The production of peer-to-peer video-streaming networks

Size: px
Start display at page:

Download "The production of peer-to-peer video-streaming networks"

Transcription

1 The production of peer-to-peer video-streaming networks Dafu Lou Yongyi Mao Tet H. Yeap SITE, University of Ottawa, Canada SIGCOMM 07 P2P-TV, August 31, 2007, Kyoto, Japan.

2 Outline Problem 1 Problem Dynamics of user for P2P Video Streaming Networks 2 System Model Definitions 3 A Lower Bound of Production Proof:Protocol A 4 Protocol A Protocol B

3 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

4 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

5 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

6 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

7 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

8 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

9 P2P Video Streaming Networks Dynamics of user for P2P Video Streaming Networks

10 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function.

11 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function. What is the mathematical formula? No answer yet. Related to protocols. non-linear.

12 Dynamics of user for P2P Video Streaming Networks Dynamics of users for P2P video streaming networks It is an exponential function. What is the mathematical formula? No answer yet. Related to protocols. non-linear. The problem becomes linear for using Fountain Codes rateless coding.

13 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes

14 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block.

15 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block.

16 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block. Do not need to know the statistics of packet loss.

17 Fountain Codes for Video Streaming Dynamics of user for P2P Video Streaming Networks Video stream encoded using Fountain Codes Generate an infinite sequence of encoded packets for each video block. Decode the video block from any received approximately the same number of the bits as the video block. Do not need to know the statistics of packet loss. The sum of the link capacities along all links can be achieved.

18 System Model Problem System Model Definitions Video server: M video blocks. Arrived users: N(t). User uploading bandwidth: b bits/second. Server uploading bandwidth: s bits/second.

19 Definition Production System Model Definitions Definition (Production) For any given network and under any given video-streaming protocol, the production N m (t) of block m at time t is defined as the number of users that have obtained block m by time t.

20 System Model Definitions Definition Production Potential Definition (Production Potential) Under any given video-streaming protocol, the production potential S m (t) of block m at time t is defined by S m (t) := 1 γ A t 0 (s m (τ) + b m (τ)n m (τ)) dτ, where s m (t) and b m (t), depending on the protocol, are respectively the server s output bandwidth allocated to transmitting block m at time t and the average user output bandwidth allocated to transmitting block m at time t, where the average is the overall users having obtained block m.

21 Definition Saturation System Model Definitions Definition (m-unsat and Saturation Time) At any time T, the system is said to be block-m-unsaturating, or m-unsat, if for any t [0, T ], N m 1 (t) > S m (t), or N m 1 (t) = S m (t) = 0. where N 0 (t) := N(t). The saturation time T m of block m is defined as T m := sup{t : the system is m UNSAT at T }.

22 Saturation Time Problem System Model Definitions For a practical P2P protocol, the saturation time has the following properties: T m is finite for every m and as small as possible.

23 Saturation Time Problem System Model Definitions For a practical P2P protocol, the saturation time has the following properties: T m is finite for every m and as small as possible. At time t > T m, N m (t) is close to N(t).

24 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Assumption: λ T 1 > e. (1)

25 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Assumption: λ T 1 > e. (1) Theorem Under above assumption, there exists a transport protocol such that ) 1 N m (t) min (λt, e b(1 γ) AM (t Tm) u(t T m ) for all m {1, 2,... M}, where and 2 Tm is finite for every m. T m = ma/(1 γ)s + 1/λ;

26 Proof of Theroem: Protocol A A Lower Bound of Production Proof:Protocol A We prove Theorem 1 by constructing a protocol(protocol A) to induce a linear-system dynamics. Protocol A. Server only provides video blocks to the first arrived user. Every user requests video blocks in sequence. Every user allocates the same fraction of its output bandwidth for distributing each block.

27 Proof of Theroem: Protocol A A Lower Bound of Production Proof:Protocol A We prove Theorem 1 by constructing a protocol(protocol A) to induce a linear-system dynamics. Protocol A. Server only provides video blocks to the first arrived user. Every user requests video blocks in sequence. Every user allocates the same fraction of its output bandwidth for distributing each block. Prove the result by induction.

28 A Lower Bound of Production A Lower Bound of Production Proof:Protocol A Corollary There exists a fountain-coded transport protocol such that T m T A m, for all m {1, 2,... M}.

29 Protocol A Protocol B Simulated production achieved by Protocol A and Theoretical results of Theorem 1 Production N m (t) λ =1/4, γ =2%, M=3, s=5mbps, b=5mbps, A= 14M bytes, protocol A Block 1(Simulated) Block 2 (Simulated) Block 3 (Simulated) Block 1 (Theoretical) Block 2 (Theoretical) Block 3 (Theoretical) 50 Block 1 Block 2 Block Time (s)

30 Protocol A Protocol B Simulated production achieved by Protocol A and Theoretical results of Theorem 1 Derivative of production (t) N m λ =1/4, γ =2%, M=3, s=5mbps, b=5mbps, A= 14M bytes, protocol A Block 1 Block 2 Block 3 Block 1 (Simulated) Block 2 (Simulated) Block 3 (Simulated) Block 1 (Theoretical) Block 2 (Theoretical) Block 3 (Theoretical) Time (s)

31 Protocol B extend for more practical settings Protocol A Protocol B Server keeps supplying video blocks to users. Every user allocates the output bandwidth for each block dynamically.

32 Protocol A Protocol B Simulated production achieved by Protocol B and the lower bounds of Theorem 1 Production N m (t) λ =1/4, γ =2%, M=10, s=20mbps,b=1mbps, A=14M bytes, β=3.75mbps, protocol B Block 1 (Simulated) Block 5 (Simulated) Block 10 (Simulated) Block 1 (Theoretical) Block 5 (Theoretical) Block 10 (Theoretical) Block 5 Block Time (s) Block 1 Block 1 Block 5 Block 10

33 Protocol A Protocol B Simulated production achieved by Protocol B and the lower bounds of Theorem 1 Derivative of production N m (t) Block 1 Block 5 λ =1/4, γ =2%, M=10, s=20mbps,b=1mbps, A=14M bytes, β=3.75mbps, protocol B Block 10 Block 1 (Simulated) Block 5 (Simulated) Block 10 (Simulated) Block 1 (Theoretical) Block 5 (Theoretical) Block 10 (Theoretical) Block 10 Block 5 Block Time (s)

34 Problem Study the dynamics of P2P video streaming networks based on fountain codes. Introduce production to characterize the system dynamics. Theroetical results have been presented based on the production. Simulation results have also been compared finnally.

Resilient Video-on-Demand streaming over P2P networks

Resilient Video-on-Demand streaming over P2P networks Resilient Video-on-Demand streaming over P2P networks Dafu Lou, Tet H. Yeap SIT, University of Ottawa, Canada {dlou,tet}@site.uottawa.ca Abstract This paper presents a novel video-on-demand (VoD) streaming

More information

Minimizing Server Throughput for Low-Delay Live Streaming in Content Delivery Networks. F. Zhou, S. Ahmad, E. Buyukkaya, R. Hamzaoui and G.

Minimizing Server Throughput for Low-Delay Live Streaming in Content Delivery Networks. F. Zhou, S. Ahmad, E. Buyukkaya, R. Hamzaoui and G. Minimizing Server Throughput for Low-Delay Live Streaming in Content Delivery Networks F. Zhou, S. Ahmad, E. Buyukkaya, R. Hamzaoui and G. Simon Live Stream Delivery Content Provider CDN encoders ingest

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

Measurement-Based Multicast on Overlay Architecture

Measurement-Based Multicast on Overlay Architecture Measurement-Based Multicast on Overlay Architecture Students: Tuna Guven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review June 18 th, 2004 1 Outline Multi-path Multicast Routing

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

T. Background material: Topology

T. Background material: Topology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 T. Background material: Topology For convenience this is an overview of basic topological ideas which will be used in the course. This material

More information

Efficient Universal Recovery in Broadcast Networks

Efficient Universal Recovery in Broadcast Networks Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem

More information

On total domination and support vertices of a tree

On total domination and support vertices of a tree On total domination and support vertices of a tree Ermelinda DeLaViña, Craig E. Larson, Ryan Pepper and Bill Waller University of Houston-Downtown, Houston, Texas 7700 delavinae@uhd.edu, pepperr@uhd.edu,

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman, M.S. Ramanujan, and Saket Saurabh Presenting: Hen Sender 1 Introduction 2 Abstract. It is well known that in a bipartite (and more generally in a Konig)

More information

Math Introduction to Advanced Mathematics

Math Introduction to Advanced Mathematics Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.

More information

Lecture-12: Closed Sets

Lecture-12: Closed Sets and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

Excellent graphs Preethi Kuttipulackal Mixed Tree Domination in Graphs Thesis. Department of Mathematics, University of Calicut, 2012

Excellent graphs Preethi Kuttipulackal Mixed Tree Domination in Graphs Thesis. Department of Mathematics, University of Calicut, 2012 Excellent graphs Preethi Kuttipulackal Mixed Tree Domination in Graphs Thesis. Department of Mathematics, University of Calicut, 2012 CHAPTER 5 Excellent graphs 5.1 Introduction The main difficulty in

More information

Finite Model Generation for Isabelle/HOL Using a SAT Solver

Finite Model Generation for Isabelle/HOL Using a SAT Solver Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly

More information

CS 2336 Discrete Mathematics

CS 2336 Discrete Mathematics CS 2336 Discrete Mathematics Lecture 15 Graphs: Planar Graphs 1 Outline What is a Planar Graph? Euler Planar Formula Platonic Solids Five Color Theorem Kuratowski s Theorem 2 What is a Planar Graph? Definition

More information

Induction and Recursion. CMPS/MATH 2170: Discrete Mathematics

Induction and Recursion. CMPS/MATH 2170: Discrete Mathematics Induction and Recursion CMPS/MATH 2170: Discrete Mathematics Outline Mathematical induction (5.1) Sequences and Summations (2.4) Strong induction (5.2) Recursive definitions (5.3) Recurrence Relations

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Raptor Codes for P2P Streaming

Raptor Codes for P2P Streaming Raptor Codes for P2P Streaming Philipp Eittenberger 1, Todor Mladenov 2, Udo Krieger 1 1 Faculty of Information Systems and Applied Computer Science Otto-Friedrich University Bamberg, Germany 2 Department

More information

Application Layer Multicast Algorithm

Application Layer Multicast Algorithm Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Lecture - 8A: Subbasis of Topology

Lecture - 8A: Subbasis of Topology Lecture - 8A: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline 1 Introduction 2 3 4 Introduction I As we know that topology generated by a basis B may

More information

On Biased Reservoir Sampling in the Presence of Stream Evolution

On Biased Reservoir Sampling in the Presence of Stream Evolution Charu C. Aggarwal T J Watson Research Center IBM Corporation Hawthorne, NY USA On Biased Reservoir Sampling in the Presence of Stream Evolution VLDB Conference, Seoul, South Korea, 2006 Synopsis Construction

More information

Exploring Domains of Approximation in R 2 : Expository Essay

Exploring Domains of Approximation in R 2 : Expository Essay Exploring Domains of Approximation in R 2 : Expository Essay Nicolay Postarnakevich August 12, 2013 1 Introduction In this paper I explore the concept of the Domains of Best Approximations. These structures

More information

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks End-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks Saswati Sarkar and Leandros Tassiulas 1 Abstract Sharing the common spectrum among the links in a vicinity

More information

Assignment 1 Introduction to Graph Theory CO342

Assignment 1 Introduction to Graph Theory CO342 Assignment 1 Introduction to Graph Theory CO342 This assignment will be marked out of a total of thirty points, and is due on Thursday 18th May at 10am in class. Throughout the assignment, the graphs are

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Line Graphs and Circulants

Line Graphs and Circulants Line Graphs and Circulants Jason Brown and Richard Hoshino Department of Mathematics and Statistics Dalhousie University Halifax, Nova Scotia, Canada B3H 3J5 Abstract The line graph of G, denoted L(G),

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Complete Cototal Domination

Complete Cototal Domination Chapter 5 Complete Cototal Domination Number of a Graph Published in Journal of Scientific Research Vol. () (2011), 547-555 (Bangladesh). 64 ABSTRACT Let G = (V,E) be a graph. A dominating set D V is said

More information

Negations in Refinement Type Systems

Negations in Refinement Type Systems Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

Over-contribution in discretionary databases

Over-contribution in discretionary databases Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social

More information

Bounded subsets of topological vector spaces

Bounded subsets of topological vector spaces Chapter 2 Bounded subsets of topological vector spaces In this chapter we will study the notion of bounded set in any t.v.s. and analyzing some properties which will be useful in the following and especially

More information

AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES

AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES MICHAEL FERRARA, RONALD J. GOULD, MICHA L KAROŃSKI, AND FLORIAN PFENDER Abstract. An assignment of positive integer weights to the edges of a

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

9.5 Equivalence Relations

9.5 Equivalence Relations 9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

Michael Johas Teener. April 11, 2008

Michael Johas Teener. April 11, 2008 Michael Johas Teener April 11, 2008 V date updates 1 31 jan 08 original version, class A only, no observation interval 2 11 may 08 validation of assumptions, where class observation interval is needed,

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.2 Direct Proof and Counterexample II: Rational Numbers Copyright Cengage Learning. All

More information

1KOd17RMoURxjn2 CSE 20 DISCRETE MATH Fall

1KOd17RMoURxjn2 CSE 20 DISCRETE MATH Fall CSE 20 https://goo.gl/forms/1o 1KOd17RMoURxjn2 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Today's learning goals Explain the steps in a proof by mathematical and/or structural

More information

The Set-Open topology

The Set-Open topology Volume 37, 2011 Pages 205 217 http://topology.auburn.edu/tp/ The Set-Open topology by A. V. Osipov Electronically published on August 26, 2010 Topology Proceedings Web: http://topology.auburn.edu/tp/ Mail:

More information

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Wei Wang joint with Zishen Yang, Xianliang Liu School of Mathematics and Statistics, Xi an Jiaotong University Dec 20, 2016

More information

simply ordered sets. We ll state only the result here, since the proof is given in Munkres.

simply ordered sets. We ll state only the result here, since the proof is given in Munkres. p. 1 Math 490 Notes 20 More About Compactness Recall that in Munkres it is proved that a simply (totally) ordered set X with the order topology is connected iff it satisfies: (1) Every subset bounded above

More information

Compact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University

Compact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University Compact Sets James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University September 15, 2017 Outline 1 Closed Sets 2 Compactness 3 Homework Closed Sets

More information

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University Congestion-aware Rate Allocation For Multipath Video Streaming Over Ad Hoc Wireless Networks Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering

More information

arxiv:math/ v1 [math.co] 1 Oct 2004

arxiv:math/ v1 [math.co] 1 Oct 2004 arxiv:math/0410030v1 [math.co] 1 Oct 2004 COVER PEBBLING CYCLES AND CERTAIN GRAPH PRODUCTS MAGGY TOMOVA AND CINDY WYELS Abstract. A pebbling step on a graph consists of removing two pebbles from one vertex

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Dimensioning Links for IP Telephony

Dimensioning Links for IP Telephony Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

Distributed Computing over Communication Networks: Leader Election

Distributed Computing over Communication Networks: Leader Election Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Construction C : an inter-level coded version of Construction C

Construction C : an inter-level coded version of Construction C Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very

More information

Chapter S:V. V. Formal Properties of A*

Chapter S:V. V. Formal Properties of A* Chapter S:V V. Formal Properties of A* Properties of Search Space Graphs Auxiliary Concepts Roadmap Completeness of A* Admissibility of A* Efficiency of A* Monotone Heuristic Functions S:V-1 Formal Properties

More information

Error correction guarantees

Error correction guarantees Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if

More information

TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3.

TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. 301. Definition. Let m be a positive integer, and let X be a set. An m-tuple of elements of X is a function x : {1,..., m} X. We sometimes use x i instead

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

6. Advanced Topics in Computability

6. Advanced Topics in Computability 227 6. Advanced Topics in Computability The Church-Turing thesis gives a universally acceptable definition of algorithm Another fundamental concept in computer science is information No equally comprehensive

More information

1.7 The Heine-Borel Covering Theorem; open sets, compact sets

1.7 The Heine-Borel Covering Theorem; open sets, compact sets 1.7 The Heine-Borel Covering Theorem; open sets, compact sets This section gives another application of the interval halving method, this time to a particularly famous theorem of analysis, the Heine Borel

More information

16.Greedy algorithms

16.Greedy algorithms 16.Greedy algorithms 16.1 An activity-selection problem Suppose we have a set S = {a 1, a 2,..., a n } of n proposed activities that with to use a resource. Each activity a i has a start time s i and a

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

Lecture : Topological Space

Lecture : Topological Space Example of Lecture : Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Example of 1 2 3 Example of 4 5 6 Example of I Topological spaces and continuous

More information

4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1

4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 Definition: A Linear Programming (LP) problem is an optimization problem: where min f () s.t. X n the

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

A note on isolate domination

A note on isolate domination Electronic Journal of Graph Theory and Applications 4 (1) (016), 94 100 A note on isolate domination I. Sahul Hamid a, S. Balamurugan b, A. Navaneethakrishnan c a Department of Mathematics, The Madura

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string

More information

A point is pictured by a dot. While a dot must have some size, the point it represents has no size. Points are named by capital letters..

A point is pictured by a dot. While a dot must have some size, the point it represents has no size. Points are named by capital letters.. Chapter 1 Points, Lines & Planes s we begin any new topic, we have to familiarize ourselves with the language and notation to be successful. My guess that you might already be pretty familiar with many

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Introduction to Rational Billiards II. Talk by John Smillie. August 21, 2007

Introduction to Rational Billiards II. Talk by John Smillie. August 21, 2007 Introduction to Rational Billiards II Talk by John Smillie August 21, 2007 Translation surfaces and their singularities Last time we described the Zemlyakov-Katok construction for billiards on a triangular

More information

Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads

Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads György Dán Royal Institute of Technology (KTH) Niklas Carlsson Linköping University @ IEEE INFOCOM 2014, Toronto, Canada, April/May

More information

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C.

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C. 219 Lemma J For all languages A, B, C the following hold i. A m A, (reflexive) ii. if A m B and B m C, then A m C, (transitive) iii. if A m B and B is Turing-recognizable, then so is A, and iv. if A m

More information

IMO Training 2008: Graph Theory

IMO Training 2008: Graph Theory IMO Training 2008: Graph Theory by: Adrian Tang Email: tang @ math.ucalgary.ca This is a compilation of math problems (with motivation towards the training for the International Mathematical Olympiad)

More information

Proxy-based TCP-friendly streaming over mobile networks

Proxy-based TCP-friendly streaming over mobile networks Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control

More information

A new caching policy for cloud assisted Peer-to-Peer video on-demand services

A new caching policy for cloud assisted Peer-to-Peer video on-demand services A new caching policy for cloud assisted Peer-to-Peer video on-demand services Franco Robledo, Pablo Rodríguez-Bocca, Pablo Romero and Claudia Rostagnol Facultad de Ingeniería, Universidad de la República.

More information

Topology basics. Constraints and measures. Butterfly networks.

Topology basics. Constraints and measures. Butterfly networks. EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Alphabets, strings and formal. An introduction to information representation

Alphabets, strings and formal. An introduction to information representation Alphabets, strings and formal languages An introduction to information representation 1 Symbols Definition: A symbol is an object endowed with a denotation (i.e. literal meaning) Examples: Variables are

More information

Recursive Definitions Structural Induction Recursive Algorithms

Recursive Definitions Structural Induction Recursive Algorithms Chapter 4 1 4.3-4.4 Recursive Definitions Structural Induction Recursive Algorithms 2 Section 4.1 3 Principle of Mathematical Induction Principle of Mathematical Induction: To prove that P(n) is true for

More information

11.1. Definitions. 11. Domination in Graphs

11.1. Definitions. 11. Domination in Graphs 11. Domination in Graphs Some definitions Minimal dominating sets Bounds for the domination number. The independent domination number Other domination parameters. 11.1. Definitions A vertex v in a graph

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Section 6.3: Further Rules for Counting Sets

Section 6.3: Further Rules for Counting Sets Section 6.3: Further Rules for Counting Sets Often when we are considering the probability of an event, that event is itself a union of other events. For example, suppose there is a horse race with three

More information

Graph Theory Mini-course

Graph Theory Mini-course Graph Theory Mini-course Anthony Varilly PROMYS, Boston University, Boston, MA 02215 Abstract Intuitively speaking, a graph is a collection of dots and lines joining some of these dots. Many problems in

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,

More information

Indexable and Strongly Indexable Graphs

Indexable and Strongly Indexable Graphs Proceedings of the Pakistan Academy of Sciences 49 (2): 139-144 (2012) Copyright Pakistan Academy of Sciences ISSN: 0377-2969 Pakistan Academy of Sciences Original Article Indexable and Strongly Indexable

More information

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

More information

On Achieving Fairness in the Joint Allocation of Processing and Bandwidth Resources: Principles and Algorithms. Yunkai Zhou and Harish Sethu

On Achieving Fairness in the Joint Allocation of Processing and Bandwidth Resources: Principles and Algorithms. Yunkai Zhou and Harish Sethu On Achieving Fairness in the Joint Allocation of Processing and Bandwidth Resources: Principles and Algorithms Yunkai Zhou and Harish Sethu Technical Report DU-CS-03-02 Department of Computer Science Drexel

More information