On Peer-to-Peer Media Streaming Λ

Size: px
Start display at page:

Download "On Peer-to-Peer Media Streaming Λ"

Transcription

1 On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, Abtract In thi paper, we tudy a peer-to-peer media treaming ytem with the following characteritic: () it treaming capacity grow dynamically; () peer do not exhibit erverlike behavior; () peer are heterogeneou in their bandwidth contribution; and () each treaming eion may involve multiple upplying peer. Baed on thee characteritic, we invetigate two problem: () how to aign media data to multiple upplying peer in one treaming eion and () how to fat amplify the ytem total treaming capacity. Our olution to the firt problem i an optimal media data aignment algorithm OTS pp, which reult in minimum buffering delay in the conequent treaming eion. Our olution to the econd problem i a ditributed differentiated admiion control protocol DAC pp. By differentiating between requeting peer with different outbound bandwidth, DAC pp achieve fat ytem capacity amplification; benefit all requeting peer in admiion rate, waiting time, and buffering delay; and create an incentive for peer to offer their truly available out-bound bandwidth.. Introduction Although there have been ignificant reearch effort in peer-to-peer ytem during the pat two year [,,, 5, ], one category of peer-to-peer ytem ha o far received le attention: the peer-to-peer media treaming ytem. The major difference between a general peer-topeer ytem and a peer-to-peer media treaming ytem lie in the data haring mode among peer: the former ue the open-after-downloading mode, while the latter ue the play-while-downloading mode. More pecifically, in a peer-to-peer media treaming ytem, a ubet of peer own a certain media file, and they tream the media file to Λ Thi work wa upported in part by NSF grant CCR-99889, CCR-, CCR-7, and CCR-788, and CERIAS. y Correponding author. requeting peer. On the other hand, the requeting peer playback and tore the media data during the treaming eion, and they become upplying peer of the media file after the treaming eion. In thi paper, we aume the following four characteritic of a peer-to-peer media treaming ytem: the firt three are hared by all peerto-peer ytem, while the lat one i unique in peer-topeer media treaming ytem: () A peer-to-peer media treaming ytem i elfgrowing. With requeting peer later becoming upplying peer, the ytem total capacity will be amplified: the more peer it erve, the larger the capacity it will have. () A peer-to-peer media treaming ytem i erverle. A peer i not uppoed to exhibit erver-like behavior, uch a opening a large number of imultaneou connection. () eer are heterogeneou in their out-bound bandwidth contribution to the ytem. Thi heterogeneity may be caued either by different acce network connecting the peer, or by different willingne of the peer to contribute. () The upplying-peer/requeting-peer relation i typically many-to-one, intead of one-to-one a in the general peer-to-peer ytem. Since the out-bound bandwidth offered by a upplying peer may be le than the original playback rate of the media data, it i neceary to involve multiple upplying peer in one real-time treaming eion. We identify two new problem ariing in the above ytem. To the bet of our knowledge, thi i the firt in-depth tudy on thee problem in the context of peer-topeer media treaming. The firt problem i the media data aignment for a multi-upplier peer-to-peer treaming eion. More pecifically, given a requeting peer and a et of upplying peer with heterogeneou out-bound bandwidth offer, we how how to aign a ubet of the media data to each upplying peer. The econd problem i the fat amplification of the peer-to-peer treaming capacity. Intuitively, among multiple requeting peer, ervice priority hould be given to thoe who promie higher out-bound bandwidth offer, becaue they will contribute more to the peer-topeer treaming capacity after becoming upplying peer. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

2 We how how to realize uch a differentiated admiion policy, and that fat capacity amplification will ultimately benefit all peer. In thi paper, we propoe an algorithm OTS pp that compute the optimal media data aignment for each peerto-peer treaming eion. The aignment will lead to the minimum buffering delay experienced by the requeting peer. We alo propoe a ditributed differentiated admiion control protocol DAC pp, to be executed by both upplying and requeting peer. Compared with the current non-differentiated admiion control mechanim, rotocol DAC pp achieve () fater amplification of peer-topeer ytem capacity; () higher admiion rate and fewer rejection (before a peer i admitted) among all requeting peer; and () horter average buffering delay among all admitted requeting peer. Furthermore, for () and (), the protocol alo differentiate between requeting peer with different out-bound bandwidth promie, creating an incentive for them to offer their truly available bandwidth. The ret of the paper i organized a follow: we firt define our peer-to-peer media treaming model in Section. Section and preent our olution to the two problem, repectively. Section 5 preent our imulation reult. Section 6 compare our work with related work. Finally, Section 7 conclude thi paper. eer-to-eer Media Streaming Model In thi ection, we define a peer-to-peer media treaming model and tate our aumption: () Role of peer For a media data item, requeting peer are the peer that requet the data. Once the peer-topeer treaming eion i over, a requeting peer become a upplying peer. To avoid erver-like behavior, each upplying peer participate in at mot one peer-to-peer treaming eion at any time. We alo aume that there are ome eed upplying peer, which obtain the media data from ome external ource. () Bandwidth of peer Let R denote the playback rate of the media data. We aume that each requeting peer r i willing and able to et aide an in-bound bandwidth of R in ( r )=R to receive the treaming ervice. However, the out-bound bandwidth R out ( ) offered by a upplying peer ha one of the following value: R ; R ; R R 8 :::. N () Clae of peer We claify the peer into N clae, according to the N poible value of their out-bound bandwidth offer. More pecifically, a peer willing to offer out-bound bandwidth R n (» n» N) i called a cla-n We alo aume that each peer ha ufficient torage to tore the entire media file. Thi pecial et of value prevent media data aignment from becoming the N-hard binpacking-like problem. peer. We alo aume that the lower the n, thehigher the cla. () Capacity of the peer-to-peer treaming ytem We define the capacity a the total number of peer-topeer treaming eion that can be imultaneouly provided by the ytem. Since a peer-to-peer treaming eion involve multiple upplying peer whoe R out ( ) add up to R, the capacity of the ytem at time t can be computed (t) (Rout()) a C y (t) = b R c ( (t) i the et of upplying peer in the ytem at t). (5) Segment of media data We aume that the media data can be partitioned into mall equential egment of equal ize. We alo aume that the media tream i of Contant-Bit-Rate (CBR) and therefore, the playback time ffit of each egment i the ame (ffit i typically in the magnitude of econd). Optimal Media Data Aignment In thi ection, we tudy the problem of media data aignment. Baed on the model in Section, the problem can be tated a follow: For a requeting peer r and a et of upplying peer ; ;:::m,ifr = R in ( r )= m i= R out( i ), determine () the media data egment to be tranmitted by i (» i» m) and () the playback tart time for r. The goal i to enure a continuou playback, with minimum buffering delay at r. We define the buffering delay a the time interval between the tart of media data egment tranmiion and the tart of playback at r. A hown in Figure, different media data aignment lead to different buffering delay. The requeting peer i r ; and the upplying peer are ; ; ; with out-bound bandwidth of R, R, R 8, and R 8, repectively. In Aignment I, i aigned media data egment 8k, 8k +, 8k +, 8k +(k =; ; ; :::); i aigned egment 8k +, 8k +5; i aigned egment 8k +6;and i aigned egment 8k +7. The tart time of playback at r i 5ffit. Therefore, the buffering delay achieved by Aignment I i 5ffit. However, if Aignment II i ued, the buffering delay will be reduced to ffit. We propoe an algorithm OTS pp, which compute the optimal media data aignment that lead to the minimum buffering delay. The algorithm i executed by the requeting peer. After computing the media data aignment, it will initiate the peer-to-peer treaming eion by notifying each participating upplying peer of the correponding aignment. The upplying peer will then tart the tranmiion of it aigned media data egment. The peudo-code of Algorithm OTS pp i hown in Figure. Suppoe that the m upplying peer have been orted in decending order according to their out-bound roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

3 Tranmiion of egment δ t layback of egment by r (a) Aignment I Tranmiion of egment 7 Time OTS pp( r ; f ; ::: m g) f i = n ; while (i ) f for j =to m if the aignment to j i not complete f Aign egment i to j ; i = i ; g g g Figure. Algorithm OTS pp compute an optimal media data aignment, which achieve the minimum buffering delay in the conequent peer-topeer treaming eion. The minimum buffering delay i T min buf = m Λ ffit. 5 δ t layback of egment by r (b) Aignment II Time Figure. Different media data aignment lead to different buffering delay bandwidth offer; and that the lowet cla among them i cla-n. The algorithm compute the aignment of the firt n egment; and the aignment repeat itelf every n egment for the ret of the media file. In fact, Aignment II in Figure i computed by OTS pp: after the firt while iteration, egment 7, 6, 5, are aigned to,,, and, repectively; and and are done with the aignment. After the econd while iteration, egment, areaignedto and, repectively; and i done. During the lat two while iteration, egment and are aigned to - each in one iteration. The optimality of Algorithm OTS pp i tated in Theorem, which give a (omewhat urpriingly) imple form of the minimum buffering delay. The proof of Theorem can be found in []. Theorem Given a et of m upplying peer f ; ::: m g and a requeting peer r, if we have R = m R in ( r ) = i= R out( i ), then Algorithm OTS pp will Fat Sytem Capacity Amplification In thi ection, we tudy the problem of fat capacity amplification of the entire ytem. Thi will alo anwer the quetion of how to elect a et of upplying peer for a peer-to-peer treaming eion, which i not mentioned in Section. Recall that one of the mot exciting property of a peer-to-peer treaming ytem i that it capacity dynamically grow. However, no previou work ha addreed thi problem in the context of peer-to-peer media treaming with peer bandwidth heterogeneity. Conider the cenario hown in Figure. Suppoe at time t, there are four upplying peer in the ytem: two cla- peer and and two cla- peer and. According to the ytem capacity definition, the capacity of the peer-to-peer treaming ytem at t i b( R R + R + + R )=R c =. Thi mean that the ytem can admit one requeting peer at t. Now, uppoe there are three requeting peer: two cla- peer r and r and one cla- peer r. If we admit r at t, the capacity will till be at t + T (T i the duration of the peerto-peer treaming eion), and r and r will have to be admitted one after another at t + T and t + T, repectively. However, if r i admitted at t, the ytem capacity will grow to at t + T,andboth r and r can be admitted at t + T. Furthermore, we define the waiting time of a requeting peer a the interval between it firt treaming requet and the earliet time it can be admitted. The average waiting time incurred by the firt admiion equence i ( + T +T )= = T ; while it i (T + T +)= = T in the econd cae. The above example ugget that a differentiated admiion policy which favor higher-cla requeting peer will roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

4 Sytem capacity r r r r r r t t + T t t + T + T Sytem capacity r r r (a) Admitting r! r! r t t + T t + T r r (b) Admitting r! ( r + r ) Figure. Different admiion deciion lead to different growth of treaming capacity lead to a fater amplification of the peer-to-peer ytem capacity, and will ultimately benefit requeting peer of all clae. Other requirement for uch a differentiated admiion policy include: () it hould not tarve the lower-cla requeting peer, even in the hort term; () it hould be enforced in a purely ditributed fahion; and () it hould be differentiating uch that the higher the outbound bandwidth pledged by a requeting peer, the greater the poibility that it will be admitted, and the horter the waiting time and buffering delay it will experience. Thi differentiation will create an incentive to encourage requeting peer to contribute it truly available out-bound bandwidth to the peer-to-peer treaming ytem. Our olution i a ditributed admiion control protocol DAC pp. rotocol DAC pp ha two key feature. Firt, each upplying peer individually decide whether or not to participate in a treaming eion requeted by a requeting peer. The deciion i made in a probabilitic fahion, There i, however, an important aumption: ince the bandwidth commitment i made when a requeting peer requet treaming ervice, there mut be a mechanim to enforce the bandwidth commitment after the requeting peer become a upplying peer. Thi mechanim i aumed to exit in the peer-to-peer oftware intalled in each peer. Time Time with different probability value applied to different clae of requeting peer, and the probabilitie are dynamically adjuted. Second, we propoe a new technique called reminder: under certain condition (to be detailed hortly), a requeting peer r may end a reminder to a buy upplying peer, reminding not to elevate it admiion preference to requeting peer of clae lower than that of r. rotocol DAC pp involve operation of both upplying peer and requeting peer.. DAC pp - Supplying eer Each upplying peer maintain an admiion probability vector <r[];r[]:::; r[n ] >. r[i] (» i» N) will be applied to cla-i requeting peer: if a cla-i requeting peer contact for treaming ervice and i not buy participating in another treaming eion, will grant the requet with probability r[i]. Suppoe itelf i a cla-k peer, then the value in the probability vector of i determined a follow: (a) Initially, when become a upplying peer, it probability vector i initialized a follow: For» i» k, we initialize r[i] = :. For k < i» N, we initialize r[i] =. The intuition behind thi initialization i: i k ince i a cla-k peer itelf, it will favor requeting peer of cla-k and higher by alway granting their treaming requet. However, for requeting peer of lower clae, it will exponentially decreae the admiion probability. We call cla i a favored cla of,if currently ha r[i] =:. For example, for a cla- upplying peer (and uppoe N =), it initial admiion probability vector i < :; :; :5; :5 >, and it initial favored clae are clae and. (b) If ha been idle, then it probability vector will be updated after a timeout period of T out. The update i performed a follow: for each k < i» N, r[i] = r[i] Λ. Thi mean that will elevate the admiion probabilitie of lower-cla requeting peer, if it ha not been erving any requeting peer in the pat period of T out. If remain idle, the update will be performed after every period of T out, until every probability in it probability vector i., i.e. every cla i favored cla. (c) If ha jut finihed erving in a peer-topeer treaming eion, will update it probability vector a follow: ffl If during the treaming eion, it did not receive any requet from a requeting peer of it favored cla, will elevate the admiion probability of the lower clae, imilar to the update in (b): for each k<i» N, r[i] =r[i] Λ. ffl If during the eion, it received at leat one requet from a requeting peer of it favored cla, the requet roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

5 wa not granted becaue wa buy. Under a certain condition (to be decribed in Section.), the requeting peer left a reminder to. Suppoe ^k i the highet favored cla of requeting peer() which left a reminder, then for» i» ^k, r[i] =:;and for ^k <i» N, r[i] = i ^k. In the firt cae, relaxe the admiion preference, becaue it ha not been requeted by any peer of it current favored clae. In the econd cae, tighten the admiion preference, becaue there have been reminder from requeting peer of it favored clae which hould have been erved, had not been buy.. DAC pp - Requeting eer Each requeting peer r firt obtain a lit of M randomly elected candidate upplying peer via ome peerto-peer lookup mechanim. We aume that the cla of each candidate i alo obtained. r then directly contact the candidate upplying peer - from high to low clae: ffl r will be admitted, if r i able to obtain permiion from enough upplying peer (among the M candidate) uch that: () they are neither down nor buy with another treaming eion; () they are willing to provide the treaming ervice (i.e. having paed the probabilitic admiion tet); and () their aggregated out-bound bandwidth offer i R um = R. r will then execute Algorithm OTS pp to compute the media data aignment, trigger the participating upplying peer, and the peer-to-peer treaming eion will begin. ffl r will be rejected, if r i not able to get permiion from enough upplying peer that atify all three condition above. However, r will leave a reminder to a ubetw of the buy candidate. W i determined a follow: from high-cla to low-cla buy candidate, the firt few that atify the following condition will belong to W : () the candidate currently favor the cla of r ; and () the aggregated out-bound bandwidth offer of the candidate in W i equal to (R R um ). Each (buy) candidate in W keep the reminder ; and when it current treaming eion i over, it will ue thi reminder to update it probability vector, a decribed in Section.. Note that a reminded upplying peer may not in the future erve exactly the ame requeting peer which left the reminder. Intead, we propoe reminder a a ditributed mechanim to realize differentiated and adaptive admiion For example, by querying a centralized directory erver a in Napter [], or by uing a ditributed lookup ervice uch a Chord []. control, baed on the current overall requet/upply ituation in the peer-to-peer treaming ytem. ffl If r i admitted, when the treaming eion i over, it will become a upplying peer. If r i rejected, it will backoff for at leat a period of T bkf before making the requet again. Furthermore, it backoff period will become T bkf E x bkf after the xth rejection. 5 erformance Study 5. Simulation Setup In thi ection, we how the excellent performance of rotocol DAC pp via extenive imulation reult. We imulate a peer-to-peer media treaming ytem with a total of 5, peer. Initially, there are only eed upplying peer, while the other 5, peer are requeting peer. Each eed upplying peer i a cla- peer, and it poee a copy of a popular video file. The how time of the video i 6 minute. The 5, requeting peer belong to clae,,, and, and their ditribution i %, %, %, and %, repectively. arameter in rotocol DAC pp are et a follow: M =8-each requeting peer probe 8 randomly elected candidate upplying peer; T out = min - each idle upplying peer elevate the admiion probabilitie of lower-cla requeting peer every minute; and T bkf =min; E bkf =-afterthe ith rejection, a requeting peer will backoff for Λ i minute before retry. For comparion, we alo imulate a non-differentiated admiion control protocol NDAC pp, in which the admiion probability vector of each upplying peer i alway < :; :; :; : >. NDAC pp alo have the ame value for parameter M;T bkf,ande bkf. We imulate a period of hour. During the firt 7 hour, the 5, peer make their firt treaming requet. We imulate four different arrival pattern of firt-time treaming requet: attern ha contant arrival; attern ha gradually increaing, then gradually decreaing arrival; attern ha burty arrival followed by lowerandcontant arrival; and attern ha periodic burty arrival with low and contant arrival between burt (detailed pecification are given in []). 5. Simulation Reult () Sytem capacity amplification We firt compare the ytem capacity amplification achieved by DAC pp and NDAC pp. Figure how the growth of the peerto-peer ytem capacity with the elape of time, under firt-time treaming requet arrival attern and 5. 5 Reult for other arrival pattern are decribed in []. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

6 rotocol DAC pp achieve ignificantly fater ytem capacity growth than NDAC pp, epecially during the firt 7 hour when the requeting peer make their firt treaming requet. By the end of the -hour period, the ytem capacity achieved by DAC pp ha reached at leat 95% of the maximum capacity if all 5, peer become upplying peer. We alo oberve that after the firt 7 hour, the ytem capacity growth low down (under both protocol), becaue all requet are now retry requet, and no new requeting peer are coming. Total ytem capacity DAC_pp NDAC_pp 5(b). Even for the cla- requeting peer, thi i alo true except for the firt few hour. Thi obervation indicate that DAC pp benefit all clae of requeting peer with repect to admiion rate. Accumulative admiion rate (%) 8 6 cla cla cla 6 8 (a) Arrival attern, uing DAC pp Total ytem capacity (a) Arrival attern DAC_pp NDAC_pp Accumulative admiion rate (%) 8 6 cla cla cla 6 8 (b) Arrival attern, uing NDAC pp 6 8 Figure 5. er-cla accumulative requet admiion rate (b) Arrival attern Figure. Sytem capacity amplification uing DAC pp and NDAC pp () Requet admiion rate Figure 5 how the per-cla requet admiion rate (accumulative over time) achieved by DAC pp and NDAC pp, under arrival pattern. We firt oberve that by uing DAC pp, different clae of requeting peer have different admiion rate (Figure 5(a)): the higher the cla, the higher the admiion rate. On the contrary, rotocol NDAC pp doe not differentiate (Figure 5(b)), reulting in imilar admiion rate among all clae. Furthermore, we oberve that for requeting peer of clae,, and, their requet admiion rate in Figure 5(a) are contantly higher than thoe in Figure () Average buffering delay Similar to (), DAC pp alo achieve both differentiation and overall improvement, in the apect of buffering delay experienced by requeting peer of different clae. The reult are hown in Figure 6. Recall that the buffering delay of a peer-topeer treaming eion i equal to ffit multiplied by the number of participating upplying peer (Theorem ). On the other hand, in DAC pp, if a requeting peer i admitted, it i likely that the higher the cla it belong to, the higher the clae the participating upplying peer belong to, due to the rule each upplying peer determine it favored clae. We can then infer that in DAC pp, the higher the cla of an admitted requeting peer, the fewer the number of participating upplying peer, and therefore, the lower the buffering delay experienced by the requeting peer. Furthermore, the average buffering delay of each cla in Figure 6(a) i contantly lower than that in Figure 6(b). roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

7 Accumulative average buffering delay (y * delta t) Accumulative average buffering delay (y * delta t) cla cla cla 6 8 (a) Arrival attern, uing DAC pp cla cla cla 6 8 (b) Arrival attern, uing NDAC pp Avg. rejection attern attern Cla.77/.7.9/.5 Cla.9/.75.9/.6 Cla./.7.59/. Cla.5/.7.6/.6 Table. er-cla average number of rejection before admiion ( DAC pp / NDAC pp ) to dynamically adjut their favored clae of requeting peer, in repone to the requet arrival rate change (under arrival attern ). The y-axi repreent the lowet cla of requeting peer, favored by each cla of upplying peer. We oberve that for each cla of upplying peer, the degree of admiion differentiation change over time, roughly following the change in the (firt-time) requet arrival rate (recall that attern ha periodic burty arrival). More pecifically, the higher the cla of upplying peer, the more enitive they are to the change in requet arrival rate. Finally, when there are not new requet arrival, and the ytem capacity ha grown ignificantly, all clae of upplying peer relax their admiion preference to all clae of requeting peer, i.e. the lowet favored cla of requeting peer i, for all clae of upplying peer. Figure 6. er-cla accumulative average buffering delay (the actual delay i y Λ ffit) () Average waiting time Similar to () and (), DAC pp alo achieve both differentiation and overall improvement, in the apect of waiting time experienced by requeting peer of different clae. Table how the average (over the entire period of hour) number of rejection before admiion experienced by each cla of requeting peer, under arrival attern and. Given an average number of rejection x, the average waiting time can be computed a T bkf Λ E x bkf. Again, we oberve that the higher the cla of admitted requeting peer, the fewer the average number of rejection each of them experience. Furthermore, for each cla, the average number of rejection achieved by DAC pp i fewer than that achieved by NDAC pp. (5) Adaptivity of differentiation We now take a cloer look at DAC pp adaptivity of admiion differentiation, baed on the dynamic requet/upply ituation in the peerto-peer ytem. Recall that DAC pp ue the elevate-aftertimeout technique to relax the differentiation; while it ue the reminder technique to tighten the differentiation. In Figure 7, we how that upplying peer ue thee technique Lowet favored cla (average) 5 cla cla cla 6 8 (a) Arrival pattern Figure 7. Lowet cla of requeting peer, favored by each cla of upplying peer (non-accumulative, averaged every hour (6) Impact of protocol parameter on performance Finally, we tudy the impact of parameter M;T out,and E bkf on the performance of DAC pp: Figure 8 how the impact of M and T out on the ytem capacity amplification; while Figure 9 how the impact of the backoff exponential factor E bkf on the requet admiion rate, all under arrival attern. In each tudy, the parameter except the one being tudied remain the ame a before. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

8 In Figure 8(a), the number of candidate upplying peer probed by a requeting peer i et to, 8, 6, and, repectively. The ytem capacity grow ignificantly lower when M =, becaue four candidate are too few to identify ufficient number of qualified upplying peer to erve the requeting peer. If we increae M, the ytem capacity will grow much fater. However, when M i greater than 8, the impact of M quickly decreae. Therefore, having alargem doe not improve the ytem capacity growth ignificantly. On the other hand, it may increae the probing overhead and traffic. In Figure 8(b), different time-out period to relax the admiion differentiation of an idle upplying peer i tried. The reult indicate that T out hould not be too hort. The explanation i: having a hort time-out period may make an idle upplying peer relax it admiion preference too oon to lower-cla requeting peer. Therefore, it may mi the chance to erve the one of higher clae, when both lowercla and higher-cla requeting peer are preent. Total ytem capacity 8 6 M = M = 8 M = 6 M = that exponential backoff of requeting peer doe not help to increae the requet admiion rate. On the contrary, the higher the E bkf, the lower the overall admiion rate. In fact, the contant backoff (E bkf = ) cheme achieve ignificantly higher admiion rate. Although not yet fully explored, one poible explanation i: The capacity of a peer-to-peer ytem i elf-growing intead of fixed. Therefore, a more aggreive retry policy may actually help to increae the ytem capacity fater, and hence improve the overall admiion rate. On the other hand, in a ytem with fixed capacity (uch a a traditional client-erver ytem), client may have to perform conervative backoff, in order to achieve a high overall admiion rate. Accumulative overall admiion rate (%) 8 6 E_bkf = E_bkf = E_bkf = E_bkf = 6 8 Figure 9. Impact of E bkf on overall requet admiion rate Total ytem capacity (a) Impact of M T_out = min T_out = min T_out = min T_out = 6 min T_out = min 6 8 (b) Impact of T out Figure 8. Impact of M and T out on ytem capacity amplification In Figure 9, the backoff exponential factor E bkf i et to,,, and, repectively. It i intereting to oberve In ummary, rotocol DAC pp achieve differentiation toward different clae of requeting peer - not only in their admiion probabilitie, but alo in the waiting time and buffering delay they experience. Moreover, the degree of differentiation i adaptive: it change according to the current requet/upply ituation. 6 Related Work eer-to-peer file haring ytem have gained great popularity in recent year. Repreentative peer-to-peer ytem on the Internet include Napter [], Gnutella [], and Freenet []. Thee ytem hare the ame goal of de-centralized data exchange and dynamic growth of ytem capacity. However, they differ in their data lookup/dicovery cheme. For example, Napter employ centralized directory erver, while Gnutella [] ue controlled query flooding. The data haring mode of mot current peer-to-peer ytem i the open-afterdownloading mode, not the play-while-downloading (or treaming) mode a tudied in thi paper (however, there are exception, uch a C-tar [] to be decribed later). In the pat two year, peer-to-peer ytem have alo attracted tremendou attention from the reearch community. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

9 Firt, there have been meaurement baed tudie of the exiting peer-to-peer ytem. In [], a detailed meaurement tudy of Napter and Gnutella i preented. The tudy reveal ignificant degree of heterogeneity in the peer bandwidth availability; and it ugget that future peer-topeer ytem mut have built-in incentive for peer to tell the truth about their bandwidth information. Thee obervation have partly motivated our peer-to-peer treaming model and olution in thi paper. Beide meaurement tudie of current peer-to-peer ytem, new peer-to-peer architecture have alo been propoed. Thee architecture focu on different apect of a fully ditributed and calable peer-to-peer ytem. For example, CAN [8], Chord [], and atry [9] are ditributed peer-to-peer lookup ervice, while AST [] and OceanStore [6] are peerto-peer peritent torage ervice. Our work on peer-topeer media treaming complement thee reult: on one hand, we do not tudy the problem of peer-to-peer data lookup and torage management; on the other hand, the exiting reult do not addre the two new problem in thi paper. Finally, everal cheme of multi-ource media treaming have been propoed. In [7], a ditributed video treaming ytem i preented, where each eion involve multiple replicated video erver. However, it doe not conider the problem of ytem capacity amplification, becaue it i till a client-erver ytem intead of a peerto-peer ytem. C-tar [] i a commercial multi-ource treaming ervice. Similar to our work, the capacity of the C-tar ditribution network grow over time. However, C-tar doe not differentiate between upplier of different out-bound bandwidth capability. In [5], an architecture called SpreadIt i propoed for treaming live media over a peer-to-peer network. It focue on the dynamic contruction of a multicat tree among peer requeting a live media. However, SpreadIt i not intended for the aynchronou treaming of tored media data. Alo it doe not deal with bandwidth heterogeneity and admiion differentiation. 7 Concluion eer-to-peer media treaming ytem are expected to become a popular a the peer-to-peer file haring ytem. In thi paper, we tudy two key problem ariing from peer-to-peer media treaming: the aignment of media data to multiple upplying peer involved in a peer-topeer treaming eion; and fat capacity amplification of the entire peer-to-peer treaming ytem. Our olution to the firt problem i Algorithm OTS pp, which compute optimal media data aignment for peer-to-peer treaming eion. Our olution to the econd problem i the fully ditributed DAC pp protocol. By differentiating between requeting peer according their clae, DAC pp () achieve fat ytem capacity amplification, () benefit all requeting peer in admiion rate, waiting time, and buffering delay, and () create an incentive for peer to offer their truly available out-bound bandwidth. Our extenive imulation reult demontrate the excellent performance of DAC pp. Reference [] C-tar. [] Gnutella. [] Napter. [] I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A Ditributed Anonymou Information Storage and Retrieval Sytem. roceeding of Workhop on Deign Iue in Anonymou and Unobervability, July. [5] H. Dehpande, M. Bawa, and H. Garcia-Molina. Streaming Live Media over a eer-to-eer Network. Stanford Databae Group Technical Report (-), Aug.. [6] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinki,. Eaton, D. Geel, R. Gummadi, S. Rhea, H. Weatherpoon, W. Weimer, C. Well, and B. Zhao. Oceantore: An Architecture for Global-State eritent Store. roceeding of ASLOS, Nov.. [7] T. Nguyen and A. Zakhor. Ditributed Video Streaming Over Internet. roceeding of SIE/ACM MMCN,Jan.. [8] S. Ratnaamy,. Franci, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addreable Network. roceeding of ACM SIGCOMM, Aug.. [9] A. Rowtron and. Druchel. atry: Scalable Ditributed Object Location and Routing for Large-Scale eer-to-eer Sytem. roceeding of IFI/ACM Middleware, Nov.. [] A. Rowtron and. Druchel. Storage Management and Caching in AST, a Large-Scale, eritent eer-to-eer Storage Utility. roceeding of ACM SOS, Oct.. [] S. Saroiu,. Gummadi, and S. Gribble. A Meaurement Study of eer-to-eer File Sharing Sytem. roceeding of SIE/ACM MMCN, Jan.. [] I. Stoica, R. Morri, D. Karger, F. Kaahoek, and H. Balakrihnan. Chord: A Scalable eer-to-eer Lookup Service for Internet Application. roceeding of ACM SIGCOMM, Aug.. [] D. Xu, M. Hefeeda, S. Hambruch, and B. Bhargava. On eer-to-eer Media Streaming. urdue Computer Science Technical Report, Apr.. [] B. Yang and H. Garcia-Molina. Comparing Hybrid eer-to- eer Sytem. roceeding of VLDB, Sept.. [5] B. Zhao, J. Kubiatowicz, and A. Joeph. Tapetry: An Infratructure for Fault-Reilient Wide-Area Location and Routing. UC Berkeley Computer Science Technical Report (CSD--), Apr.. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Problem Set 2 (Due: Friday, October 19, 2018)

Problem Set 2 (Due: Friday, October 19, 2018) Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Priority-Based Distribution Trees for Application-Level Multicast

Priority-Based Distribution Trees for Application-Level Multicast Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Firewall Packet Filtering Optimization using Statistical Traffic Awareness Test

Firewall Packet Filtering Optimization using Statistical Traffic Awareness Test Firewall Packet Filtering Optimization uing Statitical Traffic Awarene Tet Zouheir Trabel Liren Zhang and Safaa Zeidan Faculty of Information Technology UAE Univerity Al-Ain, UAE {trabel lzhang, afaa.z}

More information

A study on turbo decoding iterative algorithms

A study on turbo decoding iterative algorithms Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning Parameter, UVM, Coverage & Emulation Take Two and Call Me in the Morning Michael Horn Mentor Graphic Corporation Colorado, USA Mike_Horn@mentor.com Bryan Ramirez Mentor Graphic Corporation Colorado, USA

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Task-based Adaptation for Ubiquitous Computing

Task-based Adaptation for Ubiquitous Computing IEEE Tranaction on Sytem, Man, and Cybernetic, Part C: Application and Review Special Iue on Engineering Autonomic Sytem, to appear Tak-baed Adaptation for Ubiquitou Computing João Pedro Soua, Vahe Poladian,

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Optimal Peer-to-Peer Technique for Massive Content Distribution

Optimal Peer-to-Peer Technique for Massive Content Distribution 1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks

TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks 213 International onference on omputing, Networking and ommunication (IN) Workhop on omputing, Networking and ommunication -R: An Equation-baed Tranport Protocol for ognitive Radio Network Abdulla K. Al-Ali

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained

More information