Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Size: px
Start display at page:

Download "Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast"

Transcription

1 ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84, 28006, Madrd, Span epartament of Telematcs Engneerng, Unversdad Carlos III de Madrd Avda. Unversdad, 30, 289, eganés, Span. lmcm@td.es, cjbc@t.uc3m.es Abstract strbuton of remotely subscrbed multcast content n a Proxy Moble v6 (PMv6) doman s performed by means of b-drectonal -n- tunnels establshed between the moblty anchor and the vsted access gateways where the moble termnals consumng such traffc are attached to. Each access gateway subscrbng to content on behalf of an attached moble termnal requres a separate copy of the remote multcast flow beng dstrbuted over the PMv6 doman. In many cases, these ndvdual copes traverse the same routers n the path from the moblty anchor towards the access gateways, ncurrng n an neffcent dstrbuton, whch s equvalent to the uncast delvery of the remote multcast content wthn the doman. Ths paper explores the potental gan obtaned by usng explct multcast nstead of the standard -n- tunnelng, showng relevant capacty savngs wth lower overhead respect to the standard dstrbuton case. Ths transport servce based on explct multcast emerges then as an attractve transport alternatve for PMv6 doman operators servng vstng moble multcast consumers. Keywords-component; PMv6; multcast; ; optmzaton. I. INTRUCTIN The new capabltes beng offered by the moble wreless technologes are brngng broadband capacty networs outsde the home, representng addtonal delvery optons for the dstrbuton of broadband servces on the move. The commercal success of moble multmedaenabled termnals, manly because of the success of S and Androd based devces, s rapdly ncreasng the demand of moble data access, especally audovsual contents. multcast bascally facltates the delvery of a sngle copy of a data stream to multple lsteners nterested n recevng the same content smultaneously. Ths capablty s commonly used nowadays n telecom networs, for nstance, to dstrbute TV content (nown as TV servce). The need for supportng the same nd of servces both n fxed and moble networs brngs the necessty of delverng multcast also to moble recevers. Proxy Moble v6 (PMv6) [] s a networ-based moblty management protocol whch enables the networ to provde moblty support to standard termnals resdng n the networ. These termnals enjoy ths moblty servce wthout beng requred to mplement any moblty-specfc operatons. Namely, PMv6 s one of the mechansms adopted by the 3GPP to support the moblty management n future Evolved Pacet System (EPS) networs [2]. PMv6 allows a Moble Access Gateway (MAG) to establsh a dstnct b-drectonal tunnel wth dfferent ocal Moblty Anchors (MAs), beng each tunnel shared by the attached Moble Nodes (MNs). Each moble node s assocated wth an MA, whch eeps trac of ts current locaton, that s, the MAG where the moble node s attached. -n- encapsulaton s used wthn the tunnel to forward traffc between the MA and the MAG (see Fgure ). The basc soluton [3] of multcast traffc dstrbuton wthn a PMv6 doman maes use of the b-drectonal MA-MAG tunnels. It follows the so-called remote subscrpton model, n whch the subscrbed multcast content s delvered from the Home Networ. By dong so, an ndvdual copy of every multcast flow s delvered through each tunnel connectng the moblty anchor to any of the access gateways n the doman. In many cases, these ndvdual copes traverse the same routers n the path towards the access gateways, ncurrng n an neffcent dstrbuton, equvalent to the uncast dstrbuton of the multcast content n the doman, as shown n Fgure 2. Ths fact leads to dstrbuton neffcences and hgher per-bt delvery costs, ncurred by a PMv6 doman operator offerng transport capabltes to a Home Networ operator for servng ther MNs when attached to the PMv6 doman. As long as the remotely subscrbed multcast servce s not affected, t seems worthy to explore more optmal ways of dstrbutng such content wthn the PIMPv6 doman.

2 MA I Prefx MAG MN Pref::/64 MAG MN2 Pref2::/64 MAG Multcast Tree PMv6 doman MA MAG MN MN2 Fgure. PMv6 mode of operaton As later dscussed, local multcast dstrbuton to the PMv6 doman (also nown as drect routng) s not always feasble then we focused on the remote subscrpton case. Ths paper addresses ths ssue by analyzng the capabltes provded by Explct Multcast (Xcast) [4] to provde an optmal and effcent multcast traffc dstrbuton from the bandwdth consumpton pont of vew. Secton II descrbes the dfferent alternatves exstng today for multcast traffc dstrbuton wthn a PMv6 doman, remarng the potental neffcency observed n case of remotelysubscrbed multcast. Secton III ntroduces the applcablty of the explct multcast for the dstrbuton of the multcast flows n the doman, and extensons needed for usng explct multcast n PMv6 are dentfed. Furthermore, n Secton IV a performance evaluaton s conducted to assess the potental gans due to the use of explct multcast n the dstrbuton networ. Secton V addresses some conclusons and advances some further wor. Fnally, Appendx A provdes some nsghts on the PMv6 doman scalablty to determne the vablty of the proposed explct multcast approach. II. MUTICAST ISTRIBUTIN IN PMV6 As a general procedure for subscrbng to a multcast content, a moble node expresses ts nterest n jonng or leavng a multcast group by sendng Multcast stener scovery (M) control messages to the MAG, whch acts as the frst hop at the pont-to-pont ln establshed wth the MN. The MAG mantans the ndvdual multcast status of the nterface for that ln and handles the multcast traffc towards the MN accordngly to the M messages receved. There are two alternatves to dstrbute multcast traffc wthn a PMv6 doman: remote subscrpton and drect routng. The former s prmary focused on the multcast dstrbuton from networs outsde the PMv6 doman (e.g., the Home networ or thrd partes networs), whle the later results convenent for the multcast dstrbuton of content locally avalable at the PMv6 doman. Home Networ PMv6 doman MAG MAG2 MAG3 Fgure 2. Ineffcent dstrbuton of remote subscrbed multcast traffc n a PMv6 doman A. Remote subscrpton The baselne soluton [3] consders only the remote subscrpton case, where the MN obtans the desred multcast stream from ts home networ, through the local moblty anchor. The MA s n charge of nteractng wth the multcast nfrastructure out of the PMv6 doman. In the base soluton, the MAG nstantates a dstnct M proxy functonalty per every set of MNs assocated to a specfc MA. Each M proxy nstance s responsble of summarzng the subscrpton requests of the MNs connected to t on a per MA assocaton bass. The dfferent proxy nstances of the same MAG are solated one from the other. Wth the remote subscrpton model, the multcast traffc reaches the MNs after gong through the correspondng MA (note that there mght be multple MAs n the same doman). For every proxy nstance n the MAG, the tunnel nterface pontng to the MA becomes the proxy upstream nterface, whereas the lns towards the MNs are the correspondng downstream nterfaces of each nstance. Then, every MAG-MA tunnel s part of a separate M proxy doman, beng a branch of the multcast tree bult for multcast traffc dstrbuton nternally to the doman. A sngle copy of a data stream wll be sent per group of MNs (attached to a certan MAG) assocated to the same MA. The MA wll mantan the multcast state of every tunnel nterface, reflectng the summarzed vew offered by the MAG on behalf of the attached MNs bound to the MA. The base soluton suffers from the tunnel convergence problem, where several copes from the same multcast stream can reach the access gateway when smultaneous subscrptons from MNs assocated to dstnct MAs occur. To avod that, a central entty named Multcast Tree Moblty Anchor (MTMA) [5] can be deployed n the PMv6 doman to act as the topologcal anchor pont for remotely servng multcast traffc to the MNs n the doman, ndependently of the MA whch mantan the assocaton for recevng uncast traffc. The MTMA connects to the MAG as descrbed n [3]. The b-drectonal tunnels among the MTMA and the access

3 gateways n the doman are part of the multcast tree for remote multcast traffc dstrbuton. Therefore, a copy of every multcast channel subscrbed by a MAG on behalf of an attached MN s transported on those tunnels to reach the correspondng access gateway. The MTMA can be then consdered as a form of upstream multcast router wth tunnel nterfaces allowng remote subscrpton for the MNs. B. rect routng A second opton to lmt the number of copes of the same content at the MAG s the usage of a natve multcast nfrastructure n the PMv6 doman [5] allowng drect multcast routng from locally avalable multcast sources. In ths case, the MAG can be drectly connected to an upstream multcast router n the PMv6 doman, whle the uncast traffc remans served as normally by the correspondng MAs. Followng ths approach, the usage of the b-drectonal tunnels s totally avoded, snce the multcast traffc s natvely dstrbuted wthn the PMv6 doman. Ths s the most effectve way of multcast dstrbuton wthn the doman, but unfortunately t s not always possble for nontechncal reasons, such as for example: The multcast source s not local to the PMv6 doman, beng located ether n the Home networ or hosted by a thrd party. The multcast content cannot be natvely dstrbuted wthn the local PMv6 doman due to admnstratve or regulatory reasons; as for nstance, multcast address allocaton ssues between the assgned addresses n the local PMv6 doman and n the multcast source home networ (.e., a certan multcast address dentfes dfferent multcast content channels n both the Home and the PMv6 domans), or some contents may be not allowed for dstrbuton n a certan networ, le regonal or ethncal channels out of the target regon. The multcast content s not natvely dstrbuted n the local PMv6 doman due to commercal and busness ntellgence reasons; for nstance, the Home networ operator mght not be nterested on provdng vsblty about what content ts MNs subscrbe to. These are some of the reasons why the remote subscrpton case s relevant and requres to be properly addressed. PMv6 doman operators can commercalze ths servce, offerng transport capabltes to the Home networ operators to reach ts MNs wth a multcast servce. Provdng ths transport servce n the most effcent manner s then economcally attractve from the PMv6 doman operator pont of vew. C. Effcency problems The transport of the remotely-subscrbed multcast traffc by means of -n- uncast tunnels n the PMv6 doman s neffcent as several copes of the same content traverse the same lns and are forwarded by the same routers. Two alternatves to mprove ths dstrbuton can be taen nto account: natve multcast transport (drect routng) on the PMv6 doman, or explct multcast (Xcast) transport of the multcast traffc. The former has been already descrbed, and some stuatons could prevent ts use. We now focus on the latter, by proposng the use of -n-xcast encapsulaton between the moblty anchor and the access gateways nstead of the standard -n- tunnelng. III. MUTICAST ISTRIBUTIN AMNG MBIITY ANCHR AN ACCESS GATEWAYS WITH EXPICIT MUTICAST A. Introducton to Xcast The Xcast protocol has been proposed as a way of optmzng the delvery of multcast traffc for small groups. Bascally, the Xcast mechansm elmnates the need of persesson sgnalng and per-sesson state nformaton of tradtonal multcast schemes by ncludng the lst of destnatons n the data pacet, nstead of usng a multcast address. To do that, the source node eeps trac of the fnal destnatons n the multcast channel that t wants to send pacets to. Wth Xcast, each router n the path between the source and the destnaton parses the header and creates a new datagram for every next hop ncludng only the destnatons reachable through that next hop accordng to the routng table, n such a way that the header of the subsequent Xcast pacets only contans the destnatons avalable n the path. The Xcast pacet always follows the ordnary uncast routng for a gven destnaton. When just one destnaton remans to be reached, the Xcast pacet s transformed nto a normal uncast pacet. Fgure 3 graphcally descrbes the Xcast procedures for the case n whch a node A smultaneously delvers data content to nodes B, C and wth Xcast encapsulaton. The processng that a router does for every Xcast pacet s the followng: () the router performs a route table looup to determne the next hop for each of the destnatons lsted n the pacet; () the router parttons the set of destnatons based on ther next hops; () t replcates the pacet so that there s one copy of the pacet for each of the next hops found n the prevous steps; (v) before delverng the new pacet, t modfes the lst of destnatons n each of the copes so that the lst n the copy for a gven next hop ncludes just the destnatons reachable through that next hop; (v) fnally, the router sends the modfed copes of the pacet on the next hops. B. Benefts and mpacts of usng Xcast Regardng tradtonal multcast, Xcast offers a number of advantages that have been reported on [4], such as not needng to mantan multcast state per group n every router on the tree, or not requrng multcast address allocaton. However, some drawbacs have also been dentfed, such as the ncurred overhead, or the header processng complexty. Furthermore, as descrbed later n the paper, the specfed Xcast header allows a maxmum of 27 destnatons. Ths means that n case of havng more destnatons on the path, separate Xcast trees should be formed.

4 st= All_Xcast Xcast B/ C / ata Payload st= B ata Payload R4 B st= C ata Payload A R R2 R3 R8 C (a) (b) Xcast C / st= All_Xcast ata Payload R5 R6 R7 st= ata Payload R9 Fgure 3. Explct multcast (Xcast) mode of operaton Ths mples that, when appled to the PMv6 case, a lmt of 27 access gateways per moblty anchor s downstream nterface has to be consdered n the dstrbuton tree. In the Appendx A the number of access gateways n a doman s dscussed n order to determne how ths lmt could mpose restrctons n a typcal PMv6 doman for the deployment of Xcast functonaltes. C. Modfcatons to standard PMv6 procedures for usng Xcast n a doman The MAG does not change ts behavor and subscrbes to the multcast content on behalf of the MNs (actng as a proxy) by usng a multcast group membershp protocol such as M. The multcast content requests wll reach the moblty anchor through the tunnel, followng the standard -n- encapsulaton []. The moblty anchor wll act as an Xcast source, and wll tae the decson of encapsulatng the multcast traffc n an -n-xcast mode n ts downstream nterfaces reachng the MAGs, nstead of usng the standard -n- tunnel. The router present n the bfurcaton pont n the end to end path provdng connectvty the last segment to reach a MAG (.e., no more MAGs reachable through that branch from that router), wll send the multcast pacet n uncast fashon as n the -n- case (see Fgure 2), so the MAG wll not perceved any change n the multcast dstrbuton regardng the standard case. Two ways of Xcast dstrbuton can be consdered. n one hand, t can be consdered that all the subscrptons between a set of MAGs and the moblty anchor are dstrbuted over the same -n-xcast tunnel, groupng all the multcast channels subscrbed for a certan group of MAGs. n the other hand, t can be consdered that a separate -n- Xcast tunnel s used per multcast channel. The tunnel management s very complex n the frst case, as the tunnel has to be dynamcally updated. Furthermore, dfferent subscrpton groupngs should be arranged accordng to the subscrptons exstng on the MAGs. The second case s smpler, and t s the one selected n ths paper. Fgure 4. Exampleof -tree structure wth =2 and =4 (a), and parameters defnng a a -tree structure (b).. Handover dynamcs usng Xcast In the event of a handover, the movement of an MN can produce the need of creatng a new branch for the dstrbuton of the multcast content to the MAG where the MN s beng attached (n case there s no other MN n that MAG subscrbed to the desred content). Smlarly, such movement can produce the removal of an exstng branch from the MAG where prevously t was attached (n case the MN was the last subscrber to a certan content). As the MA s aware of the channels subscrbed per MAG n the remote subscrpton case, the MA has to tae the decson of Xcast forwardng to the MAG. When a new branch has to be formed due to a handover event, t wll smply mean the need of addng a new destnaton to the Xcast header pontng to the requestng MAG. Furthermore, when an exstng branch has to be removed also for a handover event, the MA has just to remove the correspondng MAG from the desred destnatons from the Xcast header. IV. PERFRMANCE CMPARISN A. efnton of the scenaros under analyss In order to evaluate and compare the potental gans n the use of Xcast for transportng the multcast traffc between the moblty anchor and the access gateways wthn a PMv6 doman, we wll model the dstrbuton tree wth a -tree structure as consdered n [6]. Fgure 4 (a) shows an example of a -tree composed by a total number of 3 nodes (.e., =2, =4). A -tree structure can be characterzed by two parameters, as depcted n Fgure 4 (b):, the degree of the tree or number of leaves recursvely found from every prevous leaf on the tree, and, the depth of the tree, whch ndcates the number of levels n the dstrbuton tree. N, the total number of nodes n a certan -tree, s gven by: + N =, () whle the number of potental recevers (MAGs n ths analyss), m, s obtaned from: m = (2)

5 B. Performance evaluaton The performance evaluaton of Xcast versus the standard dstrbuton s carred out by comparng the number of traversed lns between the moblty anchor and the access gateways when each of these solutons s used to dstrbute a multcast channel. ) General calculaton The prevous calculaton has consdered that all MAGs subscrbe to the same content. Whle ths can be true for hghly demanded content, t cannot be generalzed. In ths secton we try to formulate the generc calculaton of the lns traversed n a PMv6 as a functon of the demand. A certan channel wll be subscrbed by the MAG f there s at least one attached MN demandng such channel. et us consder p as the probablty of a MAG demandng a certan channel, then t can be establshed that p= f there s at least an MN requestng the channel, and p=0 otherwse. Then, n the standard case, the lns traversed for servng the MAGs demandng the channel wll be: std MAG = p. (3) through two dfferent -tree structures, wth 8 degrees and 2 depth levels n one case, and 4 degrees and 3 depth levels n the second. The number of ntermedate nodes changes, obtanng n the frst case a flatter archtecture. The second fgure, consderng 729 MAGs (whch can be connected ether by -trees of parameters =9 and =3, or =3 and =6), s presented to evaluate the senstvty of Xcast to the growth n the number of connected MAGs, only for llustratve purposes, as such hgh number of MAGs cannot be ncluded n a unque Xcast tree due to the lmtaton on the number of destnatons per Xcast header. As observed from Fgures 5 and 6, more herarchcal - tree structures provde more savngs that ther flattened counterparts for connectng the same number of MAGs. Ths trend s more sgnfcant as the number of MAGs n the tree ncreases. The gan ncreases rapdly wth the probablty of subscrpton per MAG p, and t s asymptotcally bounded, whch means that the maxmum networ resource savngs are closely reached even for moderately popular channels. Fnally, t can be concluded that hgher savngs are obtaned as the number of MAGs grows n the doman. The total number of lns traversed n the PMv6 doman can be establshed on: std = m p = p (4) For the Xcast case, t s a bt more complex to calculate the ln usage, as the usage at a level of the tree depends on the usage of the followng level, as can be derved from Fgure 4. A ln of a certan level wll not be traversed f none of the recevers (MAGs) below t subscrbes to such content. Ths can be formulated n the followng way: m m 2 = ( ( p ) ) = = ( ( p )) = ( ( p )) (5) ( ( p ) ), (6) and, n general: m ( d ) ( d ) ( d ) ( d ) = ( ( p ) ) = ( ( p ) ). (7) d Then, the total number of lns traversed n the Xcast case wll be the sum of the lns used for all the levels, gven by: Xcast = (8) Fgures 5 and 6 show the comparson of the gan obtaned for dfferent -trees dstrbuton archtectures connectng the same number of moble access gateways, as a functon of the probablty of subscrpton p for a certan multcast channel per MAG (note that the probablty of subscrpton of any MAG s ndependent of the probablty of subscrpton of the other MAGs n the doman, then t can be stated that p = p,, assumng a smlar average number of MNs per MAG). In the frst fgure, 64 MAGs are connected Fgure 5. Gan due to multcast for two dfferent -tree structures connectng 64 MAGs Fgure 6. Gan due to multcast for two dfferent -tree structures connectng 729 MAGs (for llustratve purposes)

6 Fxed Part Varable Part Fgure 7. Xcast header format C. verhead calculaton Another relevant aspect s the comparson between multcast and Xcast n terms of the total overhead on the dstrbuton structure under analyss. The standard dstrbuton of the remotely subscrbed multcast context uses -n- encapsulaton, and therefore the overhead s due to the encapsulaton n the b-drectonal tunnel. In our proposal, the remotely subscrbed multcast content s dstrbuted n an -n-xcast fashon; then the overhead wll be orgnated by the Xcast mechansm. ) Standard multcast case Consderng h as the overhead bts needed for the encapsulaton of the remote multcast channel (.e. the 40 bytes of an v6 header n an -n- tunnel), the total overhead due for transportng a multcast channel all the path from the moblty anchor to an access gateway can be stated as: std ch MAG = h. (9) Extendng ths formula to the set of MAGs n the doman, the total overhead for a multcast channel beng dstrbuted to all the MAGs across the PMv6 doman can be wrtten as: std ch doman = h. (0) 2) Xcast case In Xcast defnton, the encapsulaton defned s composed of an v6 header and an Xcast header, carred as a routng extenson, whch s structured n a fxed part and a varable one. The v6 header wll have as source address the address of the Xcast sender (the moblty anchor n our case), beng the destnaton address the all_xcast_routers address. As consequence of the v6 header, every Xcast pacet wll account h bytes. The Xcast header presents a fxed 24-byte part ncludng several protocol felds. Among them, the NBR_F_EST feld determnes the maxmum number of destnatons that can be ncluded n the Xcast header. Ths feld s 7 bt long, so a maxmum of 27 destnatons could be ncluded n an Xcast dstrbuton. The ssue on the number of the maxmum number of the destnatons (.e., MAGs) s dscussed on Appendx A, at the end of the paper. The varable part of the Xcast header wll carry the lst of the destnaton addresses for pacet forwardng. Each Xcast router n the path wll evaluate the lst of destnatons to replcate the pacet accordngly for each of the correspondng next hops, ncludng on the next pacet just the destnatons to be routed through the next hop, onwards. Ths varable part ncludes also a BITMAP feld, of whch sze depends on the number of destnatons, beng a multple of 64 bts. Then, the sze of an Xcast header for a certan dstrbuton level n the -tree can be can be formulated as: N d d h ( bytes) = 24 + N 6 + 8, () d 64 beng N d the number of destnatons reachable from level d n a certan branch, that can be defned n the followng manner: ( ) N = d d. (2) Each Xcast pacet s converted nto a normal uncast pacet for reachng the last destnaton. In that case, correspondng to the frst level n the tree,, the applcable overhead wll be just h, wth h = 0. When extendng these formulas to the whole set of MAGs n the doman, we obtan: ch 2 ch 3 = + = ch = ( h + h ) = h (3) ( h + h ) = h ( h + h ) = h , 64 and, n general: ch d + = ( d ) ( d ) d ( d ) ( h + h ) = h d d (4) (5) (6) Then, consderng the total dstrbuton n the PMv6 doman, the general formulaton of the overhead requred for dstrbutng a multcast channel to all the MAGs s gven by:

7 = = ch doman ch d d = ( d ) ( d ) d = h + h, d = d = 2 that can be rewrtten as: (7) ( ) d h. (8) ( d ) ch doman = h + d = 2 Fgures 8 and 9 present a comparson of the overhead for dstrbutng a channel to all the MAGs n a doman, consderng dfferent -tree confguratons. The Xcast opton ntroduces less overhead than the standard case as the degree n the tree,, grows for a gven tree depth,. At the same tme, as the depth of the tree ncreases, the advantage on usng Xcast becomes more sgnfcant for hgher -tree degrees. V. CNCUSINS AN FURTHER WRK As shown n the prevous analyss, the Xcast encapsulaton can provde a lower cost per transported bt for a PMv6 doman operator offerng remote multcast dstrbuton capabltes to a Home Networ operator, allowng for better beneft margns. It can also be concluded that the most effcent dstrbuton structures for servng a certan number of MAGs n the PMv6 doman are those more herarchcal (.e., wth greater number of levels, ), nstead of the flatten ones, because a hgher gan s acheved respect to the standard multcast case. Ths matches exstng operators networ topologes. Furthermore, hgher degrees n the tree result n less overhead for the Xcast case. As next steps, we are worng on the characterzaton of the total overhead as a functon of the channel subscrpton probablty at the MAG. We are also studyng how to dynamcally decde when to use standard multcast versus Xcast transport dependng on the locatons of the MAGs subscrbng the content n the -tree, and n general, dependng on the number of MAGs subscrbng the content, for allevatng ntermedate routers of the burden of Xcast processng n scenaros of low gan. ACKNWEGMENTS The research of Carlos J. Bernardos leadng to these results has receved fundng from the European s Communty s Seventh Framewor Programme (FP7-ICT ) under the grant agreement n (MEIEVA project), beng also partally supported by the Mnstry of Scence and Innovaton (MICINN) of Span under the QUARTET project (TIN C02-0). verhead (Bytes) verhead (n bytes) for = , degree of the tree standard Fgure 8. overhead comparson for dfferent degrees values n a - tree wth depth =2 verhead (Bytes) verhead (n bytes) for = , degree of the tree standard Fgure 9. overhead comparson for dfferent degrees values n a - tree wth depth =3 REFERENCES [] S. Gundavell, K. eung, V. evarapall, K. Chowdhury, B. Patl, Proxy Moble v6, RFC 523, August, [2] 3GPP, Archtecture enhancements for non-3gpp accesses, 3GPP TS , September 20. [3] T.C. Schmdt, M. Waehlsch, and S. Krshnan, A Mnmal eployment pton for Multcast steners n PMv6 omans, RFC 6224, Aprl, 20. [4] R. Bove, N. Feldman, Y. Ima, W. vens,. oms, Explct multcast (Xcast) concepts and optons, RFC 5058, November, [5] J.C. Zunga,.M. Contreras, C.J. Bernardos, S. Jeon, Y. Km, Multcast moblty routng optmzatons for Proxy Moble v6, RFC 7028, September, 203. [6] P. Van Meghem, G. Hooghemstra, R. van der Hofstad, n the effcency of multcast, IEEE/ACM Transactons on Networng, Vol. 9, No. 6, pp , ecember, 200. [7] H. uo, H. Zhang, Y. Qn, V.C.M. eung, An approach for buldng scalable Proxy Moble v6 domans, IEEE Transactons on Networ and Servce Management, Vol. 8, No.3, pp , September, 20. [8] C. Perns,. Johnson, J. Aro, Moblty support n v6, RFC 6275, July 20. [9] Csco 8500 Seres Wreless Controller eployment Gude, ocument I 3695, ctober 202 (downloadable at: accessed n November 202.

8 APPENIX A N THE NUMBER F MAGS IN A PMV6 MAIN Ths Appendx ams at dscussng the typcal number of MAGs n a PMv6 doman as a way of determnng the potental lmtatons on the use of Xcast n a PMv6 doman. The length of the feld NBR_F_EST (7 bt) of the Xcast header lmts the maxmum of destnatons to 27. Note that ths lmt apples to each branch of the -tree, n such a way that the total number of MAGs per -tree (.e., per moblty anchor) can be rased to 27. In order to evaluate how ths number could be n lne wth the number of MAGs n a PMv6 deployment, we wll analyze the potental scalablty of a PMv6 doman n terms of users and number of access gateways. We next partally follow the analyss consdered n [7]. There, authors looed at the bandwdth requrements of the moblty anchor as one of the lmtng factors for ths entty. Beng R S the rate of oversubscrpton n the MA (that s, the rate of the total number of MNs regstered n excess regardng the number of actually actve MNs), and T p the pea data throughput per actve MN, the bandwdth delvered by the moblty anchor equals to: Tp BW = M, (9) anchor ( R +) where M represents the total number of MNs regstered at the moblty anchor n the PMv6 doman. Commercal off-the-self core routers today are capable of delverng traffc n the order of Tbps. Table II summarzes the achevable number of MNs n the PMv6 doman assumng a moblty anchor forwardng capacty of Tbps, consderng dfferent values of the observable pea data throughput and oversubscrpton ratos. S TABE I. NUMBER F REGISTERE MNS PER MBIITY ANCHR WITH A FRWARING CAPACITY F TBPS Pea data throughput, T p versubscr., R S 00bps Mbps 0Mbps For every attached MN, the moblty anchor has to eep an entry n the bndng cache. Such an entry contans a number of felds [] [8], le the MN dentfer (28 bts), the MN s ln layer dentfer (64 bts), the MAG s ln layer dentfer (28 bts), the lst of the Home Networ Prefxes (HNPs) for the MN s nterface (each prefx beng 28 bts), the tunnel dentfer (at most 28 bts), the Proxy Care-of- Address (28 bts), etc. These felds requre a storage capacty above 000 bts per MN. Taen ths nto account, the upper lmt n the number of MNs observed n Table II mposes the need of handlng a global bndng cache memory n the order of 0 Tbts. Ths huge storage capacty, the correspondng number of assocated routng entres, and the looup capacty requred to handle both of them, mae that upper lmt unachevable. Therefore, we can argue that a more realstc upper lmt of MNs managed by a moblty anchor would be n the order of few hundreds of thousand termnals. Current state-of-the-art MAG specfcatons [9] support a maxmum number of 40,000 attached MNs. Ths mples that only a branch of the -tree (that s, a downstream nterface of the moblty anchor), wth 27 of those MAGs, could potentally provde connectvty to more than 5 mllon MNs, much more than the total number of MNs per moblty anchor. To sum up, t can be stated that the number of MAGs per branch wll be lower than the lmt mposed by the feld NBR_F_EST n the Xcast header. We have slghtly modfed the formula used for obtanng Fg. 9 n [7] because t s not totally correct from our pont of vew. In the orgnal formula the denomnator only consders the rate of oversubscrpton, R S, not provdng a consstent result for the case when no oversubscrpton occurs.

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS E.N. Onwua and Z. Nu State Key Lab on Mcrowave and Dgtal Communcaton Department

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

IEEE n Aggregation Performance Study for the Multicast

IEEE n Aggregation Performance Study for the Multicast IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Air Transport Demand. Ta-Hui Yang Associate Professor Department of Logistics Management National Kaohsiung First Univ. of Sci. & Tech.

Air Transport Demand. Ta-Hui Yang Associate Professor Department of Logistics Management National Kaohsiung First Univ. of Sci. & Tech. Ar Transport Demand Ta-Hu Yang Assocate Professor Department of Logstcs Management Natonal Kaohsung Frst Unv. of Sc. & Tech. 1 Ar Transport Demand Demand for ar transport between two ctes or two regons

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory U J.T. (: 33- (pr. 0 Optmzaton of Local Routng for Connected odes wth Sngle Output Ports - Part I: Theory Dobr tanassov Batovsk Faculty of Scence and Technology ssumpton Unversty Bangkok Thaland E-mal:

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Design of a Real Time FPGA-based Three Dimensional Positioning Algorithm

Design of a Real Time FPGA-based Three Dimensional Positioning Algorithm Desgn of a Real Tme FPGA-based Three Dmensonal Postonng Algorthm Nathan G. Johnson-Wllams, Student Member IEEE, Robert S. Myaoka, Member IEEE, Xaol L, Student Member IEEE, Tom K. Lewellen, Fellow IEEE,

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A Fast IP Routing Lookup Scheme for Gigabit Switching Routers

A Fast IP Routing Lookup Scheme for Gigabit Switching Routers A Fast IP Routng Looup cheme for Ggabt wtchng Routers Nen-Fu Huang, h-mng Zhao, Jen-Y Pan, and Ch-An u Department of Computer cence, Natonal Tsng Hua Unversty Hsn-Chu, Tawan, 343, R.O.C. E-mal: {nfhuang,

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1 Intellgent Traffc Condtoners for Assured Forwardng Based Dfferentated Servces Networks B. Nandy, N. Seddgh, P. Peda, J. Ethrdge Nortel Networks, Ottawa, Canada Emal:{bnandy, nseddgh, ppeda, jethrdg}@nortelnetworks.com

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

DUE to the recent popularization of hand-held mobile

DUE to the recent popularization of hand-held mobile IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 4, APRIL 2016 803 Contact Duraton Aware Data Replcaton n DTNs wth Lcensed and Unlcensed Spectrum Jng Zhao, Student Member, IEEE, Xuejun Zhuo, Qnghua

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Enhancing MPLS QoS routing algorithms by using the Network Protection Degree paradigm. *

Enhancing MPLS QoS routing algorithms by using the Network Protection Degree paradigm. * Enhancng MPLS QoS routng algorthms by usng the Networ Protecton Degree paradgm. * Euseb Calle, Jose L Marzo, Anna Urra, Pere Vla Broadband Comm. and Dstrbuted Systems Insttut d Informàtca aplcacons (IA)

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information