4 to a more reaistic case when externa visits are aso aowed to the remote servers and the servers have imited buffer. They anayzed how many parameters affect the performance of a Proxy Cache. Numerica resuts for the overa response time with and without a PCS are obtained. These resuts show that the benefit of a PCS depends on various factors. Severa numerica exampes iustrate the effect of visit rates, visit rates for the externa users, and the cache rate probabiity on the mean response times. Berczes [6 evauates the performance of a PCS when the incoming arrivas and service time are generay distributed. The work considers the network mode of [4 as the first step then an expression for the overa system time is evauated using the proposed distributions. For other iterature references, we point to other reated references [7-[10. In this paper, we evauate the performance of a transparent cache depoyed in a oca area network where we first mode the network using state transition diagrams then we give anaytica formuation to the average response time with and without cache server. arrivas from cients denoted by λ. In Fig. 2, the state transition probabiities are given as foows: : the probabiity that the router detects an request port of an arriva and direct it to the cache. The rest are directed to the corresponding non- servers. : the probabiity of cache, in which the cache finds a copy of the requested object in its oca cache and deivered it to the router immediatey. : the probabiity of cache miss, in which the cache does not find a copy of the requested object in its oca cache and forced to downoad it from the origin server. : the probabiity that the cache response back to router with requested object cache-miss. : the probabiity that the non- server responds back to the router for non- requests : the probabiity that the server responds back to cache request for cache-miss requests III. TRANSPARENT WEB CACHE OPERATION In transparent cache mode, a router or a ayer 4 switch is configured to intercept cient s request for object of the type request with destination port and redirect it to a nearby cache caed an interceptor cache sometimes [11. The atter resoves that request and ook for any avaiabe not expired copy of the requested object in its oca cache. If the object exists then a cache is resuted and the object is deivered to that cient with an overa response time dependent on the cache speed and ink speed. On the other and, a cache miss is resuted when the requested object is not found in the oca cache store which forces the cache to contact the origin server and fetches that object, deivered to the cient whie creating a copy in its oca cache for future requests of the same object. The overa response time in the case of cache miss depends on many factors ike cache speed, ink speed between the cache and the origin server, its Network bandwidth and the probabiity of bocking at the origin server itsef. We wi adopt state transition diagrams to mode the network response time with transparent cache server. Fig. 2 shows the state transition diagrams of cache and cache miss for transparent router mode operation with incoming The state transition diagram shown in Fig. 2 can be converted into the equivaent open queuing network mode shown in Fig. 3. The foowing section gives detaied anaytica formuation to the overa response time based on the queue mode given in Fig. 3. To Cient From Cient Non 1-p 1-p From Cient To Cient wr Non 1-p cache cache State transition diagram for cache hw State transition diagram for cache miss Fig. 2 State transition diagrams of router transparent cache mode Network e p 2 p H it 1 3 L1 1-p server TCP handshake - L2 Net Bandwidth Cache Net Bandwidth Non- server Cient Network TCP handshake L2 Miss p L1 Fig. 3 open queuing network mode of router transparent cache mode
3 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, IV. ANALYTICAL MODELLING As shown in Fig. 3, the incoming arrivas λ from cient network are handed by the gateway router which examines the destination port and route the traffic into two directions. traffic with probabiity wi be routed to the cache server and non- traffic with probabiity wi be routed to their destination servers node 1. The cache server upon an arriva of a request searches its oca cache store for a copy of the requested object, if the object exists then represents the probabiity of cache. represents the probabiity of cache Otherwise, misses and the requested object is fetched from the origin server node 2. Since the connection between the router or/and the cache to the origin servers is done through internet, then we incude this ink as a queue mode as shown in Fig. 3. We aso assume that this connection starts with a one-time TCP 3-way handshake which is represented by the two circes in Fig. 3. This handshake depends on the round trip time RTT of the ink between the two ends i.e., ISP ink. Therefore, we have represented each one-way ink with a queue to highight the deay amount this ink adds to the overa response time. The performance of the origin servers are characterized by the capacity of its output buffer, the static server time, and the dynamic server rate [7,12. In our mode we assume that the server has a buffer of capacity. Let be the probabiity that a request wi be denied by the server i.e., probabiity of bocking. From basic queuing theory the bocking probabiity for the M/M/1/K queuing system is given by [13: 1 with [12, is the average router system time in seconds, is the average cache system time in seconds and is the average non- system time in seconds The average response time spent in the router queue in Eq. 5 can be represented by an M/M/1 queue. Assuming the processing rate of this router is much more than the arriva rate, then: 6 is the router service rate. Considering a FIFO router queue discipine, incoming requests from cients wi have to pass the router input queue then processed by the NAT chain and redirected to the corresponding destination. The same process wi occur when a response comes from the cache. The second term in Eq. 5 is the average response time for the cache for both cache and cache miss as shown in Fig 3: 7 is the average cache ookup time to check whether the requested object exists in its oca cache store or not. This is derived from the waiting time in an M/M/1 queue where the arrivas form a Poisson process with rate λ and the service rate is. It can be formed as: The second term in Eq. 7 is the response time of a cache. This can be obtained by summing the average response time of the cache object fetch, deivered to the router and finay to the cient network. Thus: 3 server 9 4 Externa arrivas Arrivas from cache Where the subscript wi denote the server and is the sum of arrivas from our cache server and externa arrivas denoted by as shown in Fig. 4. Then: [ 5 8 gives, 2 In order to find the response time for the modeed transparent router mode, we must consider the sum of responses from cache, cache miss and non- requests. Then, the overa response time can be stated as: µ Dropped arrivas Fig. 4 The origin server queuing mode showing externa arrivas Inside the brackets of Eq. 9, the first item is the system time in the cache, where is the cache output buffer in bytes, is the cache static server time in seconds, is the cache dynamic server rate in bytes/seconds and is the average object fie size in bytes. The second item in Eq. 9 corresponds to the required time for the router to route the requested object to cient. Finay, the ast term is the time required to transfer the object over the 1318
4 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, cient network bandwidth where is the cient network bandwidth in bits/seconds. The ast term in Eq. 7 is the average response time when there is a cache miss. Therefore: [ When there is no cache server, then the state transition diagram is as shown in Fig. 5 and the average response time can be formed as: To Cient Non 1-Pb 1-p From Cient Fig. 5 State transition diagram without transparent cache mode The reader can notice that the service rate of the cache server is the same as the server! This is due to the fact that the cache acts as an server reative to cient when deivering objects, and as a cient when connecting to the origin server. Returning back to Eq. 10, the first term represents the internet ink deays where Equation 12 is the same as Eq. 5 except for the second term that corresponds to the response time from the server. It is given by: is the ink service rate which is a function of the ISP s ink speed and object size. When the cache does not find a copy of the requested object in its oca cache store, it estabishes a one-time TCP connection with the origin server to fetch that object. This operation is modeed by the second term in Eq. 10 where is the TCP handshake service ookup rate. The response time of the server for deivering the object is shown in the third term of Eq. 10 and the server network response time is shown in the fourth term, where is the server network bandwidth. The rest terms in Eq. 10 are the same as those in Eq. 9 which modes the response from the cache server when it receives the requested object from the server. If the size of the requested object is greater than the server's output buffer it wi start a ooping process unti the deivery of a requested objects is competed [6. This operation is expressed by the vaue in the third term of Eq. 10 and the first term in Eq. 9. Finay, the time for non- requests can be modeed by: [ [ 11 [ [ 13 V. SIMULATION RESULTS To evauate the performance of the modeed router transparent mode cache network, we adopt the foowing parameters vaue: We conduct severa tests for the modeed network with and without transparent cache to evauate the overa average response time for a cient request. The foowing subsections discuss these tests. A. Effect of existence of transparent cache and its probabiity of cache The first resut obtained by evauating the average response time versus arriva rate λ for different vaues of probabiity of rates as shown in Fig. 6. The dotted ine in Fig. 6 is the average response time for the network without a transparent cache, whie the other curves are the responses when is varied from 0 to 50% cache rates. It is cear that a transparent cache with higher cache rates improve the overa network response time. For exampe, 10% cache rate has cose performance to that without the cache. Whie for λ above 20% the response time dramaticay changes to ower vaues. In practice however, cache rate is reated to the amount of stored frequenty visited objects in 1319
5 Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7, cache disks and therefore cannot be configured to have fixed vaues. Fig. 6 Average response time versus arriva rate. %, L K=100. the router and the effect of cient network bandwidth. Verification of the anaytica modeing is carried out using numerica anaysis where different outcomes are discussed. The resuts obtained indicate that the network average response time can be enhanced using a transparent cache given that the atter one can produce considerabe amount of cache rates more than of 20% and more. On the other hand, we aowed through anaytica modeing that the origin server can hande externa arriva rates from other users over the Internet. When we increase this rate, we found that the performance of the depoyed transparent router mode cache is satisfactory which confirms one of the advantages of depoying cache in a network; that is, reducing the amount of traffic on the origin servers. REFERENCES =100, [1 B. Effect of Externa Arrivas rate at the Origin One of the advantages of depoying cache server in a network is to improve the performance of interna cients browsing heaviy oaded servers. Fig. 7 shows the resuts obtained when we vary the externa incoming rate to the server L from 90 to 140 req/s and evauate the average response time versus λ with. The upper curves denote performance without cache whie the ower curves are for transparent cache. It is cear that even when the origin server response time is increased due to increase in incoming externa arrivas, the average response time for the network with a transparent web cache remains at ower eves. [2 [3 [4 [5 [6 [7 [8 [9 [10 Fig. 7 Average response time versus arriva rate with variabe externa arriva rates at the origin server. %, L =100, 20% cache rate, K=100 [11 [12 VI. CONCLUSIONS In this paper, we use anaytica modeing to find the average response time of a network with transparent cache using state transition diagrams and open network queuing modeing. To examine this mode, we carried numerica tests by varying different parameters ike the cient arriva rate, probabiity of cache and externa arrivas to the origin server. The modeed network in this work incudes effects of transmission deay between the oca network and the origin servers, the processing deay time of [ D. M. Karger, A. Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Yoav Yerushami, caching with consistent hashing, Int. Journa of Computer and Teecommunications Networking Vo. 31, Issue 11-16, pp , May C. Amza, G. Soundararajan, E. Cecchet and R. Aes, Transparent caching with strong consistency in dynamic content web sites, Proc. 19th annua int. conf. on Supercomputing, pp , G. Barish and K. Obraczke, Word Wide caching: trends and techniques, IEEE Comm. Magazine, Vo. 38, Issue 5, pp , May I. Bose and H. K. Cheng, Performance modes of a firms proxy cache server, Decision Support Systems and Eectronic Commerce, Vo. 29, Issue 1, pp , Juy T. Berczes and J. Sztrik, Performance Modeing of Proxy Cache s, Journa of Universa Computer Science, vo. 12, no. 9, pp , T. Berczes, Approximation approach to performance evauation of Proxy Cache systems, Annaes Mathematicae et Informaticae, Vo. 36, pp , T. Berczes, G. Guta, G. Kusper, W. Schreiner and J. Sztrik, Anayzing a Proxy Cache Performance Mode with the Probabiistic Mode Checker PRISM, Proc. 5th Int. Workshop on Automated Specification and Verification of Systems WWV 2009, J. Z. Wang, Z. Du and P.K. Srimani, Network cache mode for wireess proxy caching IEEE Int. Symposium on Modeing, Anaysis, and Simuation of Computer and Teecommunication Systems, pp , T. Berczes and J. Sztrik, A queueing network mode to study Proxy Cache s, Proc. of the 7th Int. Conf. on Appied Informatics Eger, Hungary, Vo. 1. pp , Jan R. Srivastava, Estimation of Proxy Cache Size using G/G/1 Queuing Mode, Int. Journa of Appied Research on Information Technoogy and Computing IJARITAC, Vo. 1, No. 1, pp.46-58, Apri K. Saini, Squid Proxy 3.1, Packt Pubishing Ltd, L. P. Sothouber, A Mode of Performance, Proc. 5th Int. Word Wide Conference, C. G. Cassandras, S. Lafortune, Introduction to Discrete Event Systems, Springer, 2008.
TSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationFast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model
Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationPerformance Modeling of Proxy Cache Servers
Journal of Universal Computer Science, vol. 2, no. 9 (2006), 39-53 submitted: 3/2/05, accepted: 2/5/06, appeared: 28/9/06 J.UCS Performance Modeling of Proxy Cache Servers Tamás Bérczes, János Sztrik (Department
More informationError Control Strategies for WiMAX Multi-hop Relay Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract
More informationunderstood as processors that match AST patterns of the source language and translate them into patterns in the target language.
A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationQoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization
QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica
More informationInfinite Server Queueing Networks with Deadline Based Routing
Infinite Server Queueing Networks with Deadine Based Routing Nea Master and Nichoas Bambos BCMP networks in the more genera framework of Key networks [8]. Key networks have been used and buit upon in severa
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationNOWDAYS, our ways of living are under gradual but
Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this
More informationCLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING
CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:
More informationModeling the Time Varying Behavior of Mobile Ad-Hoc Networks
Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico
More informationBEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0
BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationFormulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations
Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationpower-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues
DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business
More informationReadme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT
ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationInfinity Connect Web App Customization Guide
Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006
ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationData Management Updates
Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study
More informationUnixWare 7 System Administration UnixWare 7 System Configuration
UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration
More informationMeeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers
Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationA queueing network model to study Proxy Cache Servers
Proceedings of the 7 th International Conference on Applied Informatics Eger, Hungary, January 28 31, 2007. Vol. 1. pp. 203 210. A queueing network model to study Proxy Cache Servers Tamás Bérczes, János
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationQuick Start Instructions
Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway
More informationBridge Talk Release Notes for Meeting Exchange 5.0
Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief
More informationRST. Radar System Tester
RST Radar System Tester Radar System Tester The Radar System Tester (RST) is a reiabe and convenient test too for anaysis, maintenance and repair of a ong ine of equipment attached to anaogue radars, and
More informationOptimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul
Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28
More informationAvaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1
Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information
More informationInsert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.
Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up
More informationFunctions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7
Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationIrDA IrLAP Throughput Optimisation with Physical Layer Consideration
IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,
More informationPerformance of data networks with random links
Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,
More informationOVSF based fair and multiplexed priority calls assignment CDMA Networks
OVSF based fair and mutipexed priority cas assignment CDMA Networks VIPIN BAYAN 1, DAVINDER S SAINI 2, GUNJAN GUPTA 3 Department of Eectronics and Communication Engineering, Jaypee Institute of Information
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationHTTP Random Access and Live Resources IETF 100
HTTP Random Access and Live Resources IETF 1 Barbara Stark bs7652@att.com Darshak Thakore d.thakore@cabeabs.com Craig Pratt pratt@acm.org / craig@ecaspia.com Use existing bytes Range Unit with very arge
More informationFor Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah
Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative
More informationComputing devices have become increasingly mobile at the client end, and the
Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized
More informationON-DEMAND video services encompass many important
IEEE TRANSACTIONS ON COMPUTERS, VOL. 5, NO. 7, JULY 00 907 Modeing and Dimensioning Hierarchica Storage Systems for Low-Deay Video Services S.-H. Gary Chan, Member, IEEE, and Fouad A. Tobagi, Feow, IEEE
More informationTraffic Engineering for Provisioning Restorable Hose-Model VPNs
Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished
More informationApplication of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line
American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby
More informationOn coding for reliable communication over packet networks
Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros
More informationModeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks
Internationa Journa of Eectrica and Eectronics Engineering 4:1 2010 Modeing and Anaysis of Adaptive Buffer Saring Sceme for Consecutive Packet Loss Reduction in Broadband Networks Saksi Kausa, R.K Sarma
More informationAvaya Aura Call Center Elite Multichannel Application Management Service User Guide
Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More informationReplication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,
More informationAgreeYa Solutions. Site Administrator for SharePoint User Guide
AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property
More informationInternational Journal of Electronics and Communications (AEÜ)
Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue
More informationOn Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models
On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationStraight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.
If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationGuardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL
Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect
More informationPortable Compiler Optimisation Across Embedded Programs and Microarchitectures using Machine Learning
Portabe Compier Optimisation Across Embedded Programs and Microarchitectures using Machine Learning Christophe Dubach, Timothy M. Jones, Edwin V. Bonia Members of HiPEAC Schoo of Informatics University
More informationAvaya one-x Mobile Pre-Installation Checklist
Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationConflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks
Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr
More informationSample of a training manual for a software tool
Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are
More informationDevelopment of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim
Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities
More informationlnput/output (I/O) AND INTERFACING
CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera
More informationDelay Budget Partitioning to Maximize Network Resource Usage Efficiency
Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu
More information3GPP TS V7.1.0 ( )
TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:
More informationIBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks
RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using
More informationA Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization
A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of
More informationFeedback-Free Packet Loss Recovery for Video Multicast
Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science
More informationOperating Avaya Aura Conferencing
Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete
More information5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 2014
5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 014 Modeing IEEE 80.15.4 Networks Over Fading Channes Piergiuseppe Di Marco, Member, IEEE, Caro Fischione, Member, IEEE, Fortunato
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More informationPriority Queueing for Packets with Two Characteristics
1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.
More informationRegister Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x
Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate
More informationSubstitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators
Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek
More informationLow Traffic Overlay Networks with Large Routing Tables
Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationCrossbars with Minimally-Sized Crosspoint Buffers
Crossbars with Minimay-Sized Crosspoint Buffers Nikos Chrysos and Manois Katevenis Inst. of Computer Science (ICS), Foundation for Research and Technoogy - Heas (FORTH) - member of HiPEAC FORTH-ICS, Vassiika
More informationDESIGN AND SOFTWARE ARCHITECTURE OF BUFFERING MECHANISM FOR PEER-TO-PEER STREAMING NETWORK SIMULATION
DESIGN AND SOFTWARE ARCHITECTURE OF BUFFERING MECHANISM FOR PEER-TO-PEER STREAMING NETWORK SIMULATION Yuiya V. Gaidamaka Andrey K. Samuyov Ekaterina G. Medvedeva Ivan Yu. Vasiiev Pave O. Abaev Appied Probabiity
More informationDiscrete elastica model for shape design of grid shells
Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a
More informationEaton 93PM Remote Monitoring Device. Installation and Operation Manual
Eaton 93PM Remote Monitoring Device Instaation and Operation Manua IMPORTANT SAFETY INSTRUCTIONS SAVE THESE INSTRUCTIONS This manua contains important instructions that you shoud foow during instaation
More informationGenetic Algorithms for Parallel Code Optimization
Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum
More information