Performance of data networks with random links

Size: px
Start display at page:

Download "Performance of data networks with random links"

Transcription

1 Performance of data networks with random inks arxiv:adap-org/ v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1, Canada and The Fieds Institute for Research in Mathematica Sciences Toronto, Ontario M5T 3J1, Canada Emai: {hfuks,aawnicz}@fieds.utoronto.ca Abstract We investigate simpified modes of computer data networks and examine how the introduction of additiona random inks infuences the performance of these networks. In genera, the impact of additiona random inks on the performance of the network strongy depends on the routing agorithm used in the network. Significant performance gains can be achieved if the routing is based on geometrica distance or shortest path reduced tabe routing. With shortest path fu tabe routing degradation of performance is observed. Keywords: computer data networks, routing agorithms, network topoogy, network performance, congestion 1. Introduction Modes of computer data networks have attracted much attention in recent years. Generay, these modes assume either reguar topoogy of the network, in the form of a square attice [1, 2, 7] or a binary Cayey tree [11], or random graph topoogy [5]. On the other hand, it has been recenty demonstrated that many technoogica, bioogica, and socia networks are neither competey reguar nor competey random, being somewhere between these two From Juy 2000: Department of Mathematics, Brock University, St. Catharines, Ontario L2S 3A1, Canada, hfuks@brocku.ca 1

2 extremes [3]. Reguar attices rewired to introduce sma amount of random connections, termed sma word networks, offer many advantages over purey reguar or purey random topoogies. In particuar, modes of dynamica systems based on sma word attices can often exhibit enhanced signa propagation capabiities, as observed in epidemic modes or muti-payer prisoners diemma games payed on such attices [3]. The purpose of this work is to investigate if a simiar effect can be achieved in simpe data network modes, athough our approach is different than the approach taken in [3]. We do not rewire the network, but rather examine how introduction of additiona random inks infuences its performance. This is motivated by the question whether introduction of additiona inks can hep to decongest an existing network. 2. Network Modes Definitions The purpose of the network is to transmit messages from points of origin to destination points. In our mode, we wi assume that the entire message is contained in a singe capsue of information, which, by anaogy to packet-switching networks, wi be simpy caed a packet. In a rea packet-switching network, a singe packet carries the information payoad, and some additiona information reated to the interna structure of the network. We wi ignore the information payoad entirey, and assume that the packet carries ony two pieces of information: time of its creation and the destination address. Our simuated network consists of a number of interconnected nodes. Each node can perform two functions: of a hosts, meaning that it can generate and receive messages, and of a router (message processor), meaning that it can store and forward messages. Packets are created and moved according to a discrete time parae agorithm. The structure of the considered networks and the update agorithm wi be described in subsections which foow Connection Topoogies We wi consider two types of network connection topoogies: a two-dimensiona square attice L = L(L) and a two-dimensiona square attice L with additiona inks added randomy, denoted by L = L (L). The vaue of the subscript gives a number of an extra inks in a network and the vaue of L gives a number of nodes in the horizonta and vertica direction of the attice L. The attices L and L with periodic boundary conditions wi be denoted by L p and L p, respectivey, and with non-periodic boundary conditions by Lnp and L np, respectivey. Hence, with this notation, L p 0 = L p and L np 0 = L np. Most of our simuations wi be performed on attices with periodic boundary conditions. The network hosts and routers are ocated at nodes of the attice L. The position of each node on a attice L is described by a discrete space variabe r, such that r = ic x + jc y, (1) where c x, c y are Cartesian unit vectors, and i, j = 1,..., L. For each node r we denoted by C(r) the set of a nodes directy connected with the node r. Hence, for each r L p, the set C(r) is of the form C(r) = {r c x, r + c x, r c y, r + c y }. (2) 2

3 In this case, the node r is connected with its four nearest neighbours. However, for attices with non-periodic boundary conditions L np or square attices with additiona inks added randomy L p and L np the form of the set C(r) can be different, for some nodes r, from the one in (2). For exampe, for nodes r on the boundary of a attice L np the set C(r) can contain two or three eements ony, depending on where a node r is ocated on the boundary. In the case of a attice L p or L np the set C(r) can contain many non-nearest neighbours nodes depending on a number of additiona inks which originate from the node r. The extra inks are constructed using the foowing procedure. We first seect randomy a node r 1 on a square attice L p or L np. Next, we seect randomy another node r 2, different from the node r 1, and connect these two nodes with direct communication ink. By repeating this procedure independenty times we obtain a attice L p or L np, respectivey, with additiona random inks. It can happen that the nodes r 1 and r 2 can be seected again to form a new ink. Hence, in the network there can be severa inks connecting directy the same nodes. We want to emphasize that a the connections in our modes are static, during the simuation period they do not change. Additiona random inks are added before the simuation starts, and remain unchanged. In the networks considered here, each node maintains a queue of unimited ength where the arriving packets are stored. The number of packets in the queue at a node r at time step k wi be denoted by n(r, k), whie the tota number of packets in the system at time step k wi be denoted by N(k), N(k) = n(r, k). (3) r L Packets stored in queues, at individua attice nodes, must be deivered to their destination addresses. To assess how far a given packet is from its destination, we introduce the concept of distance between nodes. Depending on a network connection topoogy we wi use three metric functions to compute the distance between nodes r 1 = (i 1, j 1 ) and r 2 = (i 2, j 2 ). Namey, we wi use 1. for attices with non-periodic boundary conditions Manhattan metric d M (r 1, r 2 ) = i 2 i 1 + j 2 j 1, (4) 2. for attices with periodic boundary conditions periodic Manhattan metric d P M (r 1, r 2 ) = L i 2 i 1 L 2 j 2 j 1 L 2, (5) 3. and regardess of boundary conditions the shortest path metric d SP (r 1, r 2 ) defined as the number of inks in the shortest path joining r 1 and r 2. By shortest we mean the path with the smaest number of inks. Metric d P M wi be used on attices L p, whie d M wi be used on attices L np. Note that on a square attice with no extra inks d SP (r 1, r 2 ) = d M (r 1, r 2 ), and d SP (r 1, r 2 ) = d P M (r 1, r 2 ) for attices with non-periodic and periodic boundary conditions, respectivey. Furthermore, for each r L κ, where κ = p or np and {0, 1,...} 3

4 C(r) = {x L κ :d SP (x, r) = 1}. (6) When irreguarities such as extra inks are present, d SP (r 1, r 2 ) can be computed using one of the we known agorithms. In our simuations, we used shortest path backward tree agorithm [8] Routing Agorithms The dynamics of the networks are governed by the parae update agorithms shown Figure 1, simiar to the agorithm used in [7]. We start with an empty queue at each node, and with discrete time cock k set to zero. Then, the foowing actions are performed in seque: 1. At each node, independenty of the others, a packet is created with probabiity λ. Its destination address is randomy seected among a other nodes in the network with uniform probabiity distribution. The newy created packet is paced at the end of the queue. 2. At each node, one packet (or none, if the oca queue is empty) is picked up from the top of the queue and forwarded to one of its neighboring sites according to a one of the routing agorithms to be described beow. Upon arriva, the packet is paced at the end of the appropriate queue. If severa packets arrive to a given node at the same time, then they are paced at the end of the queue in a random order. When a packet arrives to its destination node, it is immediatey destroyed. 3. k is incremented by 1. This sequence of events, which constitutes a singe time step update, is then repeated arbitrary number of times. The state of the network is observed after sub-step 3 (cock increase), but before sub-step 1 (creation of new packets). In order to expain the routing agorithms mentioned in sub-step 2, we wi first describe one of its simpified versions. Let us assume that we measure distance using some metric d, where d coud be any of the previousy defined metrics d M, d P M, or d SP. To decide where to forward a packet ocated at a node r with the destination address r d, two steps are performed: 1. From sites directy connected to r, we seect sites which are cosest to the destination r d of the packet. More formay, we construct a set A (r) such that A (r) = {a C(r) : d(a, r d ) = min x C(r) d(x, r d)} (7) 2. From A (r), we seect a site which has the smaest queue size. If there are severa such sites, then we seect one of them randomy with uniform probabiity distribution. The packet is forwarded to this site. Using a forma notation again, we coud say that the packet is forwarded to a site seected randomy and uniformy from eements of a set B (r) defined as B (r) = {a A (r) : n(a, k) = min n(x, k)}. (8) x A (r) 4

5 To summarize, the routing agorithm R described above sends the packet to a site which is cosest to the destination (in the sense of the metric d), and if there are severa such sites, then it seects from them the one with the smaest queue. If there is sti more than one such node, random seection takes pace. It is cear that each packet routed according to the agorithm R wi trave to its destination taking the shortest possibe path (shortest in the sense of the metric d, not necessariy in terms of the number of time steps required to reach the destination). In rea networks, this does not aways happen. In order to aow packets to take aternative routes, not necessariy shortest path routes, we wi introduce a sma modification to the routing agorithm R described above. The modified agorithm R m, for each node r, wi use instead of the set A (r) a set A m (r) defined as foows. In the construction of the set A m (r) instead of minimizing distance to the destination d(x, r d ), as it was done in (7), we wi minimize Θ m (d(x, r d )), where Θ m (y) = { y, if y < m, m, otherwise, (9) for a given integer m. Thus, the definition of the set A m (r) is A m (r) = {a C(r) : Θ m (d(a, r d )) = min Θ m (d(x, r d ))} (10) x C(r) The above modification is equivaent to saying that nodes which are further than m distance units from the destination are treated by the routing agorithm as if they were exacty m units away from the destination. If a packet is at a node r such that a nodes directy inked with r are further than m units from its destination, then the packet wi be forwarded to a site seected randomy and uniformy from the subset of C(r) containing the nodes with the smaest queue size in the set C(r). It can happen that the seected site can be further away from the destination than the node r. Therefore, introduction of the cutoff parameter m adds more randomness to the network dynamics. One coud aso say that the destination attracts packets, but this attractive interaction has a finite range m: packets further away than m units from the destination are not being attracted. It is aso possibe to reate various vaues of the cutoff parameter m to different types of routing schemes used in rea packet-switching networks. Assume that each node r maintains a tabe containing a possibe vaues of d(x, r d ), for a possibe destinations r d and a nodes x C(r), and that packets are routed according to this tabe by seecting nodes minimizing distance, measured in the metric d, traveed by a packet from its origin to its destination. Such a routing scheme is caed tabe-driven routing [8] and it is equivaent to the routing agorithm R. In this case, construction of the set A (r) woud require ooking up appropriate entries in the stored tabe. Let us now define D max to be the argest possibe distance between two nodes in the network. When m < D max, then for a given x, we need to store vaues of d(x, r d ) ony for nodes r d which are ess than m units of distance away for a other nodes distance does not matter, since it wi be treated as m by the routing agorithm. Hence, at each node r the routing tabe to be stored is smaer than in the case when m = D max. The routing scheme based on this smaer routing tabe is caed the reduced tabe routing agorithm [8] and it is 5

6 equivaent to the routing agorithm R m. In the case when m = D max the routing agorithm R m = R. Finay, when m = 1, the distances between hosts and destinations are not considered in the routing process of packets. Therefore, there is no need to store any tabe of possibe paths at nodes of the network. This case corresponds to the tabe-free routing agorithm [8] in which packets are routed randomy. Hence, this agorithm can send packets on circuitous and ong routes to their destinations. The anaysis of this routing agorithm has been done in [4], where some anaytica resuts are aso presented. At present such resuts are not avaiabe for routing agorithms with m > Performance of networks with square attice connection topoogy (L p 0, d P M), (L np 0, d M ) In order to asses the performance of a network, graphs of deay as a function of presented oad are frequenty used in network performance iterature [9]. In our case, deay τ wi be defined as the number of time steps eapsed from the creation of a packet to its deivery to the destination address. We wi aso use average deay τ(k), where the average is taken over a packets deivered to their destination from the beginning of the simuation (k = 0) up to time k. Probabiity of a packet creation λ wi be used as a measure of a presented oad Fu tabe routing We assume that the network topoogy is a square attice L p 0(L) with d P M metric and the network routing agorithm is the fu tabe routing agorithm R m, with m = D max, i.e. R m = R. Figure 2a shows graphs of the average deay τ(k) versus presented oad λ, as measured during simuation performed on a attice L p 0(50). The three curves shown there correspond to different times. It is cear that beyond a certain critica vaue of λ = λ c, the average deay drasticay increases. Moreover, the average deay grows with time, which suggests that for λ > λ c there is no equiibrium state. In fact, when λ > λ c, a typica queue size and consequenty, the number of packets in the system N(k), grows without bounds, as shown in Figure 2b and Figure 3. It is possibe to find an approximate vaue of the critica oad λ c by the foowing argument. For λ < λ c, the system reaches steady state, and in the steady state the number of packets created per unit time (given by L 2 λ) must be equa to the number of packets deivered per unit time. Since the average time spent in the system by a packet is τ(k), we can reasonaby assume that N(k)/τ(k) packets are deivered to their destinations per unit time, hence N(k) τ(k) = L2 λ. (11) This reationship, known as Litte s aw in queuing theory [6], hods ony beow the critica point, as shown in Figure 4. For the routing agorithm R m, with m = D max, when the number of packets in the network is sma, an individua packet is aways routed in such a way that it foows the shortest path to its destination avoiding a occupied nodes. This means that for sma 6

7 N(k), the average packet deay is approximatey equa to average distance from the packet s origin to its destination, which wi be caed free packet deay τ 0 After some agebra, this eads to τ 0 = 1 L 4 L 1 i 1,i 2,j 1,j 2 =0 τ 0 = 1 L 4 { L r 1,r 2 d P M (r 1, r 2 ) (12) i 2 i 1 L 2 j 2 j 1 L } 2 = L 2. (13) Obviousy, when the oad increases, at some point the number of packets in the network wi be so arge that it woud not be possibe to find a route to a destination competey avoiding other packets. Assuming that packets are approximatey uniformy distributed over the entire attice, this wi happen when a sites are occupied, i.e. when N(k) = L 2. Using (11) this gives an estimate of λ c : λ c = 1 (14) τ 0 For L p 0(50) we obtain τ 0 = 25 and λ c = 0.04, in good agreement with the vaue obtained from simuations λ c = ± Quite simiar cacuations can be performed for a square attice with non-periodic boundary L np 0 (L). In this case, τ 0 = 1 L 4 r 1,r 2 d M (r 1, r 2 ) = 2 3 L 2 1 L 2 L, (15) 3 yieding λ c = 0.03 for L np 0 (50). The measured vaue of λ c for L np 0 (50) is ± 0.001, i.e., much ower. The discrepancy is mainy due to the fact that for the attices L np 0 (L) packets are not uniformy distributed on the attice, having a tendency to custer at the center. Consequenty, jamming occurs earier than one woud expect assuming uniform distribution of packets Partia tabe routing Decrease in vaue of the cutoff parameter m has a profound effect on the critica oad. Smaer m means that packets which are ocated further than m inks from their destination move with a high degree of randomness, and as a resut, their average deay is arger. This increase of the deay can be aso seen in a pot of a singe packet deay as a function of m (Figure 5). Whie vaues of m cose to D max do not significanty change τ 0, vaues of m cose to 1 resut in an increase of τ 0 by up to two orders of magnitude. 4. Performance of networks based on square attices (L p, d P M),, d M ) with additiona random inks (L np 7

8 4.1. Fu tabe routing Let us now consider the network dynamics governed by the routing agorithm R taking pace on attices L p and Lnp which in addition to norma nearest neighbor connections, feature additiona inks, where > 0. Figure 6 shows how addition of random inks changes the graph of deay vs. oad for both non-periodic and periodic case. We are sti using d M and d P M metric for L np and L p attice, respectivey, which means that the distance between two points r 1 and r 2 is sti computed using d M (r 1, r 2 ) or d P M (r 1, r 2 ) metric, respectivey, even if r 1 and r 2 are directy connected by some extra ink. As expected, addition of extra inks improves performance of the network, shifting the critica point λ c to the right (see Figures 6 and 7). This means that the network can carry more oad without experiencing congestion. Performance improvement is more pronounced for attices with non-periodic boundaries, as shown in Figure 7. For exampe, by adding 100 random inks to attice, which increases tota number of inks by 2%, we increase the critica oad by over 25%. Increasing the number of inks by 8% doubes the critica oad. This can be attributed to the fact that some packets can bypass congested centra area by using shortcuts, and their deay decreases not ony because they have shorter distance to trave, but aso because they have avoided congestion. In the case of attices with periodic boundaries, packets are more uniformy spread even in the presence of additiona random inks. Thus, the performance improvement is ony caused by the decrease in the distance traveed, but not by bypassing congestion, since congestions are aso uniformy spread in the case of attices with periodic boundaries. In the remainder of this artice, we wi focus our discussion on attices with periodic boundaries ony Partia tabe routing When a routing agorithm R m, with m < D max, is used, additiona random inks can significanty increase critica oad, and the reative performance gain is much arger than in the case of the fu tabe routing agorithm. Figure 8a,b shows the reative change of the critica oad, defined by λ c = λ c(m, ) λ c (m, 0), (16) λ c λ c (m, 0) where λ c (m, ) denotes the critica oad at a given m and, for two different vaues of m, m = 50 and m = 20. One can immediatey notice that the impact of additiona inks on performance of the network is much stronger in the case of partia tabe routing (m = 20) than in the case of fu tabe routing (m = 50). For exampe, about 50 extra inks are sufficient to doube the critica oad corresponding to m = 20, whie the same number of inks has amost negigibe impact on the critica oad when m = 50. 8

9 5. Performance of networks based on square attice (L p, d SP ) with additiona random inks and d SP metric As stated before, for a square attice without additiona inks, metric d SP is identica to d M or d P M metric. This is no onger true for a square attice with additiona random inks. Routing based on d SP metric fuy utiizes shortcuts provided by additiona inks, significanty decreasing free packet deay τ 0. One woud expect that a decrease in free packet deay wi decrease aso average deay, as it was in the case of networks with d M and d P M metric. In reaity, we observe just opposite effect (Figure 8) Fu tabe routing Figure 8c shows how the critica oad λ c (m, ) changes when additiona random inks are introduced. This is shown for the network dynamics governed by R, i.e. the fu tabe routing agorithm with m = D max, on a square attice with periodic boundaries One can ceary see that if the number of additiona random inks is beow some critica vaue c (m) the critica oad λ c (D max, ) is actuay smaer than λ c (D max, 0), in spite of increased connectivity between nodes of the network. The performance of the network is at its worst when just a few additiona random inks are added. However, it improves with the increase of a number of additiona random inks and at some critica vaue c (m) it becomes the same as of the network without any additiona random ink. When the number of additiona random inks is greater than c (m) an improvement in the network performance is observed. For the network L p 500(50) the critica oad λ c (50, 500) is amost equa to the critica oad λ c (50, 0) of the network L p 0(50), i.e. λ c (50, 500) λ c (50, 0), and the improvement of the L p (50) network performance is observed for greater than 500. This rather unexpected phenomenon can be understood as foows. When additiona inks are introduced, and their number is ess than c (m), they provide a shortcut between distant parts of the network. Since packets are forwarded to their destinations via the shortest path, it often happens that one ink serves as a shortcut for many packets from the neighborhood. One coud say that additiona inks attract most of the traffic and quicky become congested, even though sites which are not cose to extra inks are amost empty. This is we iustrated in Figure 9, which shows snapshots of dynamics of the network with R routing agorithm, nodes and periodic boundary conditions. The presented oad is λ(50, 0) = 0.025, just beow the critica vaue λ c (50, 0) = If there are no additiona random inks the network dynamics remains in the steady state, as is showed by the eft coumn of Figure 9. The number of packets in the network fuctuates sighty over time, but remains at the same eve: at k = 100 there are 2106 packets in the network, whie at k = 1000 there are 2127 packets. When additiona 100 random inks are introduced, which is ess than c (50), keeping a other network parameters unchanged, the network dynamics enters the congested phase, as it is iustrated by the right coumn of Figure 9. The number of packets in the network increases rapidy over time from 2238 packets in the network at k = 100, to packets at k = Congestions occur mainy at inputs and exists from the extra inks. At these nodes the queue sizes are substantiay arger than in other nodes of the network. This is iustrated by the dark spots in the figures of the right coumn of 9

10 Figure Partia tabe routing The performance of a network changes from the one described above when the vaue of the cutoff parameter m is ess than D max, i.e. m < D max. For the routing agorithm R 20 appied on the attice L p (50) for various vaues of the parameter the performance of the network is shown on Figure 8d. From this figure we observe that the critica vaue c (m) beow which the performance of the network with the routing agorithm R 20 is worse than the performance of the network without random inks added is rather ow. This vaue is ower than the corresponding vaue when R routing agorithm has been used. For exampe, adding more than about 15 inks increases the critica oad λ c. Adding about 50 inks, just a 2% increment in the number of inks, increases the critica oad by 100%! The performance of the network improves significanty further with the increase of the number of random inks. The expanation of this behavior is straightforward. As we have aready mentioned, for a reguar square attice without random inks added, the vaues of the critica oad λ c (m, 0) strongy decrease with decrease of the cutoff parameter m. This resuts from the fact that packets which are further away than m units from their destinations are not being attracted to the destinations and trave randomy through the network. However, addition of random inks significanty decreases the average distances between network nodes in the metric d SP. Therefore, it does not matter what is the exact vaue of the cutoff parameter m. Most of the time distances in the metric d SP are way beow m and packets can be attracted to their destinations much faster. This attraction increases with the increase in the number of additiona random inks. Hence, when additiona inks are present, the critica oad λ c (m, ) is not very much dependent on m, uness m is very sma and increases with increase in vaue of the number of the random inks added. Let λ c (m, ) be the critica oad of a network with the cutoff parameter m and with extra inks added. Let m 1 = D max and et m 2 be smaer than m 1, but not too cose to 1, for exampe, m 1 = 50, m 2 = 20, as in Figure 8. The performance of the networks with the routing agorithms R m1 and R m2, as in the Figure 8, can be summarized as foows for i = 1, 2 when < c (m i ) and c (m 2 ) < c (m 1 ), λ c (m 2, 0) < λ c (m 1, 0), λ c (m i, ) < λ c (m i, 0), λ c (m i, 0) < λ c (m i, ), for i = 1, 2 when > c (m i ), and for sufficienty arge λ c (m 1, ) λ c (m 2, ). Figure 10 shows how the introduction of 100 additiona inks to a network with nodes, routing agorithm R 20 and presented oad λ = (which is above the critica oad for = 0), affects the network dynamics. When = 0, the number of packets in the network 10

11 grows with time, from 1248 at k = 100 to 6750 at k = 1000, indicating that the system is in the congested state. The eft coumn of Figure 10 shows that the queue sizes grow amost uniformy over a nodes of the network. Hence, the congestion is distributed uniformy over a nodes of the network. However, when = 100 additiona random inks are introduced, the right coumn of Figure 10 shows that congestion is eiminated. The number of packets in the network remains amost steady and it fuctuates around 230 (Figure 10). If an occasiona sma congestion occurs near the entrance to one of the shortcuts, it quicky disappears. For exampe, dark square visibe in the right coumn of Figure 10 at k = 100 is not visibe at k = 1000, demonstrating that oca congestions are not permanent. 6. Concusion We found that the impact of additiona random inks on the performance of the network strongy depends on the routing scheme used in the network. Critica oad of a network can be notaby improved if the routing is based on a geometrica distance. Adding sma number of additiona inks can decrease the average deay and shift the transition to the jammed phase toward higher oad vaues. This, in genera, is not true for routing schemes based on the shortest path metric. In this case, if the number of additiona inks is sma, one can actuay observe degradation of performance: many packets attempt to utiize shortcuts introduced by additiona inks, causing congestion which in effect pushes the network to a jammed phase. Reduced tabe routing can, to some extent, eiminate this probem. If packets ocated further than m inks from the destination are routed randomy (other packets taking the shortest possibe path), performance gains obtained by adding sufficient number of extra inks can be quite significant. In order to reate our findings to data network protocos used in practice, more research is ceary needed. In particuar, congestion contro mechanisms buit into protocos such as TCP/IP wi certainy affect phenomena reported here. This issue, as we as other possibe modifications of the mode, is currenty under investigation. Furthermore, the authors beieve that some of the issues raised in [10], reated to sef-simiar traffic modeing and anaysis, and performance modeing of modern high-speed networks can be addressed by the methodoogy of this paper. Acknowedgment The authors acknowedge partia financia support from the Natura Sciences and Engineering Research Counci (NSERC) of Canada and The Fieds Institute for Research in Mathematica Sciences. They express their gratitude to Bruno Di Stefano and Murad S. Taqqu for hepfu discussions. References [1] I. Campos, E. Tarancón, F. Cérot, and L. A. Fernández. Therma and repusive traffic fow. Phys. Rev. A, 52(6): , [2] J. H. B. Deane, C. Smythe, and D. J. Jefferies. Sef-simiarity in a deterministic mode of data transfer. Internationa Journa of Eectronics, 80(5): ,

12 [3] D. J. Watts and S. H. Strogatz. Coective dynamics of sma-word networks. Nature, 393: , [4] H. Fukś, A. T. Lawniczak, and S. Vokov. Packet deay in modes of data networks. To appear in ACM Transactions on Modeing and Computer Simuation, Juy [5] J. Kadirire. Minimising packet copies in muticast routing by expoiting geographica spread. Comput. Commun. Rev., 24(3):47 62, [6] R. Neson. Probabiity, stochastic processes, and queueing theory: the mathematics of computer performance modeing. Springer-Verag, New York, [7] T. Ohira and R. Sawatari. Phase transition in computer network traffic mode. Phys. Rev. E, 58(1): , [8] T. N. Saadawi, M. H. Ammar, and A. E. Hakeem. Fundamentas of Teecommunication networks. John Wiey and Sons, New York, [9] W. Staings. High-speed networks: TCP/IP and ATM design principes. Prentice Ha, New Jersey, [10] M. S. Taqqu, W. Wiinger, and A. Erramii. A bibiographica guide to sef-simiar traffic and performance modeing for modern high-speed networks. In F. P. Key, S. Zachary, and I. Ziedins, editors, Stochastic Networks: Theory and Appications, pages , Oxford, Carendon Press (Oxford University Press). [11] A. Y. Tretyakov, H. Takayasu, and M. Takayasu. Phase transition in a computer network mode. Physica A, 253: ,

13 START Procedure CREATE k:=0 For every r, Q(r)=0 (empty queue) Procedure ROUTE Generate random number q [0,1) q<λ Yes Randomy seect one attice node r d Create packet with destination address r d, pace it at the end of Q(r) RETURN No simutaneousy appy procedure CREATE to a nodes r simutaneousy appy procedure ROUTE to a nodes r k:=k+1 Is Q(r) empty? No Pickup one packet from the top of queue Q(r), determine its addrerss r d Construct set C(r) of a sites directy connected to r Find A m (r), set of sites beonging to C(r) which are coses to r d Construct set B m (r) containing sites from A m (r) with smaest queue size Randomy seect one eement in B m (r) and denote it a Yes No r d =a Yes Pace the packet at the end of queue Q(a) Destroy the packet (packet deivered to its destination) RETURN Figure 1: Network update agorithm. Symbo Q(r) denotes the queue at node r. 13

14 τ (a) λ (b) 80 N 60 L λ Figure 2: (a) Average ifetime of a packet τ(k) as a function of λ, for L p 0 (50) with d P M and m = D max after k = 1000 ( ), k = 1500 ( ), and k = 2000 ( ) iterations. (b) Number of packets in the system N(k) as a function of λ after k = 1000 ( ), k = 1500 ( ), and k = 2000 ( ) iterations. 14

15 λ = N(k) λ = k Figure 3: Number of packets in the system N(k) for subcritica and supercritica vaues of λ (λ = and λ = 0.042, respectivey). L p 0(50) with d P M metric and m = D max N 0.04 τl λ Figure 4: Verification of Litte s aw for a attice L p 0(50) with d P M k = Continuous ine corresponds to L 2 ) = λ. and m = D max, at 15

16 τ m Figure 5: Free packet deay τ 0 as a function of m for a attice L p 0 (50) with d P M metric. 16

17 τ (a) λ τ (b) λ Figure 6: (a) Average ifetime of a packet τ(k) as a function of λ for k = 1500 and for L np (50) attice with d M metric and m = D max, and with the number of extra random inks = 0 ( ), = 100 ( ), = 200 ( ), and = 400 (+). (b) The same pot for L p (50) attice with d P M metric and m = D max. 17

18 λ c Figure 7: Critica oad λ c as a function of a number of extra inks for the attice with periodic ( ) and non-periodic ( ) boundaries, using d P M and d M metric, respectivey. In both cases, m = D max. 18

19 λ λ c λ λ c (a) d P M metric, m = 50 λ λ c (c) d SP metric, m = λ λ c (b) d P M metric, m = (d) d SP metric, m = Figure 8: Change in critica oad for a attice L p 0(50) using metrics d P M and d SP with m = 20 and m = 50. Vertica axis corresponds to (λ c (m, ) λ c (m, 0))/λ c (m, 0), where λ c (m, ) is a critica oad at a given m and. 19

20 = 0 = 100 k = 0 k = 0 k = 10 2 k = 10 2 k = 10 3 k = 10 3 Figure 9: Comparison of dynamics of the network L p (50) with d SP and R agorithm for = 0 (eft coumn) and = 100 (right coumn). Queue sizes are represented as shades of gray, from the highest queue size of 20 or more represented by back coor to the empty queue represented by white coor. In order to preserve carity, additiona inks are shown for k = 0 ony. 20

21 = 0 = 100 k = 0 k = 0 k = 10 2 k = 10 2 k = 10 3 k = 10 3 Figure 10: Comparison of dynamics of the network L p (50) with d SP and R 20 agorithm for = 0 (eft coumn) and = 100 (right coumn). Queue sizes are represented as shades of gray, from the highest queue size of 20 or more represented by back coor to the empty queue represented by white coor. In order to preserve carity, additiona inks are shown for k = 0 ony. 21

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

Infinite Server Queueing Networks with Deadline Based Routing

Infinite Server Queueing Networks with Deadline Based Routing Infinite Server Queueing Networks with Deadine Based Routing Nea Master and Nichoas Bambos BCMP networks in the more genera framework of Key networks [8]. Key networks have been used and buit upon in severa

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva)

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva) Eaton Bypass Power Modue (BPM) User s Guide For use with the foowing: Eaton 9155 UPS (8 15 kva) Eaton 9170+ UPS (3 18 kva) Eaton 9PX Spit-Phase UPS (6 10 kva) Specia Symbos The foowing are exampes of symbos

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Location Aided Hybrid Routing Algorithm for MANET

Location Aided Hybrid Routing Algorithm for MANET Internationa Journa of Engineering & Technoogy IJET-IJENS Vo: No: 0 30 Location Aided Hybrid Routing Agorithm for MANET Mamoun Hussein Mamoun Facuty of Computer and Information Sciences Mansoura University,

More information

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics Understanding the Mixing Patterns of Socia Networks: The Impact of Cores, Link Directions, and Dynamics [Last revised on May 22, 2011] Abedeaziz Mohaisen Huy Tran Nichoas Hopper Yongdae Kim University

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

T he increasing importance of Research and Development (R&D) activities has spurred the formation of

T he increasing importance of Research and Development (R&D) activities has spurred the formation of OPEN SUBJECT AREAS: STATISTICS COMPLEX NETWORKS Received 8 Apri 2014 Accepted 18 June 2014 Pubished 14 Juy 2014 Correspondence and requests for materias shoud be addressed to M.V.T. (mtomaseo@ ethz.ch)

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

End-to-End Internet Packet Dynamics

End-to-End Internet Packet Dynamics End-to-End Internet Packet Dynamics Vern Paxson Network Research Group Lawrence Berkeey Nationa Laboratory University of Caifornia, Berkeey vern@ee.b.gov LBNL-40488 June 23, 1997 Abstract We discuss findings

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

End-to-End Internet Packet Dynamics

End-to-End Internet Packet Dynamics End-to-End Internet Packet Dynamics Vern Paxson Network Research Group Lawrence Berkeey Nationa Laboratory University of Caifornia, Berkeey vern@aciri.org Abstract We discuss findings from a arge-scae

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information