Scalable Download Protocols

Size: px
Start display at page:

Download "Scalable Download Protocols"

Transcription

1 Scalable Download Protocols A Thess Submtted to the College of Graduate Studes and Research In Partal Fulfllment of the Requrements For the Degree of Doctor of Phlosophy In the Department of Computer Scence Unversty of Saskatchewan Saskatoon, Saskatchewan By Nklas Carlsson Copyrght Nklas Carlsson, December All rghts reserved.

2 Permsson to Use In presentng ths thess n partal fulflment of the requrements for a Postgraduate degree from the Unversty of Saskatchewan, I agree that the Lbrares of ths Unversty may make t freely avalable for nspecton. I further agree that permsson for copyng of ths thess n any manner, n whole or n part, for scholarly purposes may be granted by the professor or professors who supervsed my thess work or, n ther absence, by the Head of the Department or the Dean of the College n whch my thess work was done. It s understood that any copyng or publcaton or use of ths thess or parts thereof for fnancal gan shall not be allowed wthout my wrtten permsson. It s also understood that due recognton shall be gven to me and to the Unversty of Saskatchewan n any scholarly use whch may be made of any materal n my thess. Requests for permsson to copy or to make other use of materal n ths thess n whole or part should be addressed to: Head of the Department of Computer Scence Unversty of Saskatchewan Saskatoon, Saskatchewan, Canada S7N 5C9

3 Abstract Scalable on-demand content delvery systems, desgned to effectvely handle ncreasng request rates, typcally use servce aggregaton or content replcaton technques. Servce aggregaton reles on one-to-many communcaton technques, such as multcast, to effcently delver content from a sngle sender to multple recevers. Wth replcaton, multple geographcally dstrbuted replcas of the servce or content share the load of processng clent requests and enable delvery from a nearby server. Prevous scalable protocols for downloadng large, popular fles from a sngle server nclude batchng and cyclc multcast. Analytc lower bounds developed n ths thess show that nether of these protocols consstently yelds performance close to optmal. New hybrd protocols are proposed that acheve wthn 20% of the optmal delay n homogeneous systems, as well as wthn 25% of the optmal maxmum clent delay n all heterogeneous scenaros consdered. In systems utlzng both servce aggregaton and replcaton, well-desgned polces determnng whch replca serves each request must balance the objectves of achevng hgh localty of servce, and hgh effcency of servce aggregaton. By comparng classes of polces, usng both analyss and smulatons, ths thess shows that there are sgnfcant performance advantages n usng current system state nformaton (rather than only proxmtes and average loads) and n deferrng selecton decsons when possble. Most of these performance gans can be acheved usng only local (rather than global) request nformaton. Fnally, ths thess proposes adaptatons of already proposed peer-asssted download technques to support a streamng (rather than download) servce, enablng playback to begn well before the entre meda fle s receved. These protocols splt each fle nto peces, whch can be downloaded from multple sources, ncludng other clents downloadng the same fle. Usng smulatons, a canddate protocol s presented and evaluated. The protocol ncludes both a pece selecton technque that effectvely medates the conflct between achevng hgh pece dversty and the n-order requrements of meda fle playback, as well as a smple on-lne rule for decdng when playback can safely commence.

4 Acknowledgements Ths work has been carred out under the supervson of Derek Eager. Throughout my tme n department he has been an excellent teacher, mentor, and frend. Learnng from hm has been extremely rewardng and s an experence whch I wll always treasure. My research has also greatly benefted from feedback and support provded by Dr. Mary Vernon. My advsory commttee, consstng of Wnfred Grassmann, Mark Kel, Ralph Deters, and Chrs Soteros, has provded thoughtful comments and feedback, makng every meetng a great learnng experence. Thank you to my external examner Dr. Janelle Harms, who traveled from Edmonton to attend my defence. I would also lke to thank all the graduate students, staff, and faculty who have made the atmosphere wthn the Department a comfortable place to work. In partcular, I would lke to thank Jan Thompson for makng lfe easer on graduate students; Gord McCalla for makng sure that I have human contact even at odd hours; Dwght Makaroff for hs wllngness to talk hockey; and fnally, Anrban Mahant for provdng me wth gudance through lfe as a graduate student and beyond. I would lke to thank my parents Olle and Lena who have provded me wth more help and better gudance than I could have ever asked for, my sster Maln, as well as my grandparents. Your support and love made ths degree worth a lot more. A specal thank you goes to my partner Alexa Brggs. In addton to supportng me n my pursut of ths degree, she has been a great teacher of the Englsh language, my best frend, and a great source of joy and laughter. Fnally, I would lke to send a thought to my very specal four legged frend Bobby Lue. Although you are no longer wth us, you have a bg part n ths thess. She was a great lstener and would always keep me company when I needed t the most. Thank you all for your support!

5 Table of Contents Permsson to Use... Abstract... Acknowledgements... Table of Contents...v Lst of Tables...v Lst of Fgures...v Lst of Common Notaton... x Lst of Acronyms...x Glossary...x Introducton.... Scalable Content Delvery Servce Aggregaton Replcaton Proxy Cachng Content Dstrbuton Networks Peer-to-Peer and Peer-asssted Systems Problem Descrpton Contrbutons Scalable Download from a Sngle Server Scalable Download from Multple Servers On-demand Streamng usng Scalable Download....4 Thess Organzaton Background Multcast IP Multcast Applcaton-level Multcast Multcast-based Sngle Server Scalable Download Protocols Batchng Protocols Push-based Protocols Pull-based Protocols Cyclc Multcast Protocols Hybrd Protocols Clent Heterogenety Server Placement and Selecton Replca Placement Replca Selecton Peer-asssted Content Delvery Peer-asssted Download Peer-asssted Streamng Scalable Download from a Sngle Server Baselne Polces Batchng Cyclc Multcast Lower Bounds v

6 3.2. Unconstraned Clent Recepton Rates Constraned Clent Recepton Rates Lower Bound Comparsons Near-optmal Protocols Protocols Mnmzng Maxmum Delay Protocols Mnmzng Average Delay Worst-case Performance Heterogeneous Clents Class-specfc Servce Requrement and Maxmum Delay Lower Bound (slp) Bandwdth Approxmaton Extenson of Cyclc/cd,bot Class-specfc Recepton Rates Heterogeneous Lower Bound Protocols Summary Scalable Download from Multple Replcas System Model Dynamc vs. Statc Polces Analyss for Sngle Replca Systems Delmtng the Achevable Performance wth Statc Polces Delmtng the Achevable Performance wth Dynamc Polces Batched Servce Fountan Servce Performance Comparsons Deferred Selecton vs. At-arrval Selecton Delmtng the Achevable Performance wth At-arrval Polces Batched Servce Fountan Servce Performance Comparsons Local State vs. Global State Canddate Local State Polces Batched Servce Fountan Servce Canddate On-lne Global State Polces Performance Comparson Average Delay Batchng Polcy Comparson Delmtng the Achevable Performance wth Statc Polces A Canddate Dynamc Global State Polcy A Canddate At-arrval Polcy Performance Comparsons Summary On-demand Streamng usng Scalable Download Smulaton Model Pece Selecton Canddate Polces Performance Comparsons...22 v

7 5.3 Usng a Dynamc Startup Rule Smple Startup Polces Performance Comparsons Summary Conclusons Thess Summary Thess Contrbutons Future Work References Appendx A: Proof of Sngle Server Heterogeneous Lower Bound Appendx B: Asymptotc Analyss of Dynamc vs. Statc Replca Selecton Appendx C: Analyss of Heterogeneous Batched At-arrval Polcy v

8 Lst of Tables Table 3.: Notaton used n Chapter Table 3.2: Summary of Worst-case Performance ( f>0 = f f > 0 and 0 otherwse) Table 3.3: Notaton for Heterogeneous Lower Bound Algorthm Table 4.: Notaton used n Chapter Table 4.2: Average and Maxmum Number of States usng the Optmal Offlne Algorthm (N = 6, c = 0.5, L =, λ = for all ) Table 5.: Notaton used n Chapter Table 5.2: Example Smulaton Executon Tmes for a Flash Crowd of Sze N v

9 Lst of Fgures Fgure 3.: Operaton of the Baselne Protocols for an Example Request Sequence Fgure 3.2: Lower Bound Approxmaton (% relatve error contours; unt of data volume s the fle, unt of tme s the tme requred to download the fle at maxmum rate:.e., L =, b = ) Fgure 3.3: Lower Bounds on Clent Delay (unt of data volume s the fle, unt of tme s the average tme between requests:.e., L... 5 Fgure 3.4: Maxmum Delay wth Baselne Protocols Relatve to Lower Bound (L = ) Fgure 3.5: Average Delay wth Baselne Protocols Relatve to Lower Bound (L = ) Fgure 3.6: Examples Scenaros for Improved Protocols Fgure 3.7: Maxmum Delay wth Improved Protocols Relatve to Lower Bound (L =, Fgure 3.8: Average Delay wth Improved Protocols Relatve to Lower Bound (L = ) Fgure 3.9: Impact of Class-specfc Maxmum Delays (L =, D 2 = 5D, varyng arrval 2 }) Fgure 3.0: Heterogeneous Lower Bound Algorthm Fgure 3.: Maxmum Delay wth Heterogeneous Clent Protocols Relatve to Lower Bound (L D values nversely proportonal to maxmum achevable recepton rates) Fgure 4.: Best Potental Performance wth Statc Polces Relatve to that wth Dynamc Polces, for Batched Servce Fgure 4.2: Best Potental Performance wth Statc Polces Relatve to that wth Dynamc Polces, for Fountan Servce... 9 Fgure 4.3: Confdence Intervals for Fgure 4.2(a) Fgure 4.4: Best Potental Performance wth At-arrval Polces Relatve to that wth General Dynamc Polces, for Batched Servce Fgure 4.5: Best Potental Performance wth At-arrval Polces Relatve to that wth General Dynamc Polces, for Fountan Servce Fgure 4.6: Performance wth Local State Polcy Relatve to the Best Potental Performance wth General Dynamc Polces, for Batched Servce Fgure 4.7: Performance wth Local State Polcy Relatve to the Best Potental Performance wth General Dynamc Polces, for Fountan Servce (L = L/2) v

10 Fgure 4.8: Performance wth Local State Polcy Relatve to the Performance wth the Canddate Global State Polcy, for Batched Servce Fgure 4.9: Best Potental Performance wth Statc Polces and wth At-arrval Polces, and Actual Performance wth a Local State Polcy, Relatve to the Best Potental Performance for General Dynamc Polces, for Batched Servce Fgure 4.0: Best Potental Performance wth Statc Polces and Actual Performance wth an At-arrval Polcy, Relatve to the Actual Performance for a Global Dynamc Polcy, for Batched Servce (each polcy s evaluated based on average delay) Fgure 5.: Max-mn Far Bandwdth Allocaton Algorthm used to Calculate the Rates of the Unchoked Peer Connectons Fgure 5.2: Average Achevable Startup Delay under a Steady State Posson Arrval Process wthout Early Departures: The Impact of Clent Bandwdth Capacty (b/u = 3, λ = 64, and ϕ = 0) Fgure 5.3: Cumulatve Dstrbuton Functon of the Best Achevable Startup Delay under a Steady State Posson Arrval Process wthout Early Departures (u = 2, b = 6, λ = 64, and ϕ = 0) Fgure 5.4: Average Achevable Startup Delay under Steady State Posson Arrval Process: Example Scenaros Fgure 5.5: Average Achevable Startup Delay under a Steady State Posson Arrval Process wth Early Departures (u = 2, b = 6, λ = 64) Fgure 5.6: Average Achevable Startup Delay under Exponentally Decayng Arrval Rates (u = 2, b = 6, λ(t) = λ 0 e ηt, λ 0 = 28η / ( e 2η )) Fgure 5.7: Average Achevable Startup Delay under a Steady State Posson Arrval Process wth both Hgh and Low Bandwdth Clents (λ = 64, ϕ = 0, u L = 0.4, b L =.2, u H = 2, b H = 6) Fgure 5.8: Exponentally Decayng Arrval Rates (u = 2, b = 6, λ(t) = λ 0 e ηt, λ 0 = 28η / ( e 2η )) Fgure 5.9: Heterogeneous Scenaro wth Posson Arrvals wth both Hgh and Low Bandwdth Clents (λ = 64, ϕ = 0, u L = 0.4, b L =.2, u H = 2, b H = 6) x

11 Lst of Common Notaton Ths table summarzes the most commonly used notaton n ths thess. Symbol Page Defnton A 40, 07 Average clent delay B 40, 8 Average rate at whch servce cost s ncurred (equal to the average server bandwdth) b 40, 9 Maxmum sustanable clent recepton rate (equal to download bandwdth capacty of a clent/peer) m b j 9 Maxmum sustanable download rate for any of j s download connectons C 8 Total servce delvery cost c 8 Access cost per unt of servce receved for all clent groups and replcas j, j D 40, 8 Maxmum clent delay f 4, 08 Batchng delay parameter (fracton of tmes n+ should be used as a threshold, rather than n) L 40, 80, 22 Servce requred by each requestng clent (equal to the fle sze) N 80 Number of replcas n 4, 08 Batchng delay parameter (threshold value on the number of requests) q 8 Average fracton of ts servce that a group clent receves from other than replca P, p Probabltes r 40, 80 Transmsson rate on a multcast channel r j 9 Transfer rate on a connecton from peer to peer j T, t Tme u 9 Upload bandwdth capacty of peer m u 9 Maxmum sustanable upload rate for any of s upload connectons α 90, 2 Zpf parameter 40 Batchng delay parameter (threshold value on the maxmum tme untl servce) δ j 9 f s transmttng to j (.e., j s nterested n and has been unchoked by ); 0 otherwse f >0 63, 09 or 0, based on logc comparson ϕ 22 Rate at whch peers defect from the system before havng completed download η 27 Exponental decay factor λ 40, 80, 22 Fle request rate x

12 Lst of Acronyms Ths table summarzes acronyms used n ths thess. Acronym Page Defnton AS 4 Autonomous System batchng/cbd 40 Batchng/constant batchng delay batchng/rbd 4 Batchng/request-based delay BGP 5 Boarder Gateway Protocol CBT 5 Core-Based Trees CDN 3 Content Dstrbuton Network cyclc/cd,l 55 Cyclc/constant delay, lsteners cyclc/cd,bot 57 Cyclc/constant delay, bounded on-tme cyclc/l 42 Cyclc/lsteners cyclc/rbd,l 60 Cyclc/request-based delay, lsteners cyclc/rbd,cot 6 Cyclc/request-based delay, controlled on-tme cyclc/w2,l 48 Cyclc/wat for second, lsteners DNS 6 Doman Name System DVMRP 5 Dstance Vector Multcast Routng Protocol EWMA 30 Expected weghted movng average FCFS 23 Frst Come Frst Serve 7 Heterogeneous lower bound IGMP 4 Internet Group Membershp Protocol ISP 4 Internet Servce Provders KBR 9 Key-based routng LTA 30 Long term average LWF 23 Longest Wat Frst MBGP 5 Multprotocol Boarder Gateway Protocol MOSPF 5 Multcast Open Shortest Path Frst MRF 23 Most Request Frst MRFL 23 Most Request Frst Lowest MSDP 6 Multcast Source Dscovery Protocol NRU 20 Normalzed Resource Usage PIM-SM 5 Protocol Independent Multcast Sparse Mode RP 5 Rendezvous pont sa 50 Shfted arrvals slp 46 Send as late as possble s-cyclc/l 73 Shared cyclc/lsteners x

13 Glossary Batchng protocol A type of servce aggregaton protocol, n whch clents havng requested a fle, wat to begn recevng the fle untl the begnnng of a multcast (or broadcast) transmsson, whch collectvely serves a set of watng clents. BtTorrent A peer-asssted download protocol, n whch a fle s splt nto smaller peces that can be downloaded n parallel from dfferent peers. Bulk data Data or fles for whch there s no advantageous order n whch data should be retreved. Choke algorthm Algorthm used, by BtTorrent, to determne whch peers to upload (and not to upload) peces of a fle to. Clent recepton rate The rate at whch data s receved by the clent. Content Dstrbuton Network (CDN) Interconnected servers dstrbuted across the network, whch allows the content to be effectvely replcated, clents to be served by nearby replcas, and the content dstrbutor to mantan control over the content. Contnuous meda fles Meda fles, such as audo and vdeo, that contnuously must be rendered at specfed rates. Cyclc multcast protocol A type of servce aggregaton protocol, n whch the fle data s cyclcally transmtted on a multcast channel, whch clents begn lstenng to at an arbtrary pont n tme, and contnue lstenng to untl all of the fle data has been receved. Dgtal fountan A cyclc multcast protocol, n whch the fle data s erasure coded such that a clent lstenng to the channel can recreate the orgnal content after havng retreved an arbtrary set of data equal (or slghtly larger) n sze as the orgnal fle. Download bandwdth capacty The maxmum sustanable rate at whch data can be receved by the clent. Download protocol Protocol used to transfer bulk data to clents. The man metrc of these protocols s the tme untl the entre fle s fully downloaded. Erasure codng Codng technque used to accommodate packet losses. Leecher BtTorrent peer whch does not have a complete copy of a fle, and currently s downloadng peces of the fle. x

14 Multcast Famly of technques used to set up forwardng trees and to forward the content (through these dstrbuton trees), from one or more source to multple recevers. Multcast channel The server and network resources used to delver each multcast to each member of a multcast group. Multcast group A collecton of nodes nterested n recevng the same multcast transmsson. Upload bandwdth capacty The maxmum sustanable rate at whch data can be transferred by the clent. Peer-asssted protocol Protocol n whch peers contrbute to the collectve power of the system by makng (part of) ther resources avalable. Peer-to-peer system Systems consstng of peers. Pece selecton polcy Polcy used by BtTorrent peer to determne the next pece to request for download. Proxy caches Content caches located at servers embedded between clents and the orgn server, whch ntercept clent requests and (n the case they have a stored copy) serves them on behalf of the orgn server. Posson arrval process A memoryless arrval process wth constant arrval rate, or equvalently, an arrval process wth nter-arrval tmes that are ndependent and exponentally dstrbuted. Replca A server whch has a copy of the replcated fle (or servce). Replca selecton polcy Polcy used to determne whch replca should serve a gven clent request. Seeder A BtTorrent peer whch has a complete copy of a fle (hence not requrng addtonal data to be downloaded), yet uploadng peces of the fle to other peers. Server bandwdth The rate at whch data s transferred by a server. Servce aggregaton technque Technque that allows multple clent requests to be served together n a manner that s more effcent than ndvdual servce. Streamng protocol Fle transfer protocol for contnuous meda fles that allows playback to begn before a fle s completely retreved. Tt-for-tat polcy Polcy used by BtTorrent, gvng upload preference to peers that provde the hghest download rates. x

15 Chapter Introducton Wth tremendous mprovements n network bandwdth and computer capabltes many new hgh-bandwdth applcatons have emerged n the entertanment, busness, and scentfc communtes. In contrast to tradtonal content dstrbuton systems, such as TV and rado channels, many of these new applcatons operate on an on-demand bass and only serve clents when explct requests for servce are made. As on-demand applcatons are becomng more popular, content provders are faced wth the problem of dstrbutng enormous amounts of data to a growng populaton of clent requests. For example, the sze of a full length move may be on the order of ggabytes. On-demand dssemnaton of such fles to many dfferent clents, potentally wdely dstrbuted across the Internet, requres sgnfcant server and network resources. Therefore, the rate at whch a system can serve clent requests s often lmted by the server (and/or network) bandwdth avalable for dssemnaton, where bandwdth refers to the amount of data that can be transferred per tme unt by the server (and/or across some network connecton). Two basc servce models commonly used for on-demand delvery of stored data are download and streamng. Wth download, clents download the entre fle before makng use of t. In ths context the man performance metrc s the tme untl the entre fle s downloaded. Streamng, on the other hand, utlzes the n-order playback characterstcs of meda fles, such as vdeo, to allow playback to begn well before all of the fle data s retreved. To ncrease the lkelhood that each part of the meda fle s retreved before ts playback tme, streamng technques generally requre that some ntal porton of the fle s retreved, and stored nto a buffer, before startng playback. Mantanng a buffer of fle data s especally mportant n envronments wth wdely varyng (playback and/or retreval) rates. Wth streamng, the prmary metrc of nterest s the startup delay untl playback can safely begn.

16 For content delvery systems to handle hgh request rates, t s mportant that protocols are desgned such that ether the resource requrements ncrease sub-lnearly wth ncreasng request rate, or the resources avalable for content delvery ncrease lnearly wth request rate. Usng scalable technques can allow a content dstrbutor wth lmted resources to provde ts customers wth better servce, handle a hgher request rate, and/or reduce ts resource requrements (and hence also ts delvery costs). Throughout ths thess the scalablty and resource requrements of dfferent delvery protocols and archtectures are consdered. Of partcular nterest s the best achevable delvery servce, gven some avalable resources. The remander of ths chapter s organzed as follows. Secton. provdes an overvew of exstng scalable content delvery approaches. Secton.2 defnes the objectves of the thess. The prmary contrbutons are outlned n Secton.3. Secton.4 gves the organzaton of the remander of the thess.. Scalable Content Delvery Before dscussng scalable delvery archtectures and protocols, consder the lmtatons of the basc clent-server model, n whch a content provder hosts all ts content at a sngle server, and clent requests are served ndvdually. Such systems, ndependently of the schedulng algorthm used, requre resource usage drectly proportonal to the number of requests. Wth lmted resources ths can easly result n unbounded clent delays or dropped requests. Further, both the server tself and the network connectvty to the server wll be potental bottlenecks and act as sngle ponts of falure. Scalablty can be acheved usng servce aggregaton (e.g., [2, 6, 0, 2, 26, 3, 57, 46, 50, 76, 80, 82]) or replcaton (e.g., [93, 94, 96, 33]) technques. Wth aggregaton, multple clent requests for the same fle are collectvely served. These technques often rely on one-to-many delvery multcast technques, whch buld effcent dssemnaton trees from a sngle sender to multple recevers. Wth replcaton, multple geographcally dstrbuted replcas of the content share the load of processng clent requests, offload the orgn content server, and enable delvery from nearby replca servers. For example, replcas may be proactvely pushed out to replca 2

17 servers across a Content Dstrbuton Network (CDN) or reactvely replcated at proxy caches n response to clent requests. Replcaton s also utlzed n peer-asssted systems, n whch other clents havng obtaned, or are currently obtanng, some content are wllng to serve as addtonal replca servers... Servce Aggregaton Rather than servng each request ndvdually, servce aggregaton technques attempt to serve multple requests smultaneously, n a manner that s more effcent than ndvdual servce. These technques often utlze multcast, n whch the server can use a sngle send operaton to delver content to all of the requestng clents. Multcast servce employs a multcast delvery tree to dssemnate the content. Ths tree can be constructed ether by network routers (e.g., [78, 23, 9, 8, 60, 6, 87, 38]) or by applcaton-level software (e.g., [45, 42, 95, 93, 53, 39, 39, 40]). When servng multple requests smultaneously, multcast can sgnfcantly decrease the bandwdth requrements at the server, as well as the total bandwdth requred throughout the network. Multcast-based servce aggregaton technques have been proposed both n the context of download and streamng. Prevous scalable protocols for downloadng large, popular fles from a sngle server nclude batchng [66, 82] and cyclc multcast [46, 0, 26, 76, 3, 50, 27]. Wth batchng, clents wat to begn recevng a requested fle untl the begnnng of ts next multcast transmsson, whch collectvely serves all of the watng clents that have accumulated up to that pont. Wth cyclc multcast, the fle data s contnually beng multcast. Clents can begn lstenng to the multcast at an arbtrary pont n tme, and contnue lstenng untl all of the fle data has been receved. In the context of streamng, scalable servce aggregaton protocols nclude perodc broadcast protocols [5, 77, 90, 9, 88] and mmedate servce protocols [79, 36, 89, 67, 68, 69, 76]. To allow playback to begn quckly, wth mmedate servce protocols, a new stream s started for each clent request, delverng the begnnng of the fle. To allow later clents to catch up wth earler clents, wth respect to the porton of the fle that has been receved, clents may also lsten to earler streams. At the pont a stream s no longer needed (snce the clents lstenng to t have already receved the data t s delverng, by lstenng to earler streams) t can be termnated. Wth perodc 3

18 broadcast protocols, segments of fles are perodcally multcast accordng to some schedule. Clents are provded wth a schedule for lstenng to the varous multcasts that ensures that all data s receved n tme. To accommodate packet losses many servce aggregaton technques, ncludng some cyclc multcast and perodc broadcast protocols, utlze erasure codes [48, 3, 64, 2]. Wth erasure codng, a fle of sze N blocks s encoded nto M blocks (M > N) such that recepton of only a subset of the M blocks (of total number N or slghtly larger) s suffcent to allow recreaton of the fle. For example, a clent lstenng to a cyclc multcast can recover from a packet loss by contnung to lsten untl a suffcent amount of erasure-coded data has been receved [46, 3]. Erasure codes also smplfy content delvery n systems utlzng replcaton [30]. A clent s able to download erasure coded blocks from multple servers wth mnmal duplcate block receptons, as long as M >> N. The rato M/N s called the stretch factor of the codng scheme...2 Replcaton The frst and smplest replcaton approach s for the content dstrbutor to nvest n a server farm consstng of a set of mrror servers among whch an ntellgent content swtch can drect requests. However, wthout servce aggregaton ths approach requres server and network resources to scale lnearly wth the number of requests and may result n a sngle pont of falure f all replcas are located n the same sub-network or behnd a common network bottleneck. Three alternatve replcaton strateges are () proxy cachng, () Content Dstrbuton Networks (CDNs), and () peer-to-peer networks...2. Proxy Cachng Internet Servce Provders (ISPs) or user communtes (such as busnesses or unverstes) often embed proxy servers or organzaton level caches at the boundary of ther networks. By redrectng clent requests through a proxy server, that caches prevously requested fles, these archtectures allow requests to be served by a nearby proxy server, rather than the orgn content source. Specfcally, f the proxy has a cached copy of the requested content, the proxy can serve the request tself, otherwse the proxy frst retreves a copy from the server. Proxy cachng can reduce network bandwdth usage as well as mprove the perceved clent performance. 4

19 To determne whch fles a proxy cache should retan copes of, varous replacement polces have been developed [47,, 34]. Such polces may explot () the hghly varable populartes of web objects, () short-term temporal localty n the object request stream, whereby an object may experence several closely spaced requests, and () the correlatons among requests for dfferent objects. However, wth relatvely cheap storage, dsk caches can be made large enough to make replacement polces less pertnent. The effectveness of proxy cachng s largely determned by the proporton of cacheable objects, and the rate these objects are updated, n comparson wth the request rate of each object [8]. To ncrease the probablty that a copy of the requested fle can be found close to the requestng clent, many systems have been proposed that use cooperatve cachng, whereby proxy caches close to each other cooperate n servng clent requests [7, 8]. Common for all cachng technques s that they work best f the content s statc; however, as data s pulled from the orgn server and stored at ndvdual proxy caches the content provder loses control over the content and can not provde servce guarantees. Therefore, the orgn server may nclude a drectve wth data that t sends to the proxy cache, requestng a short maxmum cache lfetme, forcng caches to refresh ther content relatvely frequently, and thus reducng ther effectveness Content Dstrbuton Networks Content Dstrbuton Networks (CDNs) [62, 66] are provsoned by content brokers. By dstrbutng servers across the network and nterconnectng them at the applcaton-level the content broker can create a dstrbuted overlay nfrastructure, whch t can use to provde content dstrbuton servces for content provders. Sellng ther servces to content provders, these networks are generally desgned to provde attractve servces such as relable and hgh qualty delvery to the content provder s customers. These systems releve content provders from nvestng n nfrastructure and offload the orgn content servers. Wth control over the entre delvery archtecture the content broker s able to allow the content provder to mantan full control of ts content. Ths added control also allows CDNs to be used to delver dynamc content and streamng meda [62] 5

20 In practce, CDNs use both reactve and proactve replcaton. In contrast to reactve approaches, used by proxy caches, proactve replcaton s extremely benefcal for networks that may suffer from substantal network delays, low bandwdth, or even undrectonal lnks. For example, n a network wth a undrectonal satellte lnk and no uplnk, data may be pushed to a local server, from whch local clents can retreve the data; or a move that s about to be released can be proactvely replcated to multple servers (avodng a sngle server to become overloaded at the release). Ths approach can be further mproved by dssemnatng content to servers at tmes when the network s less utlzed. Akama s the largest and best known CDN. In August 2006 t deploys 20,000 servers, spread over,000 networks, located n 7 dfferent countres. However, there are other commercal CDNs deployed that use many fewer servers. Also, some larger corporatons choose to set up prvate CDNs over whch they provde tranng, dstrbute tools, nformaton and software, as well as provde an nfrastructure for effcent wdearea meetngs, whle savng consderable network resources [66]. In an attempt to scale beyond the lmtatons set by ndvdual content brokers, wthout mpactng the prvacy of each CDN, some research efforts have nvestgated nterconnecton of ndependent CDNs [58, 80]. A common goal for all CDNs s to provde an archtecture that mprove the overall clent experence. When redrectng requests t s therefore mportant that content brokers provde an nfrastructure and mechansm that s transparent for the end user. In partcular, clent requests should be transparently redrected to an approprate server. Optmally, the clents should beneft from beng redrected whle nteractng wth the system n exactly the same way as f there were only a sngle server. Many redrecton technques have been proposed for CDNs [2]; however, most commercal systems use some form of Doman Name System (DNS) redrecton [03]. For example, Akama mplements ts own DNS servce usng a two level server herarchy [7]. Akama, August

21 ..2.3 Peer-to-Peer and Peer-asssted Systems In peer-to-peer and peer-asssted systems peers dstrbuted across the network contrbute to the collectve resources of the system. Even though the orgnal Internet was desgned on peer-to-peer prncples, t s not untl the last few years that peerasssted systems have been consdered for content dstrbuton. As more peers choose to share ther content and resources, the capacty of these archtectures grows. Wth approprate technques to dscover nearby replcas, these systems also have the potental to reduce network bandwdth usage. The man applcaton of current peer-to-peer systems s fle sharng among peers. Ths applcaton s not only the most wdespread applcaton, but also the most controversal applcaton. Systems such as Napster [24], Gnutella 2, Freenet [47, 88], Kazaa 3, and many of the stes provdng support for the BtTorrent [48] download protocol have ganed a multtude of attenton from authortes, copyrght protectors, and meda due to the enormous amount of copyrghted musc and moves that are shared among users across these systems. Other applcatons nclude dstrbuted computaton, computer gamng, and other collaboraton applcatons. Measurement studes have observed that peer-to-peer traffc s responsble for a large porton of the bytes transferred across the Internet (e.g., [57]). Wth ncreasng peer-to-peer traffc localty aware mechansms, whch allow content to be retreved from nearby rather than far-away peers becomes more mportant [45, 98]. Peer-asssted content dstrbuton systems and algorthms have been proposed for both lve streamng [39, 45, 95, 02] and for on-demand streamng of stored meda fles [24, 53, 6]. To acheve streamng, these protocols typcally establsh relatvely long-duraton streams from the content source and between peers, as organzed nto some form of overlay topology. In contrast, wth BtTorrent [48] and smlar download protocols (e.g., [78, 62]) a clent may download a fle from a large and changng set of peers, usng connectons of heterogeneous and tme-varyng bandwdths. Ths flexblty s acheved by breakng the fle nto many small peces, each of whch may be 2 Gnutella, August Kazaa, August

22 downloaded from dfferent peers. Ths approach has also been found benefcal n the context of lve streamng [86, 9, 90, 2]. Other work has proposed mechansms to replcate content [6, 5, 55, 52], search for content (or nformaton) [6, 84, 49, 50, 7, 05, 7, 72], as well as route data (or queres) [38, 39, 93, 68] n varous types of overlay peer-to-peer structures..2 Problem Descrpton Ths thess consders the scalablty and performance of download protocols, used to effectvely dssemnate data to a large number of requestng clents. In partcular, new protocols and polces are desgned and evaluated for three dfferent contexts, each achevng scalablty through servce aggregaton and/or replcaton. Frst, ths thess consders the problem of devsng sngle server protocols that mnmze the average or maxmum clent delay for downloadng a sngle fle, as a functon of the average server bandwdth used for delvery of that fle. An equvalent problem s to mnmze the average server bandwdth requred to acheve a gven average or maxmum clent delay. Ths equvalent perspectve s sometmes adopted. Although delvery of multple fles s not explctly consdered, note that use of a download protocol that mnmzes the average server bandwdth for delvery of each fle wll mnmze the average total requred server bandwdth for delverng all fles as well. Secondly, ths thess consders the problem of devsng polces to select whch replca should serve each request, n systems explotng both servce aggregaton and replcaton. Such polces must take nto consderaton the basc tradeoff between localty of servce (maxmzed by selectng the nearest replca), and effcency of use of server resources (maxmzed by selectng the replca at whch servce can be shared among the largest number of clents). Fnally, a peer-asssted envronment s consdered n whch the content s replcated but peers do not utlze servce aggregaton technques. For ths context, scalable download protocols, such as BtTorrent [48] have already been proposed, successfully deployed, and have shown to provde good performance [, 34]. Ths thess consders the problem of usng adaptatons of these download protocols to provde on-demand streamng of stored meda. 8

23 .3 Contrbutons The man contrbutons of ths thess are as follows. New scalable download protocols are desgned for download of a large fle from a sngle server, usng a multcast based approach, and ther performance evaluated aganst new analytc bounds on the best achevable performance. The relatve performance of classes of replca selecton polces, of varyng complextes, are compared n a context where a large fle may be downloaded from multple replca stes, each usng multcast. A peer-asssted protocol s desgned that splts a large meda fle nto small peces, uses a pece selecton polcy to determne whch pece to be downloaded next from multple content server(s) and/or other clents havng retreved part of the fle, n an order that allows streamng, as well as a rule to determne when playback can safely begn. For each of the above contexts a number of abstractons are developed, wthn whch protocols and polces are evaluated. The followng sectons elaborate on the contrbutons made n each context..3. Scalable Download from a Sngle Server To evaluate the performance of exstng and new protocols lower bounds on the average and maxmum clent delay for completely downloadng a fle, as functons of the average server bandwdth used to serve requests for that fle, are developed for systems wth homogeneous clents. The results show that nether optmzed versons of cyclc multcast nor batchng consstently yeld performance close to optmal. New, relatvely smple, scalable download protocols are proposed that acheve wthn 5% of the optmal maxmum delay and 20% of the optmal average delay n homogeneous systems. Smlar to cyclc multcast, these protocols allow clents to start lstenng to on-gong multcasts at the tme of ther arrval, but lmt server transmssons to tme perods n whch (probablstcally) there are more clents lstenng. For heterogeneous systems n whch clents have wdely-varyng achevable recepton rates, an addtonal desgn queston concerns the use of hgh-rate 9

24 transmssons, whch can decrease delay for clents that can receve at such rates, n addton to use of low-rate transmssons that can be receved by all clents. A new scalable download protocol for such systems s proposed, and ts performance s compared to that of alternatve protocols as well as to new lower bounds on maxmum clent delay. The new protocol acheves wthn 25% of the optmal maxmum clent delay n all scenaros consdered. Throughout ths analyss t s assumed that each requestng clent receves the entre fle (.e., clents never abort ther request whle watng for servce to begn or after havng receved only a porton of the fle). The analyss and protocols presented are compatble wth erasure-coded data. Each clent s assumed to have successfully receved the fle once t has lstened to multcasts of an amount of data L (termed the fle sze, although wth packet loss and erasure codng, L may exceed the true fle sze). Posson request arrvals are typcally assumed, although generalzatons are dscussed n some cases. Note that Posson arrvals can be expected for ndependent requests from large numbers of clents (durng tme perods wth constant arrval rates). Furthermore, multcast delvery protocols that have hgh performance for Posson arrvals, have even better performance under the more bursty arrval processes that are typcally found n contexts where clent requests are not ndependent [68]..3.2 Scalable Download from Multple Servers In large dstrbuted systems mplementng both replcaton and servce aggregaton, a basc tradeoff s between localty of servce (maxmzed by selectng the nearest replca), and effcency of use of server resources (maxmzed by selectng the replca at whch servce can be shared among the largest number of clents). Rather than propose a specfc polcy to medate ths tradeoff, classes of polces of dfferng complextes are compared wthn the context of a smple cost model, capturng both the servce requrements of the ndvdual replca servers, and the addtonal cost assocated wth retrevng servce at remote replcas. A large popular fle s assumed to be replcated at multple servers across the network, from whch the fle can be downloaded. The set of servers wth a replca may be determned based on expectatons of future demands, avalablty, or some other system requrements. Here, the set of servers wth a replca of the fle s assumed to be 0

25 predetermned. It s further assumed that each server mplements some form of servce aggregaton technque allowng multple clent requests to be served together, rather than ndvdually. Wthn each class of polces, lmts on the best achevable performance are determned (or representatves defned) for both batchng and cyclc multcast aggregaton approaches. When usng cyclc multcast the fle s assumed to be erasure encoded. Smlar to the analyss used for the sngle server case, ths analyss assumes that requests arrve accordng to a Posson process, and no clent aborts ther request whle watng for servce to begn or after havng receved only a porton of the fle. It s concluded that () selecton usng current system state nformaton (rather than only proxmtes and average loads) can yeld large mprovements n performance, () when t s possble to defer selecton decsons (e.g., when requests are delayed and served n batches), deferrng decsons as late as possble can yeld addtonal large mprovements, and () relatvely smple polces usng only local (rather than global) request nformaton are able to acheve most of the potental performance gans..3.3 On-demand Streamng usng Scalable Download Based on the desgn of the relatvely smple and flexble BtTorrent download protocol, ths thess proposes a peer-asssted BtTorrent-lke approach to meda fle delvery whch s able to acheve a form of streamng delvery, n the sense that playback can begn well before the entre meda fle s receved. Achevng ths goal requres: () a pece selecton strategy that effectvely medates the conflct between the goals of hgh pece dversty (acheved n BtTorrent usng a rarest-frst polcy), and the n-order requrements of meda fle playback, and () an on-lne rule for decdng when playback can safely commence. Canddate protocols ncludng both of these components are presented and evaluated usng event-based smulatons, n whch each peer s assumed to be bottlenecked by ether ts upload or download rate. Localty s not consdered n ths part of the thess. It s further (very conservatvely) assumed that no peer, except the orgn content source, shares peces once t has receved the whole fle. In a real system, peers are lkely to contnue servng other peers as long as they are stll playng out the meda fle, whle other peers may (gracously) choose to upload to other peers beyond

26 that tme. Wth the hgher avalablty of rare peces and download bandwdth n such systems, the benefts of more aggressve pece selecton technques (gvng prorty to earler peces rather than rare peces) are lkely to be even greater than presented here. It s found that smple probablstc pece selecton polces, gvng preference to earler peces, allow peers to begn playback well before the entre fle s downloaded. Further, whereas no on-lne strategy for selectng startup delays s expected to gve close to optmal startup delays (wthout sgnfcant chance of playback nterrupton), promsng results are obtaned usng a smple startup rule. Before startng playback, the rule requres the retreved number of peces to exceed some (small) threshold, and the rate at whch n-order peces are beng accumulated to exceed a value suffcent to allow contnuous playback wthout nterrupton, f that rate was to be mantaned..4 Thess Organzaton The remander of ths thess s organzed as follows. Chapter 2 revews related work, outlnng the current state of scalable download protocols and settng exstng solutons nto context. Chapter 3 develops lower bounds and new scalable download protocols that acheve close to optmal performance when downloadng large fles from a sngle server. Chapter 4 consders the problem of replca selecton n systems explotng both replcaton and servce aggregaton. Chapter 5 proposes adaptatons of exstng scalable peer-asssted download protocols, n a way that allows on-demand streamng. Conclusons and drectons for future work are presented n Chapter 6. 2

27 Chapter 2 2 Background Rather than attemptng to provde a complete survey of all exstng scalable content delvery protocols and archtectures, ths chapter focuses on the technques most relevant for the three contexts consdered n ths thess. Secton 2. presents an overvew of varous approaches to mplement multcast. Secton 2.2 surveys prevous work on scalable sngle server download protocols that use multcast-based servce aggregaton. Secton 2.3 dscusses replca placement and selecton technques applcable for the context of scalable download from multple servers. Fnally, related work on peer-asssted content delvery protocols s surveyed n Secton Multcast When dstrbutng content to multple clents across the Internet, content servers have tradtonally used multple concurrent uncast connectons. Ths approach suffers from hghly redundant usage of network resources and hgh server overhead. Wth multcast, n contrast, a sngle transmsson of the content can be receved by multple recevers. A collecton of nodes nterested n recevng the same multcast transmsson s called a multcast group, and the server and network resources used to transmt each multcast to each member of the group s called a multcast channel. Throughout ths thess, lstenng to a channel refers to lstenng to a partcular on-gong or ntermttent multcast transmsson. Content s dssemnated usng a multcast delvery tree, and n contrast to replcaton strateges, multcast does not requre any persstent storage capacty n the network. Multcast sgnfcantly decreases the bandwdth requrements at the server, and decreases the total bandwdth requred throughout the network. Despte frst beng mplemented as an overlay system mplemented at the applcaton-level [70], multcast was orgnally envsoned as a network-level functonalty ( IP multcast ) supported by the network routers [59]. In theory ths 3

28 would gve shorter paths and use less total network bandwdth; however, for numerous reasons IP multcast has seen slow commercal deployment [64, 87]. Ths has prompted much research on mplementng multcast at the applcaton level. Ths secton wll dscuss both IP multcast and applcaton-level multcast. 2.. IP Multcast Ths secton dscusses how the current multcast soluton has evolved and concludes wth a dscusson of current deployment ssues and alternatve network-level solutons that have been proposed. In the tradtonal IP multcast servce model, a multcast group s formed by a set of clents that have all expressed nterest n recevng transmssons sent to some partcular multcast address (used as the group dentfer). Whle only the nodes currently n the group receve data sent to the multcast address, any node, ncludng nodes that are not members of the group, can send data to the group by addressng transmssons to the multcast address. Implemented at the network-level, the content s delvered wthout guarantees of n-order or loss-free delvery. The Internet Group Membershp Protocol (IGMP) [32] provdes the functonalty to handle group membershp. It operates between clents and ther drectly attached routers. Group members use ths protocol to nform ther nearest router about multcast groups whch they wsh to jon or leave. Note that IGMP s only used for group membershp, and other protocols called multcast routng protocols are needed to buld and mantan delvery trees for each group. To acheve scale and admnstratve autonomy the Internet s organzed nto domans or regons, each called an Autonomous System (AS). Routng protocols are generally categorzed as ether ntradoman routng protocols, responsble for routng wthn a doman, or nterdoman routng protocols, responsble for routng between dfferent domans. Many dfferent ntradoman protocols have been proposed for multcast routng wthn an AS. The man dfferences among these protocols concern how they buld and mantan the multcast tree structure. These routng protocols are normally categorzed as ether dense-mode protocols or sparse-mode protocols. Dense-mode protocols are desgned to perform best when multcast transmssons must pass through most of the 4

29 network routers and normally use some form of broadcast and prune mechansm. Sparse-mode protocols are desgned to perform best when multcast transmssons need to pass through only a small fracton of the network routers and rely on recevers explctly sendng requests to jon the multcast group. Dense-mode ntradoman multcast protocols nclude Dstance Vector Multcast Routng Protocol (DVMRP) [78] and Multcast Open Shortest Path Frst (MOSPF) [23], whle sparse-mode protocols nclude Core-Based Trees (CBT) [9, 8] and Protocol Independent Multcast Sparse Mode (PIM-SM) [60, 6]. PIM-SM s also an ntegral component of the current nterdoman multcast archtecture. PIM-SM forms a reverse shortest path tree, rooted at a rendezvous pont (RP) assocated wth a multcast group, by settng up routng states at routers when propagatng the explct jon messages towards the RP. The tree s a reverse shortest path tree n the sense that the path from each recever to the RP uses the shortest IP path; however, wth the asymmetry of path lengths, these paths are not necessarly the shortest paths from the RP to each recever. A novel feature of PIM-SM s ts ablty to let recevers swtch from group-shared trees (n whch all content s forwarded through the RP) to source-specfc trees (n whch the multcast tree s rooted at the content source). Ths ablty can mprove performance for clents and offload the RP. Whle all routers n a specfc AS generally deploy the same multcast routng protocol, routers n dfferent domans may use dfferent protocols. Therefore, nterdoman routng protocols are generally requred to acheve nteroperablty among domans usng dfferent routng protocols. Up untl the begnnng of 999, DVMRP was almost exclusvely the only protocol deployed for nterdoman routng. However, as a dense-mode protocol (usng a broadcast and prune approach) t s not suted for sparse sets of partcpatng routers, and as observed by Rajvadya and Almeroth [37], DVMRP was almost entrely replaced n March In the replacement multcast archtecture, PIM-SM s used for routng and the Multprotocol Boarder Gateway Protocol (MBGP) [22], whch extends the Boarder Gateway Protocol (BGP) [44], s PIM-SM s currently the only multcast routng protocol used for nterdoman routng and t (or other PIM versons) s also typcally used for ntradoman routng [60]. 5

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Content Classification for Caching under CDNs

Content Classification for Caching under CDNs Content Classfcaton for Cachng under CDNs George Palls 1,2, Charlaos homos 2, Konstantnos Stamos 2, Athena Vakal 2, George Andreads 3 1 Department of Computer Scence, Unversty of Cyprus 2 Department of

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access Agenda Cache Performance Samra Khan March 28, 217 Revew from last lecture Cache access Assocatvty Replacement Cache Performance Cache Abstracton and Metrcs Address Tag Store (s the address n the cache?

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Analytic Evaluation of Quality of Service for On-Demand Data Delivery

Analytic Evaluation of Quality of Service for On-Demand Data Delivery Analytc Evaluaton of Qualty of Servce for On-Demand Data Delvery Hongfe Guo Haonan Tan ( guo@cs.wsc.edu) (haonan@cs.wsc.edu) Abstract Qualty of servce (QoS) measured as balkng probablty and average watng

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to:

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to: 4.1 4.2 Motvaton EE 457 Unt 4 Computer System Performance An ndvdual user wants to: Mnmze sngle program executon tme A datacenter owner wants to: Maxmze number of Mnmze ( ) http://e-tellgentnternetmarketng.com/webste/frustrated-computer-user-2/

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks Channel-Qualty Dependent Earlest Deadlne Due Far Schedulng Schemes for Wreless Multmeda Networks Ahmed K. F. Khattab Khaled M. F. Elsayed ahmedkhattab@eng.cu.edu.eg khaled@eee.org Department of Electroncs

More information

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement Clustered Multmeda NOD : Popularty-Based Artcle Prefetchng and Placement Y.J.Km, T.U.Cho, K.O.Jung, Y.K.Kang, S.H.Park, K-Dong Chung Department of Computer Scence, Pusan Natonal Unversty, Korea Abstract

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Scalable Video Streaming over P2P Networks: A Matter of Harmony?

Scalable Video Streaming over P2P Networks: A Matter of Harmony? 211 IEEE 16th Internatonal Workshop on Computer Aded Modelng and Desgn of Communcaton Lnks and Networks (CAMAD) Scalable Vdeo Streamng over P2P Networks: A Matter of Harmony? Samr Medah 1, Toufk Ahmed

More information

DUE to the recent popularization of hand-held mobile

DUE to the recent popularization of hand-held mobile IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 4, APRIL 2016 803 Contact Duraton Aware Data Replcaton n DTNs wth Lcensed and Unlcensed Spectrum Jng Zhao, Student Member, IEEE, Xuejun Zhuo, Qnghua

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations Routng n Delay Tolerant Networks Comprsng Heterogeneous Node Populatons Thrasyvoulos Spyropoulos, Member, IEEE, Therry Turlett, Member, IEEE, and Kata Obraczka, Member, IEEE Abstract Communcaton networks

More information

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment TrpS: Automated Mult-tered Data Placement n a Geo-dstrbuted Cloud Envronment Kwangsung Oh, Abhshek Chandra, and Jon Wessman Department of Computer Scence and Engneerng Unversty of Mnnesota Twn Ctes Mnneapols,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Contact Duration Aware Data Replication in Delay Tolerant Networks

Contact Duration Aware Data Replication in Delay Tolerant Networks Contact Duraton Aware Data Replcaton n Delay Tolerant Networks Xuejun Zhuo, Qnghua L, We Gao, Guohong Cao, Yq Da Tsnghua Natonal Laboratory for Informaton Scence and Technology, Tsnghua Unversty, Chna.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Modelling a Queuing System for a Virtual Agricultural Call Center

Modelling a Queuing System for a Virtual Agricultural Call Center 25-28 July 2005, Vla Real, Portugal Modellng a Queung System for a Vrtual Agrcultural Call Center İnc Şentarlı, a, Arf Orçun Sakarya b a, Çankaya Unversty, Department of Management,06550, Balgat, Ankara,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information