The production of peer-to-peer video-streaming networks
|
|
- Mary McGee
- 5 years ago
- Views:
Transcription
1 The production of peer-to-peer video-streaming networks Dafu Lou Yongyi Mao Tet H. Yeap SITE, University of Ottawa, Canada SIGCOMM 07 P2P-TV, August 31, 2007, Kyoto, Japan.
2 Outline Problem 1 Problem Dynamics of user for P2P Video Streaming Networks 2 System Model Definitions 3 A Lower Bound of Production Proof:Protocol A 4 Protocol A Protocol B
3 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
4 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
5 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
6 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
7 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
8 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
9 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks
10 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function.
11 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function. What is the mathematical formula? No answer yet. Related to protocols. non-linear.
12 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function. What is the mathematical formula? No answer yet. Related to protocols. non-linear. The problem becomes linear for using Fountain Codes rateless coding.
13 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes
14 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block.
15 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block.
16 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block. Do not need to know the statistics of packet loss.
17 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block. Do not need to know the statistics of packet loss. The sum of the link capacities along all links can be achieved.
18 System Model Problem System Model Definitions Video server: M video blocks. Arrived users: N(t). User uploading bandwidth: b bits/second. Server uploading bandwidth: s bits/second.
19 Definition Production System Model Definitions Definition (Production) For any given network and under any given video-streaming protocol, the production N m (t) of block m at time t is defined as the number of users that have obtained block m by time t.
20 System Model Definitions Definition Production Potential Definition (Production Potential) Under any given video-streaming protocol, the production potential S m (t) of block m at time t is defined by S m (t) := 1 γ A t 0 (s m (τ) + b m (τ)n m (τ)) dτ, where s m (t) and b m (t), depending on the protocol, are respectively the server s output bandwidth allocated to transmitting block m at time t and the average user output bandwidth allocated to transmitting block m at time t, where the average is the overall users having obtained block m.
21 Definition Saturation System Model Definitions Definition (m-unsat and Saturation Time) At any time T, the system is said to be block-m-unsaturating, or m-unsat, if for any t [0, T ], N m 1 (t) > S m (t), or N m 1 (t) = S m (t) = 0. where N 0 (t) := N(t). The saturation time T m of block m is defined as T m := sup{t : the system is m UNSAT at T }.
22 Saturation Time Problem System Model Definitions For a practical P2P protocol, the saturation time has the following properties: T m is finite for every m and as small as possible.
23 Saturation Time Problem System Model Definitions For a practical P2P protocol, the saturation time has the following properties: T m is finite for every m and as small as possible. At time t > T m, N m (t) is close to N(t).
24 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Assumption: λ T 1 > e. (1)
25 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Assumption: λ T 1 > e. (1) Theorem Under above assumption, there exists a transport protocol such that ) 1 N m (t) min (λt, e b(1 γ) AM (t Tm) u(t T m ) for all m {1, 2,... M}, where and 2 Tm is finite for every m. T m = ma/(1 γ)s + 1/λ;
26 Proof of Theroem: Protocol A A Lower Bound of Production Proof:Protocol A We prove Theorem 1 by constructing a protocol(protocol A) to induce a linear-system dynamics. Protocol A. Server only provides video blocks to the first arrived user. Every user requests video blocks in sequence. Every user allocates the same fraction of its output bandwidth for distributing each block.
27 Proof of Theroem: Protocol A A Lower Bound of Production Proof:Protocol A We prove Theorem 1 by constructing a protocol(protocol A) to induce a linear-system dynamics. Protocol A. Server only provides video blocks to the first arrived user. Every user requests video blocks in sequence. Every user allocates the same fraction of its output bandwidth for distributing each block. Prove the result by induction.
28 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Corollary There exists a fountain-coded transport protocol such that T m T A m, for all m {1, 2,... M}.
29 Protocol A Protocol B Simulated production achieved by Protocol A and Theoretical results of Theorem 1 Production N m (t) λ =1/4, γ =2%, M=3, s=5mbps, b=5mbps, A= 14M bytes, protocol A Block 1(Simulated) Block 2 (Simulated) Block 3 (Simulated) Block 1 (Theoretical) Block 2 (Theoretical) Block 3 (Theoretical) 50 Block 1 Block 2 Block Time (s)
30 Protocol A Protocol B Simulated production achieved by Protocol A and Theoretical results of Theorem 1 Derivative of production (t) N m λ =1/4, γ =2%, M=3, s=5mbps, b=5mbps, A= 14M bytes, protocol A Block 1 Block 2 Block 3 Block 1 (Simulated) Block 2 (Simulated) Block 3 (Simulated) Block 1 (Theoretical) Block 2 (Theoretical) Block 3 (Theoretical) Time (s)
31 Protocol B extend for more practical settings Protocol A Protocol B Server keeps supplying video blocks to users. Every user allocates the output bandwidth for each block dynamically.
32 Protocol A Protocol B Simulated production achieved by Protocol B and the lower bounds of Theorem 1 Production N m (t) λ =1/4, γ =2%, M=10, s=20mbps,b=1mbps, A=14M bytes, β=3.75mbps, protocol B Block 1 (Simulated) Block 5 (Simulated) Block 10 (Simulated) Block 1 (Theoretical) Block 5 (Theoretical) Block 10 (Theoretical) Block 5 Block Time (s) Block 1 Block 1 Block 5 Block 10
33 Protocol A Protocol B Simulated production achieved by Protocol B and the lower bounds of Theorem 1 Derivative of production N m (t) Block 1 Block 5 λ =1/4, γ =2%, M=10, s=20mbps,b=1mbps, A=14M bytes, β=3.75mbps, protocol B Block 10 Block 1 (Simulated) Block 5 (Simulated) Block 10 (Simulated) Block 1 (Theoretical) Block 5 (Theoretical) Block 10 (Theoretical) Block 10 Block 5 Block Time (s)
34 Problem Study the dynamics of P2P video streaming networks based on fountain codes. Introduce production to characterize the system dynamics. Theroetical results have been presented based on the production. Simulation results have also been compared finnally.
Resilient Video-on-Demand streaming over P2P networks
Resilient Video-on-Demand streaming over P2P networks Dafu Lou, Tet H. Yeap SIT, University of Ottawa, Canada {dlou,tet}@site.uottawa.ca Abstract This paper presents a novel video-on-demand (VoD) streaming
More informationMinimizing Server Throughput for Low-Delay Live Streaming in Content Delivery Networks. F. Zhou, S. Ahmad, E. Buyukkaya, R. Hamzaoui and G.
Minimizing Server Throughput for Low-Delay Live Streaming in Content Delivery Networks F. Zhou, S. Ahmad, E. Buyukkaya, R. Hamzaoui and G. Simon Live Stream Delivery Content Provider CDN encoders ingest
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationOptimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationMeasurement-Based Multicast on Overlay Architecture
Measurement-Based Multicast on Overlay Architecture Students: Tuna Guven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review June 18 th, 2004 1 Outline Multi-path Multicast Routing
More informationCover sheet for Assignment 3
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationT. Background material: Topology
MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 T. Background material: Topology For convenience this is an overview of basic topological ideas which will be used in the course. This material
More informationEfficient Universal Recovery in Broadcast Networks
Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem
More informationOn total domination and support vertices of a tree
On total domination and support vertices of a tree Ermelinda DeLaViña, Craig E. Larson, Ryan Pepper and Bill Waller University of Houston-Downtown, Houston, Texas 7700 delavinae@uhd.edu, pepperr@uhd.edu,
More informationPaths, Flowers and Vertex Cover
Paths, Flowers and Vertex Cover Venkatesh Raman, M.S. Ramanujan, and Saket Saurabh Presenting: Hen Sender 1 Introduction 2 Abstract. It is well known that in a bipartite (and more generally in a Konig)
More informationMath Introduction to Advanced Mathematics
Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.
More informationLecture-12: Closed Sets
and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationAdvanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs
Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material
More informationExcellent graphs Preethi Kuttipulackal Mixed Tree Domination in Graphs Thesis. Department of Mathematics, University of Calicut, 2012
Excellent graphs Preethi Kuttipulackal Mixed Tree Domination in Graphs Thesis. Department of Mathematics, University of Calicut, 2012 CHAPTER 5 Excellent graphs 5.1 Introduction The main difficulty in
More informationFinite Model Generation for Isabelle/HOL Using a SAT Solver
Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly
More informationCS 2336 Discrete Mathematics
CS 2336 Discrete Mathematics Lecture 15 Graphs: Planar Graphs 1 Outline What is a Planar Graph? Euler Planar Formula Platonic Solids Five Color Theorem Kuratowski s Theorem 2 What is a Planar Graph? Definition
More informationInduction and Recursion. CMPS/MATH 2170: Discrete Mathematics
Induction and Recursion CMPS/MATH 2170: Discrete Mathematics Outline Mathematical induction (5.1) Sequences and Summations (2.4) Strong induction (5.2) Recursive definitions (5.3) Recurrence Relations
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More information4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function
More informationModule 7. Independent sets, coverings. and matchings. Contents
Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................
More informationRaptor Codes for P2P Streaming
Raptor Codes for P2P Streaming Philipp Eittenberger 1, Todor Mladenov 2, Udo Krieger 1 1 Faculty of Information Systems and Applied Computer Science Otto-Friedrich University Bamberg, Germany 2 Department
More informationApplication Layer Multicast Algorithm
Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast
More informationModel suitable for virtual circuit networks
. The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in
More informationLecture - 8A: Subbasis of Topology
Lecture - 8A: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline 1 Introduction 2 3 4 Introduction I As we know that topology generated by a basis B may
More informationOn Biased Reservoir Sampling in the Presence of Stream Evolution
Charu C. Aggarwal T J Watson Research Center IBM Corporation Hawthorne, NY USA On Biased Reservoir Sampling in the Presence of Stream Evolution VLDB Conference, Seoul, South Korea, 2006 Synopsis Construction
More informationExploring Domains of Approximation in R 2 : Expository Essay
Exploring Domains of Approximation in R 2 : Expository Essay Nicolay Postarnakevich August 12, 2013 1 Introduction In this paper I explore the concept of the Domains of Best Approximations. These structures
More informationEnd-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks
End-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks Saswati Sarkar and Leandros Tassiulas 1 Abstract Sharing the common spectrum among the links in a vicinity
More informationAssignment 1 Introduction to Graph Theory CO342
Assignment 1 Introduction to Graph Theory CO342 This assignment will be marked out of a total of thirty points, and is due on Thursday 18th May at 10am in class. Throughout the assignment, the graphs are
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationLine Graphs and Circulants
Line Graphs and Circulants Jason Brown and Richard Hoshino Department of Mathematics and Statistics Dalhousie University Halifax, Nova Scotia, Canada B3H 3J5 Abstract The line graph of G, denoted L(G),
More informationA Reduction of Conway s Thrackle Conjecture
A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854
More informationComplete Cototal Domination
Chapter 5 Complete Cototal Domination Number of a Graph Published in Journal of Scientific Research Vol. () (2011), 547-555 (Bangladesh). 64 ABSTRACT Let G = (V,E) be a graph. A dominating set D V is said
More informationNegations in Refinement Type Systems
Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More information1 Elementary number theory
Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},
More informationOver-contribution in discretionary databases
Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social
More informationBounded subsets of topological vector spaces
Chapter 2 Bounded subsets of topological vector spaces In this chapter we will study the notion of bounded set in any t.v.s. and analyzing some properties which will be useful in the following and especially
More informationAN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES
AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES MICHAEL FERRARA, RONALD J. GOULD, MICHA L KAROŃSKI, AND FLORIAN PFENDER Abstract. An assignment of positive integer weights to the edges of a
More informationImpact of Clustering on Epidemics in Random Networks
Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More information9.5 Equivalence Relations
9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationCSE 417 Network Flows (pt 3) Modeling with Min Cuts
CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined
More informationMichael Johas Teener. April 11, 2008
Michael Johas Teener April 11, 2008 V date updates 1 31 jan 08 original version, class A only, no observation interval 2 11 may 08 validation of assumptions, where class observation interval is needed,
More informationELEMENTARY NUMBER THEORY AND METHODS OF PROOF
CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.2 Direct Proof and Counterexample II: Rational Numbers Copyright Cengage Learning. All
More information1KOd17RMoURxjn2 CSE 20 DISCRETE MATH Fall
CSE 20 https://goo.gl/forms/1o 1KOd17RMoURxjn2 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Today's learning goals Explain the steps in a proof by mathematical and/or structural
More informationThe Set-Open topology
Volume 37, 2011 Pages 205 217 http://topology.auburn.edu/tp/ The Set-Open topology by A. V. Osipov Electronically published on August 26, 2010 Topology Proceedings Web: http://topology.auburn.edu/tp/ Mail:
More informationAlgorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees
Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Wei Wang joint with Zishen Yang, Xianliang Liu School of Mathematics and Statistics, Xi an Jiaotong University Dec 20, 2016
More informationsimply ordered sets. We ll state only the result here, since the proof is given in Munkres.
p. 1 Math 490 Notes 20 More About Compactness Recall that in Munkres it is proved that a simply (totally) ordered set X with the order topology is connected iff it satisfies: (1) Every subset bounded above
More informationCompact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University
Compact Sets James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University September 15, 2017 Outline 1 Closed Sets 2 Compactness 3 Homework Closed Sets
More informationXiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University
Congestion-aware Rate Allocation For Multipath Video Streaming Over Ad Hoc Wireless Networks Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering
More informationarxiv:math/ v1 [math.co] 1 Oct 2004
arxiv:math/0410030v1 [math.co] 1 Oct 2004 COVER PEBBLING CYCLES AND CERTAIN GRAPH PRODUCTS MAGGY TOMOVA AND CINDY WYELS Abstract. A pebbling step on a graph consists of removing two pebbles from one vertex
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationDimensioning Links for IP Telephony
Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.
More informationCS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF
CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the
More informationDistributed Computing over Communication Networks: Leader Election
Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination
More informationIntroduction to Queuing Systems
Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability
More informationConstruction C : an inter-level coded version of Construction C
Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very
More informationChapter S:V. V. Formal Properties of A*
Chapter S:V V. Formal Properties of A* Properties of Search Space Graphs Auxiliary Concepts Roadmap Completeness of A* Admissibility of A* Efficiency of A* Monotone Heuristic Functions S:V-1 Formal Properties
More informationError correction guarantees
Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if
More informationTOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3.
TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. 301. Definition. Let m be a positive integer, and let X be a set. An m-tuple of elements of X is a function x : {1,..., m} X. We sometimes use x i instead
More informationPerformance and cost effectiveness of caching in mobile access networks
Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More information6. Advanced Topics in Computability
227 6. Advanced Topics in Computability The Church-Turing thesis gives a universally acceptable definition of algorithm Another fundamental concept in computer science is information No equally comprehensive
More information1.7 The Heine-Borel Covering Theorem; open sets, compact sets
1.7 The Heine-Borel Covering Theorem; open sets, compact sets This section gives another application of the interval halving method, this time to a particularly famous theorem of analysis, the Heine Borel
More information16.Greedy algorithms
16.Greedy algorithms 16.1 An activity-selection problem Suppose we have a set S = {a 1, a 2,..., a n } of n proposed activities that with to use a resource. Each activity a i has a start time s i and a
More informationTCP performance analysis through. processor sharing modeling
TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking
More informationLecture : Topological Space
Example of Lecture : Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Example of 1 2 3 Example of 4 5 6 Example of I Topological spaces and continuous
More information4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1
4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 Definition: A Linear Programming (LP) problem is an optimization problem: where min f () s.t. X n the
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationA note on isolate domination
Electronic Journal of Graph Theory and Applications 4 (1) (016), 94 100 A note on isolate domination I. Sahul Hamid a, S. Balamurugan b, A. Navaneethakrishnan c a Department of Mathematics, The Madura
More informationPaths, Flowers and Vertex Cover
Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is
More information1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:
P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string
More informationA point is pictured by a dot. While a dot must have some size, the point it represents has no size. Points are named by capital letters..
Chapter 1 Points, Lines & Planes s we begin any new topic, we have to familiarize ourselves with the language and notation to be successful. My guess that you might already be pretty familiar with many
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationIntroduction to Rational Billiards II. Talk by John Smillie. August 21, 2007
Introduction to Rational Billiards II Talk by John Smillie August 21, 2007 Translation surfaces and their singularities Last time we described the Zemlyakov-Katok construction for billiards on a triangular
More informationDynamic Content Allocation for Cloudassisted Service of Periodic Workloads
Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads György Dán Royal Institute of Technology (KTH) Niklas Carlsson Linköping University @ IEEE INFOCOM 2014, Toronto, Canada, April/May
More informationWe show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C.
219 Lemma J For all languages A, B, C the following hold i. A m A, (reflexive) ii. if A m B and B m C, then A m C, (transitive) iii. if A m B and B is Turing-recognizable, then so is A, and iv. if A m
More informationIMO Training 2008: Graph Theory
IMO Training 2008: Graph Theory by: Adrian Tang Email: tang @ math.ucalgary.ca This is a compilation of math problems (with motivation towards the training for the International Mathematical Olympiad)
More informationProxy-based TCP-friendly streaming over mobile networks
Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control
More informationA new caching policy for cloud assisted Peer-to-Peer video on-demand services
A new caching policy for cloud assisted Peer-to-Peer video on-demand services Franco Robledo, Pablo Rodríguez-Bocca, Pablo Romero and Claudia Rostagnol Facultad de Ingeniería, Universidad de la República.
More informationTopology basics. Constraints and measures. Butterfly networks.
EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationAlphabets, strings and formal. An introduction to information representation
Alphabets, strings and formal languages An introduction to information representation 1 Symbols Definition: A symbol is an object endowed with a denotation (i.e. literal meaning) Examples: Variables are
More informationRecursive Definitions Structural Induction Recursive Algorithms
Chapter 4 1 4.3-4.4 Recursive Definitions Structural Induction Recursive Algorithms 2 Section 4.1 3 Principle of Mathematical Induction Principle of Mathematical Induction: To prove that P(n) is true for
More information11.1. Definitions. 11. Domination in Graphs
11. Domination in Graphs Some definitions Minimal dominating sets Bounds for the domination number. The independent domination number Other domination parameters. 11.1. Definitions A vertex v in a graph
More informationBitTorrent Fairness Analysis
BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)
More informationSection 6.3: Further Rules for Counting Sets
Section 6.3: Further Rules for Counting Sets Often when we are considering the probability of an event, that event is itself a union of other events. For example, suppose there is a horse race with three
More informationGraph Theory Mini-course
Graph Theory Mini-course Anthony Varilly PROMYS, Boston University, Boston, MA 02215 Abstract Intuitively speaking, a graph is a collection of dots and lines joining some of these dots. Many problems in
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationIntroduction to Data Mining
Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,
More informationIndexable and Strongly Indexable Graphs
Proceedings of the Pakistan Academy of Sciences 49 (2): 139-144 (2012) Copyright Pakistan Academy of Sciences ISSN: 0377-2969 Pakistan Academy of Sciences Original Article Indexable and Strongly Indexable
More informationOn the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes
On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,
More informationOn Achieving Fairness in the Joint Allocation of Processing and Bandwidth Resources: Principles and Algorithms. Yunkai Zhou and Harish Sethu
On Achieving Fairness in the Joint Allocation of Processing and Bandwidth Resources: Principles and Algorithms Yunkai Zhou and Harish Sethu Technical Report DU-CS-03-02 Department of Computer Science Drexel
More information