On the Interactions between Non-Cooperative P2P Overlay and Traffic Engineering Behaviors

Size: px
Start display at page:

Download "On the Interactions between Non-Cooperative P2P Overlay and Traffic Engineering Behaviors"

Transcription

1 On the Interctions between Non-Cooertive P2P Overly nd Trffic Engineering Behviors Chojiong Wng, Ning Wng, Michel Howrth University of Surrey Guildford, United Kingdom {C.Wng, N.Wng, George Pvlou University College London London, United Kingdom Abstrct Emerging Peer-to-Peer (P2P) technologies hve enbled vrious tyes of content to be efficiently distributed over the Internet. Most P2P systems dot selfish eer selection schemes in the liction lyer tht in some sense otimize the user qulity of exerience. On the network side, trffic engineering (TE) is deloyed by ISPs in order to chieve overll efficient network resource utiliztion. These TE oertions re tyiclly erformed without distinguishing between P2P flows nd other tyes of trffic. Due to inconsistent or even conflicting objectives from the ersectives of P2P overly nd networklevel TE, the interctions between the two nd their imct on the erformnce for ech is likely to be non-otiml, nd lso hs not yet been investigted in detil. In this er we study such non-cooertive interctions by modeling best-rely dynmics, in which the P2P overly nd network-level TE otimize their own strtegies bsed on the decision of the other lyer in the revious round. According to our simultions results bsed on dt from the ABILENE network, P2P overlys exhibit strong resilience to dverse TE oertions in mintining end-to-end erformnce t the liction lyer. In ddition, we show tht network-level TE my suffer from erformnce deteriortion cused by greedy eer (re-)selection behvior in recting to revious TE djustments. I. INTRODUCTION Tody, P2P flows ccount for some 50%-70% of the overll Internet trffic, ccording to recent trffic mesurements [1, 2]. Under such circumstnces, network ccity for other tyes of services, such s conventionl webbsed lictions, my be imcted due to resource cometition with this lrge volume of P2P trffic. In the literture, trffic engineering (TE) techniques hve been roosed for ISPs to otimize customer trffic in order to imrove overll network erformnce, for exmle by erforming lod blncing nd network cost reduction. It should be noted tht, in generl, TE solutions do not distinguish between P2P flows nd conventionl Internet trffic, which mens tht trffic otimiztion is erformed in n ggregte fshion, regrdless of secific tyes of flows. In P2P overly networks, the current imlementtion of eer selection rdigms re often bsed on liction-lyer otimiztion for enhncing the qulity of exerience by end users. For instnce, rel-time multimedi P2P systems usully select rtner eers tht re ssocited with low dely in order to chieve fst lybck t the user side. On the other hnd, the objective of TE is to imrove the overll erformnce t the network side, insted of focusing on individul users. As such, there is n obvious mislignment between the TE objectives nd the selfish P2P eer selection in the liction lyer. As for the two utonomous entities the P2P overly nd the network-level TE the decisions tht re mde by ech one of them my influence the erformnce of the other. Such interctions my dversely imct the relevnt erformnce on both sides due to conflicting behvior. For instnce, TE my djust the underlying routing decisions in order to re-otimize network erformnce, but such chnge my lso shift some P2P trffic to lterntive ths with subotiml user-erceived QoS erformnce (e.g. higher end-toend dely due to longer ths). As result, the P2P overly my rect to such dynmics by re-selecting rtners in ech P2P session in order to regin the originl erformnce t the liction lyer. Such behvior will once gin chnge the overll trffic condition so tht the underlying TE mechnisms need to rect ccordingly once gin. This djustment of network configurtions my further trigger re-selection of eers in the P2P overly. In this er we investigte the interction between selfish eer selections nd otimized routing configurtions in non-cooertive environments. In the literture, number of ers [3, 4, 5, 6] hve investigted the interction between TE nd overly network oertions. We cn clssify these works into two ctegories. The first ctegory focuses on the interctions between networklyer routing configurtions decided by TE nd logicl overly routing on to [3, 4]. In this scenrio, TE nd the overly resectively djust their own routing strtegies in turn, bsed on ech other s decisions. Comred with this tye of interction, the key difference from our work is s follows: we focus on the P2P overly side which only considers how to select the best rtner eers (i.e. the other endoint of individul P2P connection sessions), rther thn chnging the routing configurtion in the overly. The other ctegory [5, 6] focuses on CDN (Content Distribution Network) like rdigms, nd considers the interction between networklyer routing decisions mde by TE nd liction-lyer content server selections. Our work differs from this ctegory in the following three fetures. Firstly, in P2P overly networks, eers, s both content roducers nd consumers, hve highly dynmic join/derture tterns, while in the CDNs of [5, 6] content servers re stticlly rovisioned in the network for roviding content delivery services. Secondly, we consider symmetric content exchnge tterns: in P2P overlys eer

2 not only requests dt from, but lso rovides content to other eers; this differs from the revious studies in which secific set of clients only downlod dt from number of dedicted content servers. Finlly, in P2P overlys ech eer needs to simultneously fetch chunks of content from set of rtners, while in conventionl CDNs client tyiclly requests content from one secific server t time. Figure 1: Dynmic interction between TE nd P2P overly In this er we model TE nd P2P overly s two rtionl lyers resectively who ly the best-rely dynmics [4]: one lyer chooses the best resonse bsed on the other lyer s decisions in the revious round. As shown in Figure 1, TE ims to otimize the overll network erformnce (e.g. lod blncing) through djusting routing decisions for customer trffic (including both P2P nd non-p2p bckground flows) in the network lyer. The outcome of th selection chnges by TE for the P2P trffic is then tken s inut by the P2P overly to re-select rtner eers in order to regin the originl liction-level erformnce (e.g. minimize end-to-end dely between individul eering rtners) in cse of dverse imcts from TE. Such eer reselection further influences the overll trffic distribution in the network, requiring further TE oertions, nd so on. Note tht TE nd the P2P overly my otimize their own objectives t different timescles, but here we follow the ssumtion mde in [5] tht ech lyer runs its otimiztion until the other hs finished its oertions in ech round. With such interctions, both TE nd P2P overly djust their own decisions in turn ccording to ech other s revious behviorl chnges. Bsed on this model, we investigte how well TE nd P2P overly my rect to ech other in such non-cooertive environment. As fr s TE is concerned, tody s solutions cn be clssified into IP-bsed TE nd Multi- Protocol Lbel Switching (MPLS-bsed) TE. The ltter is more flexible thn the former, in the sense tht it llows exlicit routing nd rbitrry slitting of trffic cross multile ctive lbel switched ths (LSPs), even t short time-scles. In this er we secificlly focus on the interction between MPLS-bsed TE nd P2P overlys, since MPLS-bsed TE is idel for online trffic djustment tht is gile to short timescle trffic dynmics. In our study, we im to nswer the following questions: 1) Is there n equilibrium oint in this interction between TE nd P2P overly behviors? 2) If the nswer is yes, then does this equilibrium oint converge to n imroved oint? 3) Wht is the otentil imct on the erformnce of the P2P overly nd the network erformnce under such interctions? We believe tht good understnding of such interctions will offer significnt insight into the future develoment of intelligent Internet P2P trffic mngement rdigms in dynmic environments. II. TRAFFIC ENGINEERING & PEER SELECTION In this section we first describe the modeling of the interctions between MPLS-bsed TE nd selfish eer selection in P2P overlys. After this, best-rely dynmics model between the two lyers is resented for nlyzing behviorl interctions between them. Let s first consider hysicl Point-of-Presence (PoP) network toology tht is modeled s unidirectionl grh G = (N, A), where N is set of PoP nodes nd A is the set of inter- PoP links. Ech hysicl link A hs bndwidth ccity C. The tule <i, j> is defined s PoP node ir where i, j N refer to source nd destintion PoP node resectively. In our model, ech eer is ssocited with one of the PoP nodes in the PoP-level network toology. The routing of both P2P trffic nd conventionl bckground trffic is determined by TE, nd the two trffic tyes re not distinguished. Let P reresent set of exlicit LSPs between PoP nodes i nd j, with ech LSP consisting of one or multile inter-pop links. In common rctice of ISP network design, bndwidth resources within single PoP re usully highly over-rovisioned, so we only focus on bndwidth resources on inter-pop links in A. This mens if multile eering neighbors re clustered within the sme PoP, then the ssocited bndwidth consumed by their locl eering connections is ignored. According to common MPLS-bsed TE roches, multile LSPs re estblished between ech PoP node ir in order to llow dtive slitting of the overll trffic demnd cross them for chieving dynmic lod blncing. Let t 2 nd n2 t denote resectively the overll P2P trffic demnd nd the overll non-p2p bckground trffic demnd from PoP node i to j. Let 2 n2 t be the overll trffic demnd t = t + t, nd x (0 x 1) be the trffic slitting rtio on ech secific LSP P. A. Trffic Engineering TE oertions re normlly lied by ISPs in order to otimize the overll network erformnce, such s lod blncing nd network cost reduction. In our model, we consider the objective of TE to be minimizing the mximum link utiliztion (MLU), since this hs been widely used s TE erformnce metric in the literture. Once gin, we emhsize tht TE ims to otimize the overll network erformnce rther thn ny secific tye of trffic, nd in our model, TE does not differentite between P2P trffic nd non-p2p bckground trffic. As reviously mentioned, m (m>1) disjoint LSPs re reestblished between ech PoP node ir in our nlysis. We introduce binry ming coefficient Y to indicte the

3 reltionshi between LSP nd hysicl link : Y equls 1 if hysicl link is on hysicl LSP P, nd 0 otherwise. The overll trffic lod T = x * t * Y, ( x = 1) i N j N\{ i} P P on the hysicl link A is the sum of ll demnds of flow over this link, including both P2P trffic nd non-p2p trffic. With demnd mtrix (t, i, j N), the objective of TE is to comute n otimized vlue x (slitting rtio) cross LSPs between ech source-destintion PoP node irs in order to minimize the overll MLU cross the network, i.e.: T min mx( ) (1) A C t, z = j s.t. x * t * Y x * t * Y = t, z = i d : ( ) = z s : ( ) = z 0, otherwise where z, i, j N, where s() nd d() re source node nd destintion node of link resectively. An dtive MPLS-bsed TE is considered, which cn be oerted t short vrible time-scle (e.g. t the scle of minutes). To llow for fst rections to chnging trffic conditions (e.g. due to frequent eer reselections in P2P overly), we consider n online heuristic solutions without involving globl otimiztions ech time (i.e. only locl djustments re lied). Similr to [6], we consider the generic TE strtegy s follows: set of hysicl links with high link lod is first identified nd TE tries to itertively shift some trffic demnd wy from them in order to better blnce the overll trffic distribution. More secificlly, TE identifies the to k inter-pop links with the highest utiliztion cross the entire network, nd then some trffic currently trversing those links needs to be shifted wy from them. To chieve this, TE needs to re-configure the trffic slitting rtio for m LSPs between some node irs <i, j> tht involve those highlyloded links. The shifting ction is chosen so tht it does not introduce ny new hot sots with higher link lod thn the originl lods before the djustment. This trffic shifting through re-otimizing slitting rtios t individul source PoPs cn be recursively erformed until no further imrovement is chieved. B. Selfish Peer Selection in the P2P Overly The P2P overly ims to otimize the erformnce exerienced by end users, for exmle by reducing the end-toend dely between individul eers. This is tyiclly done in the liction lyer by loclized rtner eer selection In the modeling of the P2P overly behvior, ech eer is ssocited with one of the PoP nodes in the network toology. We consider multile simultneous P2P sessions running over the network, with ech session contining distinct set of ctive eers shring the sme content. If one end-user rticites in multile sessions, it is treted s n indeendent eer in ech of them. More secificlly, let V denote set of ctive eers hysiclly ttched to network G. Ech client eer in P2P session t needs to connect to set of rtner eers from ll vilble eers in the session (denoted by V(t)), nd downlod content from them t certin trnsmission rtes. In this cse the ctul rtner set for secific client eer u (denoted by V u (t)) is effectively subset of ll the vilble eers in session t, i.e., V u (t) V(t). In ddition, let D be the dely of hysicl link A, nd let the dely between PoP node ir be the sum of the dely ssocited with ech link constituting the LSP between tht node ir. While intr-pop dely is ignored, the forml objective in eer selection is to minimize the dely between ech single client eer u nd ech of its selected rtner eers i.e.: min ( D* Yu, v) (2) < uv, >, v Vu ( t) uv A where Y, is binry ming coefficient, equl to 1 if link constitutes the LSP from PoP node u to v, nd is equl to 0 otherwise. With such selfish eer selection rdigm with ltencylocliztion, the P2P overly my dynmiclly redjust the rtnershi connections for every client eer bsed on own mesurements. As we mentioned reviously, both non-p2p trffic nd P2P trffic re shifted by TE without distinction so s to imrove the overll network erformnce. For the P2P trffic, the end-to-end dely from some current rtner eers to the client eer my become higher if the trffic is shifted from shorter dely LSP to longer one. In this cse, in the following round, the P2P overly hs the oortunity to reselect some new rtners elsewhere with lower dely. Such chnge t the P2P side then chnges the trffic condition inut for TE, which my in turn mkes further djustment ctions. C. TE nd P2P Overly Interction Anlysis We consider such interction s best-rely dynmics where ech of the two rtionl lyers decides its own best strtegy in resonse to the chnge of behvior of the other lyer in the revious round. The MPLS-bsed TE nd P2P overly tke turns to otimize their own objectives resectively in this interction. In our nlysis, the strtegy sce tht is lied by MPLS-bsed TE cn be described s set of fesible trffic P slitting rtios cross m distinct LSPs { x,..., m x } between ech PoP node ir <i, j>. This cn be exressed s: P S...{,..., m TE =< x x }... > (3) Trffic slitting in MPLS-TE is erformed on er-flow bsis insted of er-cket [7], nd therefore the P2P flow between ech eering rtner lwys follows one single th t ny time. On the other hnd, the strtegy sce of P2P overly is set of rtner eers V u (t) of every single client eer u tht re selected from ll vilble eers V(t) in ech session t. By selecting the best rtner eers, the end-to-end dely mong eers cn be mintined s minimum for ech client eer in the session. SP2 P=<... V () u t... > (4) Bsed on the bove secifictions, we now consider the cse where TE otimizes the th selection decisions for both non-p2p trffic nd P2P trffic without distinction. Since the

4 P2P trffic ths re chnged by the TE oertion, the dely erformnce from rtner eer to client eer my chnge. As described bove, if some P2P trffic is shifted from one LSP to nother longer th, the corresonding eers my exerience higher end-to-end dely fter such chnge. In order to ttemt to mintin the originl qulity of service, the P2P overly my then rectively select lterntive rtner eers within individul sessions, bsed for exmle on mesured dely, in resonse to the chnged MPLS ths by TE. Due to such reshuffling in eer connections in the P2P overly following the revious TE oertion, the overll trffic condition within the network chnges gin. It should be noted tht, given the fct tht P2P trffic domintes the overll Internet trffic tody, behviorl chnges in the P2P overly my hve significnt imct on the overll network trffic tterns. As such, MPLS-bsed TE my need to further redjust trffic slitting rtios in order to mintin its own objective. Generlly, MPLS-bsed TE nd the P2P overly tke turns to otimize their own oertionl erformnce, djusting to the revious decision of the other lyer. This cn be modeled s: Pm { x,..., x } = rg min TE( Vu ( t) ) ( k + 1) ( k ) (5) Pm V ( t) = rg min P2 P( { x,..., x }) u ( k+ 1) ( k ) Using our model of TE nd P2P overly behvior, we investigte whether best-rely dynmics converge to n equilibrium oint in this interction between non-cooertive behviors. If there is converging equilibrium oint, we my further investigte whether it is globlly otiml oint such s Preto oint [5], or bised one in fvor of either side. In ddition to convergence, we lso study the imct on the relevnt erformnce of the P2P overly nd TE resectively. Through this nlysis, cler icture cn be drwn on whether P2P overly cn synergisticlly interct with TE in current network environments, nd useful guidnce cn be further derived on how to mutully imrove the erformnce of both P2P overly nd TE rdigms in order to otentilly chieve win-win sitution between the two rtionl lyers. III. PERFORMANCE ANALYSIS In this Section we consider the erformnce of the TE nd P2P overly interctions. We first describe our simultion environment, including the network toology nd the setu of the P2P overly. The simultion scenrios nd rmeters re then resented. Following this, we resent results for the erformnce metrics ssocited with the TE nd P2P overly. A. Simultion setu We use the rel ABILENE network toology [8] t the Point-of-resence (PoP) level. The ABILENE network consists of 11 nodes nd 28 unidirectionl inter-pop links. Ech link hs its ctul link ccity nd IGP link weight configurtion. According to [9], in the ABILENE network the IGP link weight setting is bsed on end-to-end ltency, nd hence customer trffic is effectively routed on the lowest dely ths. In ddition, the ABILENE trffic trces tht re mesured through NetFlow re used (with scling) s bckground trffic in our simultion. The P2P trffic used in our exeriments is syntheticlly generted bsed on the mesured ttern of tody s oulr rel-time multimedi bsed P2P lictions [10]. We consider 20 concurrent P2P chnnel sessions, with ech chnnel ttrcting u to 1000 eers. Hence ltogether we consider u to 20,000 eers tht re distributed cross the 11 PoP nodes in the ABILENE network. The overll distribution of these eers in ech PoP node is determined ccording to the ctul oultion of ech city (PoP), where lrger PoP nodes hve more eers ssigned. The chnnel session selected by ech eer is rndomly determined. Without loss of generlity, there re both oulr chnnels nd unoulr chnnels on the P2P overly side. In ddition, we follow the observtion tht ech client eer hs on verge 40 eering connections in order to stisfy the overll downloding rte requirement for stble lybck (1Mbs, [10]). For ech requesting eer, there is one to eer rtner tht rovides on verge three times s much content s the other (uxiliry) ones. B. Simultion Scenrios To mke the nlysis more comrehensive, we use three scenrios to nlyze the interction between MPLS-bsed TE nd P2P overly. Following [4, 5], we set the overll P2P trffic demnd s low, medium or high roortion of the overll network trffic volume, i.e. the P2P trffic ccounts for 40% (low), 60% (medium), or 80% (high) of overll network trffic. Such configurtions re resonble, s it hs been observed tht the ctul roortion of P2P trffic in the Internet vries significntly nd it my ek t 80%. C. Performnce Anlysis Figure 2: Rtio of dely of the longest th to the shortest th As fr s trffic slitting in MPLS-bsed TE is concerned, we first show in Figure 2 the end-to-end dely rtio cross rllel LSPs, i.e. the rtio of the longest dely LSP to the shortest dely LSP between ech ir of PoP nodes in the ABILENE network. This rtio effectively indictes the ctul chnge of dely exerienced by the eers whose flows re shifted by TE trffic slitting djustments from the longest dely LSP to the shortest dely LSP. From Figure 2 we cn see tht the mximum dely rtio is 13:1, minimum rtio is 1:1, nd the verge is round 2.6:1. Such difference between the ths my esily result in selfish rtner reselections by some

5 ffected eers whose flows re shifted from the shorter th to the longer one. bckground trffic my become less stble, with some oscilltion observed (Figure 4). The reson is tht lrge number of eer reselections erformed by the P2P overly cuse TE to unilterlly djust the trffic slitting rtio cross multile LSPs. Since TE otimizes P2P nd non-p2p bckground trffic without distinction, the non-p2p trffic is imcted by the TE otimiztion in resonse to P2P reselection behvior. Figure 3: Reltive chnge of MLU for overll trffic Figure 3 indictes the ttern of the overll MLU erformnce chnge reltive to the initil stte (round 1) on er round bsis (we consider 100 rounds in our exeriments), i.e. MLU () t,(1 < t 100) MLU (1) We cn clerly see tht different roortions of P2P trffic hve yielded distinct erformnce curves. Secificlly, the low scenrio converges to n equilibrium oint which hs 8% decrese comred with the MLU vlue of in the initil stte (100%). Similrly, in the medium scenrio we cn lso observe the convergence towrds n equilibrium oint, but interestingly, the finl converged erformnce hs 5% increse comred with the initil stte. Bsed on the bove results, we cn see tht even if secific equilibrium exists, it is not lwys the cse tht the overll TE erformnce will converge to n imroved erformnce. The reson is tht, fter the djustment of TE, the P2P overly my selfishly reselect new rtner eers which my led to significntly worse network erformnce comred with the sitution before the TE oertion, nd the next round of TE oertion might not be ble to chieve further better erformnce thn the revious round. By investigting the high scenrio in Figure 3, we cn clerly see some oscilltion tterns on the MLU erformnce s the number of rounds increses, nd more imortntly there is no secific equilibrium nd indeed the MLU erformnce becomes worse with time. As we mentioned bove, P2P overly selfishly re-selects the eering rtners if the originl ones exerience higher dely following the djustment of TE. It cn be inferred tht such selfish eer reselection behvior my hve some significnt (negtive) imct on the TE erformnce in the non-cooertive environment, esecilly when P2P flows dominte network trffic. In ddition to the overll MLU erformnce, we lso show how the interctions between TE nd P2P overly imct the erformnce of bckground non-p2p trffic. Figure 4 indictes the chnge of non-p2p trffic utiliztion comred to the initil stte. We cn see tht in both low nd medium scenrios, the bckground trffic condition is not significntly imcted by the interction. However, if P2P flows substntilly dominte the overll trffic (high scenrio), the utiliztion of non-p2p Figure 4: Reltive chnge of MLU for non-p2p trffic Figure 5: Reltive chnge of dely We now consider the P2P network dely erformnce. For the P2P overly, we first show in Figure 5 the chnge of endto-end dely erformnce between individul eers uon the comletion of eer reselections fter ech round. We only consider the eer rtners whose connections hve been ctully ffected by the TE oertion. We recll tht the verge dely rtio, i.e. the rtio of the longest LSP dely to the shortest LSP dely, between ech PoP node ir is 2.6. In the Figure we cn see tht for ll the three scenrios the end-to-end dely is not significntly negtively imcted by the TE djustment for most of the eriod, nd sometimes such erformnce cn be even imroved comred with the initil stte. This is due to the P2P overly s greedy rections to the chnged ths lterntive rtners cn be often identified without significnt extr dely s comred to the initil stte. In Figure 5, the low nd medium scenrios finlly converge to equilibrium oints tht hve 10% nd 7% increse in dely resectively comred with the initil stte. The medium scenrio hs regulr oscilltion ttern in the lst 40 rounds, oscillting between 5% increse nd 20% decrese comred to the initil stte. This observtion indictes tht the

6 P2P overly hs generlly high resilience cbility in mintining end-to-end erformnce ssurnce ginst the chnge of underlying th selections by TE oertions, thnks to the selfish eer selection behviors t the liction level. Figure 6: Reltive chnge of rtner eer churn rtio Finlly we investigte how the P2P connection stbility erformnce is ffected by the TE. We define the eer churn rtio metric to nlyze the relevnt erformnce t the P2P overly side. As mentioned before, due to the exeriences of higher dely following the djustment of TE, set of ffected eers my need to re-select some of their rtners to relce the originl ones whose end-to-end dely erformnce becomes higher. We define requesting eer tht hs ny ffected rtners (s result of TE oertion) to be n in-churn eer. This metric for the whole system stbility cn be defined s: No. of requesting eers tht need to find new rtner eers Totl No. of requesting eers The reson for evluting such metric is tht the trnsient time eriod during reselections my led to erceivble service disrution for rel-time P2P services, nd this is in rticulr the cse if lrge number of existing rtners need to be relced for the requesting eer. According to Figure 6, we cn see tht the high scenrio hs the lowest eer churn rtio mong ll the three scenrios. The low scenrio hs lower churn rtio thn first ste nd cn converge to n equilibrium oint (60% of the initil stte). We lso find tht medium scenrio hs significnt oscilltions fter 56 th round, but the eer churn rtio is mximum of 40%. D. Generl Observtions Bsed on these simultion results we now discuss the issues we rised in Section I. First of ll, we cn see tht it is not lwys the cse tht n equilibrium oint cn be reched between the two rtionl lyers. Even if such equilibrium oint exists, it is not lwys Preto oint. According to the MLU erformnce tterns, we find tht in the noncooertive environment, TE does not seem to be ble to drive the overll network erformnce to n imroved sitution when intercting with selfish P2P overlys. This is rticulrly the cse when P2P flows dominte the overll network trffic. On the other hnd, the P2P overly exhibits high resilience cbility nd is ble to void end-to-end dely degrdtion following TE djustments. Nevertheless, high roortion of rtner re-selection my led to erceivble service disrution for rel-time P2P services. IV. CONCLUSIONS In this er we use best-rely dynmics to model the noncooertive interctions between the P2P overly nd network-level TE behviors, ech of which hs distinct otimiztion objectives the P2P overly ims to imrove the exerienced qulity in terms of dely for individul eers, while TE ims to otimize the overll network resource utiliztion. The decision mde by ech hs significnt imct on the erformnce of the other when they otimize otentilly conflicting objectives simultneously. Through the nlysis of such interctions bsed on our simultions, we show tht in the non-cooertive network environment TE does not seem to be efficient in otimizing network erformnce when intercting with selfish P2P overly. On the other hnd, the P2P overly is generlly resilient ginst otentilly dverse TE oertions in terms of end-to-end dely erformnce. However, with the P2P-bsed rel-time streming lictions being more nd more oulr, high roortion of eer rtner re-selection in rection to TE oertions my introduce service disrutions, nd this henomenon needs to be further investigted. We intend to investigte relevnt interctions in more detil in our future work. V. ACKNOWLEDGEMENT This work ws rtilly funded by the EU FP7 COMET Project (248784). REFERENCES [1] V. Aggrwl et l., Cn ISPs nd P2P Users Cooerte for Imroved Performnce?, ACM CCR, Vol. 37, No. 3, , July, 2007 [2] The IETF ALTO WG: htt:// [3] L. Qiu et l., On Selfish Routing in Internet-Like Environments Proc. ACM SIGCOMM 2003 [4] Y. Liu et l., On the Interction Between Overly Routing nd Trffic Engineering, Proc. IEEE INFOCOM 2005 [5] W. Jing et l., Cooertive Content Distribution nd Trffic Engineering in n ISP Network, Proc. ACM SIGMETRICS 2009 [6] D. DiPlntino et l., Trffic Engineering vs. Content Distribution: A Gme Theoretic Persective, Proc. IEEE INFOCOM 2009 [7] S. Kndul et l., Wlking the Tightroe Resonsive Yet Stble Trffic Engineering, Proc. ACM SIGCOMM 2005 [8] ABILENE network, htt:// [9] S. Uhlig et l., Providing Public Intrdomin Trffic Mtrices to the Reserch Community, ACM CCR, Vol. 36, No. 1, , Jn [10] X. Hei et l., A mesurement study of lrge-scle P2P IPTV system, IEEE Trns. on Multimedi, Vol. 9, No. 8, , Dec. 2007

High Priority Traffic in HCF on Wireless Networks

High Priority Traffic in HCF on Wireless Networks High Priority Trffic in HC on Wireless Networks Mo Add, Amnd Pert, Gordon Erly School of Comuting, University of Portsmouth, Lion Terrce, Portsmouth, UK {mo.dd, mnd.ert, gordon.erly }@ort.c.uk Abstrct

More information

An Empirical Study on the Interactions between ALTO-assisted P2P Overlays and ISP Networks

An Empirical Study on the Interactions between ALTO-assisted P2P Overlays and ISP Networks An Empiricl Study on the Interctions between ALTO-ssisted P2P Oerlys nd ISP Networks Choiong Wng, Ning Wng, Michel Howrth Uniersity of Surrey Guildford, United Kingdom {C.Wng, N.Wng, M.Howrth}@surrey.c.uk

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Page. Harsh Reality. Dynamic Memory Allocation. Malloc Package. Process Memory Image. Assumptions. Malloc Example

Page. Harsh Reality. Dynamic Memory Allocation. Malloc Package. Process Memory Image. Assumptions. Malloc Example Hrsh Relity Memory Mtters Memory is not unbounded It must be llocted nd mnged 1 Mny lictions re memory dominted Esecilly those bsed on comlex, grh lgorithms Memory referencing bugs esecilly ernicious Effects

More information

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012 1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Manipulation of Viewpoints in 3D Environment using Interlocked Motion of Coordinate Pairs

Manipulation of Viewpoints in 3D Environment using Interlocked Motion of Coordinate Pairs Humn-Comuter Interction -- INTERACT'03 M. Ruterberg et l. (Eds.) Published by IOS Press, (c) IFIP, 2003,. 327-334 Mniultion of Viewoints in 3D Environment using Interlocked Motion of Coordinte Pirs Shinji

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Complexities In DSP Software Compilation: Performance, Code Size, Power, Retargetability

Complexities In DSP Software Compilation: Performance, Code Size, Power, Retargetability 1060-3425/98 $1000 (C) 1998 IEEE Comlexities In DSP Softwre Comiltion: Performnce, Code Size, Power, Retrgetbility Ctherine H Gebotys Robert J Gebotys Dertment of Electricl nd Comuter Engineering University

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

The Structure of Forward, Reverse, and Transverse Path Graphs in The Pattern Recognition Algorithms of Sellers

The Structure of Forward, Reverse, and Transverse Path Graphs in The Pattern Recognition Algorithms of Sellers The Structure of Forwrd, Reverse, nd Trnsverse Pth Grhs in The Pttern Recognition Algorithms of Sellers Lewis Lsser Dertment of Mthemtics nd Comuter Science York College/CUNY Jmic, New York 11451 llsser@york.cuny.edu

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES OSP WEIGH SEIG OPIMIZAIO OR SIGLE LIK AILURES Mohmmed H. Sqlli, Sdiq M. Sit, nd Syed Asdullh Computer Engineering Deprtment King hd University of Petroleum & Minerls Dhhrn 31261, Sudi Arbi {sqlli,sdiq,ssd}@kfupm.edu.s

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Bonded Internet. Architecture Examples for Replacing or Enhancing Customer MPLS Networks

Bonded Internet. Architecture Examples for Replacing or Enhancing Customer MPLS Networks Bonded Internet Architecture Exmples for Replcing or Enhncing Customer MPLS Networks Bonded Internet Ensuring business customers hve: Fst, Relible, nd Secure ccess to their Cloud pplictions nd services

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks

HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks : Hole Detection nd Adtive Geogrhic Routing for Ad Hoc Networks Jinjun Yng The Lortory for Advnced Networking Dertment of Comuter Science University of Kentucky Lexington, KY 40506-0046, USA Emil:jyng@netl.uky.edu

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

DELAY Tolerant Networks (DTNs) [1] [2] are a class of

DELAY Tolerant Networks (DTNs) [1] [2] are a class of 2254 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 12, DECEMBER 2012 Exploiting Friendship Reltions for Efficient Routing in Mobile Socil Networks Eyuphn Bulut, Member, IEEE, nd Boleslw

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Preserving Referential Constraints in XML Document Association Relationship Update

Preserving Referential Constraints in XML Document Association Relationship Update Preserving Referentil Constrints in XML Document Assocition Reltionshi Udte Eric Prdede 1, J. Wenny Rhyu 1, Dvid Tnir 2 1 Dertment of Comuter Science nd Comuter Engineering, L Trobe University, Bundoor

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

lied to the CSTR for high erformnce temerture control. In the following rt of this er, section II studies the mthemticl descrition of CSTR. In Section

lied to the CSTR for high erformnce temerture control. In the following rt of this er, section II studies the mthemticl descrition of CSTR. In Section Alying Novel Fuzzy-PI Controller on the Model of Continuous Stirred Tnk Rector A. M. Yzdni, M. A. Movhed, nd S. Mhmoudzdeh Abstrct Continuous Stirred Tnk Rector (CSTR) resents significnt role in the most

More information

IST 220: Ch3-Transport Layer

IST 220: Ch3-Transport Layer ST 220: Ch3-Trns Lyer Abdullh Konk School of nformtion Sciences nd Technology Penn Stte Berks Lerning Objectives. Understnd position of trns lyer in nternet model. Understnd rtionle for extence of trns

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

1 The Definite Integral

1 The Definite Integral The Definite Integrl Definition. Let f be function defined on the intervl [, b] where

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

Network Layer: Routing Classifications; Shortest Path Routing

Network Layer: Routing Classifications; Shortest Path Routing igitl ommuniction in the Modern World : Routing lssifictions; Shortest Pth Routing s min prolem: To get efficiently from one point to the other in dynmic environment http://.cs.huji.c.il/~com com@cs.huji.c.il

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Eliminating left recursion grammar transformation. The transformed expression grammar

Eliminating left recursion grammar transformation. The transformed expression grammar Eliminting left recursion grmmr trnsformtion Originl! rnsformed! 0 0! 0 α β α α α α α α α α β he two grmmrs generte the sme lnguge, but the one on the right genertes the rst, nd then string of s, using

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting:

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting: Redings 15-744: Computer Networking L-14 Future Internet Architecture Required: Servl pper Extr reding on Mobility First Relevnt erlier meeting: CCN -> Nmed Dt Network 2 Outline The Next Internet: More

More information

Solutions to Math 41 Final Exam December 12, 2011

Solutions to Math 41 Final Exam December 12, 2011 Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:

More information

Efficient Server Provisioning with End-to-End Delay Guarantee on Multi-tier Clusters

Efficient Server Provisioning with End-to-End Delay Guarantee on Multi-tier Clusters Efficient Server Provisioning with End-to-End Dely Gurntee on Multi-tier lusters PIden Lm nd Xiobo Zhou Deprtment of omputer Science University of olordo t olordo Springs, O 80918, USA Emil: {plm, xzhou}

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

Data sharing in OpenMP

Data sharing in OpenMP Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning

More information