TCP Libra: Exploring RTT-Fairness for TCP

Size: px
Start display at page:

Download "TCP Libra: Exploring RTT-Fairness for TCP"

Transcription

1 TCP Liba: Exploing RTT-Fainess fo TCP UCLA Compute Science Depatment Technical Repot #TR Gustavo Mafia, Claudio Palazzi, Giovanni Pau, Maio Gela, M. Y. Sanadidi, Maco Roccetti, Compute Science Depatment - Univesity of Califonia Los Angeles, CA {gmafia cpalazzi gpau gela medy}@cs.ucla.edu Dipatimento di Scienze del Infomazione, Univesity of Bologna - Italy occetti@cs.unibo.it Abstact The majoity of Intenet taffic elies on the Tansmission Contol Potocol (TCP ) devised in the ealy 970s to povide a eliable data tansfe acoss the ARPANET. Today s uses download lage multimedia files fom emote seves using TCP. If these TCP sessions shae the same bottleneck, they ae expected to eceive the same shae of bandwidth, thus achieving the same tansfe ate. Unfotunately, this is not the case when the ound tip delay RTT is vey diffeent among sessions. This may have negative pactical implications in downloads of delay-sensitive (though non-eal-time) infomation fom seves. Fo instance, suppose in a popula intenet cafè in New Yok City seveal uses ae simultaneously downloading multimedia files fom vaious seves. Most of the seves ae local. Howeve, one custome is downloading a lage file fom a emote seve in Austalia. All customes shae the same MBPS WiFi bottleneck. The custome connected to Austalia will make no visible pogess until all the customes downloading fom local seves ae done! One solution would be to set up a time day when only emote customes download. But this is not quite application tanspaent. Hee we popose a new vesion of TCP, namely TCP Liba, that guaantees fai shaing egadless of RTT. Liba in Latin means scale, thus indicating a balance between the sessions. In this pape we descibe the design of TCP Liba and pove that it is indeed RTT fai. The key element of TCP Liba is the window adjustment algoithm. The algoithm is deived by modeling TCP pefomance as a utility function and by optimizing this function such that the esult is independent of RTT, yet maintaining the function stability. Non-linea optimization is used, leading to a solution that povides fainess among TCP flows that shae the same bottleneck link egadless of RTT. The emakable popety of TCP Liba is that it achieves fainess while still maintaining thoughput efficiency and fiendliness with espect to TCP New Reno. Anothe impotant popety fom the implementation standpoint is the sende-side-only modification intoduced by TCP Liba. The fainess and stability popeties ae poved analytically and ae extensively tested via simulation. A compaison is also caied out with othe TCP vesions that have been epoted as RTT fai in the liteatue. I. INTRODUCTION The success of the Intenet is based on the ability to povide a eliable medium fo infomation exchange. In the cuent Intenet, taffic contol functionalities ae povided by the Tansmission Contol Potocol (TCP) in an end-to-end fashion. TCP was initially designed to povide a connection-oiented eliable sevice in the ARPANET [], and late, in the Intenet. TCP addesses two majo issues: eliability and congestion contol [2]. To achieve the second goal, TCP adapts the sending ate to avoid netwok oveflow o falling into sevice stavation. TCP congestion contol has been studied by the eseach community fo the last 25 yeas, leading to seveal TCP vaiants fo congestion contol with and without the explicit intevention of the netwok laye (a suvey can be found in [3]). This wok is patially suppoted by the Italian Ministy fo Reseach via the ICTP/E-Gid Initiative and the Intelink Initiative, the National Science Foundation though gants CNS /ANI , and the UC-Mico Gant MICRO pivate sponso STMicoelectonics. Liba is the Latin wod fo scale. This pape has been also submitted fo publication to the IEEE JSAC Special Issue on Non Linea Optimization. Refeence Autho: Giovanni Pau, Compute Science Depatment, Univesity of Califonia Los Angeles, CA 90095, gpau@cs.ucla.edu With TCP, unless specified, we efe to TCP New Reno.

2 2 The most popula vesion, TCP New Reno, implements a congestion contol algoithm, known as the AIMD (Additive Incease, Multiplicative Decease) algoithm. The vey basic concept can be summaized as follows: When a packet loss is detected, the TCP sende deceases its sending window by half. When a packet is successfully deliveed, it inceases its sending window by one. Natually, the TCP New Reno implementation goes well beyond the basic AIMD pinciple. To begin, if the packet loss is due to a timeout, the netwok is assumed to be seveely congested, hence the sending window is dastically educed to and a new slow-stat initiated. A sequence of thee duplicate acknowledgments indicates a mild congestion and leads to the Fast Retansmit and Fast Recovey algoithm followed by a congestion window eduction by half. The window incease ate slows down when a window theshold is eached fom one unit pe ACK eceived to one unit afte an entie RTT. In summay, the data-sending ate of TCP 2 is detemined by the ate of incoming acknowledgments (ACKs) to pevious packets. At a steady state, the sending ate of a TCP souce will match the aival ate of the elated ACKs. The congestion contol mechanisms tiggeed by a segment loss guaantees that the potocol automatically detects congestion buildup and thus deceases its sending ate. This behavio has been efeed to as TCPs self-clocking behavio. Unfotunately this self-egulation pocedue may be unfai. Expeimentally It has been obseved that competing TCP sendes, with diffeent end-to-end popagation delays, will typically have diffeent ates of feedback fom thei pees and will incease thei sending window at a diffeent pace. The diffeent incease ates of the sending windows (the faste, the shote the RTT between sende and eceive) detemine the RTT-bias o unfainess of TCP New Reno. This phenomena can also be analytically deived fom the fomula that models the TCP ate by Kuose in [4]. In paticula, it may be seen that competing flows will shae a bottleneck link based on the invese of thei ound-tip times. The RTT-bias has been ecognized fom ealy potocol deployment. In [5], the TCP New Reno authos poposed a solution to the potocol s RTTunfainess; unfotunately this has been found unstable by Hendeson stability studies in [6]. The RTT-bias shown by TCP negatively affects uses, content povides, and netwok povides. In paticula, uses with a lage RTT will expeience a lowe thoughput and highe latency and completion time. To ovecome this imbalance, content povides ae equied to use (fo a pice) a content delivey netwok with a fine-gain geogaphic distibution, whee content is downloaded off-line to sites elatively close to uses. The RTT-unfainess may also affect decisions on cache location, CDN deployment, ovelay netwoks topology, and capacity expansion [7]. In this pape we study the RTT-bias in TCP, appoaching the poblem fom a non-linea optimization and a system dynamics point of view. In paticula we leveage the seminal wok on TCP modeling done by Kelly, Vinniecombe, Low, Paganini and Doyle. Ou contibution lies in the design of a new utility function fo TCP that doesn t include RTT and theefoe is not sensitive to the self-clocking behavio. This esults in an enhanced congestion contol algoithm fo TCP. Ou scheme, namely TCP Liba (whee Liba in Latin means scale, i.e., balance, fainess), shows RTT-fainess as well as scalability (elated to netwok bottleneck size), and good fiendliness to TCP New Reno. The eminde of the pape is oganized as follows. In Section II we intoduce the cuent state of the at, while in Section III we pesent ou solution to the RTT-bias along with the dynamic and stability analysis fo TCP Liba, as well as seveal competing potocols. The simulation expeiments ae pesented in section IV and the pape is finally concluded by sections V. II. RELATED WORK In ecent yeas a lage amount of eseach has been conducted to undestand TCP behavio unde diffeent scenaios and netwok conditions. Paticulaly emakable ae the effots to povide a well-defined mathematical model suitable to study the behavio and stability of TCP and active queuing management (AQM) techniques in the Intenet. In this section we will epot the leading theoetical wok on congestion contol and AQM, focusing mainly on RTT-fainess and stability. The RTT-bias, as well as the busty natue of TCP taffic, was fist expeimentally discoveed by Sally Floyd and Van Jacobson in [5]. They also poposed a solution fo the RTT-bias based on a constant incease algoithm 2 We use as equivalents the tems congestion window, sending window, and data-sending ate.

3 3 fo the TCP window at steady state. In a futhe study they also intoduced a netwok laye technique, namely RED, designed as a elief fom the effects of taffic busts [8] [9]. Biefly, RED monitos the queue length at the outes and pobabilistically dops a andom TCP packet fom the queue upon eaching a cetain queue length thus leading to a moe egula taffic patten [0]. Hendeson in [] [6] shows that using constant incease and RED to achieve RTT-fainess leads to an unstable solution fo links with long popagation delays and small buffes such as satellite links. A detailed mathematical model fo the TCP thoughput at steady, including the the Fast Retansmit Fast Recovey phases and TCP s timeout impact, was fist intoduced by Towsley in [4] and [2]. Additionally, in [3] the same authos developed a new fluid based modeling methodology fo studying TCP behavio in a netwok that featues AQM outes. In paticula, the poposed appoach models TCP behavio that includes the tansient effects intoduced by AQM outes such as RED gateways. 3 A fesh impulse to congestion contol modeling in communication netwoks has to be acknowledged: Fank Kelly intoduced a new mathematical fomulation fo congestion contol in communication netwoks in tems of non-linea optimization poblem (pimal/dual). The netwok is modeled as an inteconnection of uses/souces which geneate data and esouces/links. The key constaint is that the netwok contol infomation can only be passed along the same outes as the data that is being tansmitted, and with the same popagation delay as data [4]. In [5] and [6] it was shown that TCP stability can be achieved in the afoementioned netwok model if the TCP utility function is concave [7] [7]. Kelly s esults have been extended by seveal eseaches. In paticula, Vinnicombe, Massoulie, Johai and Tan addessed the stability in netwok congestion contol schemes [8]. Vinnicombe showed that delay instability is chaacteized by the incease ule; while Ott has shown that stochastic instability is pimaily influenced by the decease ule [9] [20] [2]. Additionally Vinnicombe and Massoulie deived the stability condition fo scenaios with heteogeneous delays [22] [23]. A futhe substantial advancement in developing the theoy fo netwok congestion contol was made by Low, Paganini and Doyle. They fully exploited the Pimal/Dual modeling appoach, finding the conditions needed fo a scalable and stable congestion contol fo the Intenet [24] [25] [26] [27] [28] [29]. The theoetical esults have been used to dive the design of an enhanced AQM technique namely Random Ealy Mak (REM) that impoves RED pefomance while educing the dawbacks, and TCP Fast that contains a congestion contol mechanism, based pimaily on queuing time, able to guaantee netwok stability and high utilization in multi-gigabit netwoks [30], [3] [32] [33]. Focusing ou attention on the TCP RTT-bias it is woth noting that thee ae few ecent TCP vaiations that have tied to addess RTT-unfainess. In paticula, TCP CUBIC [34], developed by Noth Caolina Univesity, featues a linea RTT-faines, while TCP Hybla [35], that enhances the solution poposed by Floyd in [9], povides RTT-fainess unde a cetain stability bound, and TCP Vegas [36] that povides good RTT-vainess if it is the only TCP in the Netwok. In summay, in almost a decade new modeling techniques fo netwok congestion contol have been developed which offe a new set of mathematical tools fo undestanding scalability and stability limits of netwok algoithms and potocols. In paticula, netwok congestion contol has been modeled as a non-linea optimization poblem in which the pimal models the system as seen fom the souce/destination point of view, while the dual models the system as seen fom the esouce point of view. The use of this fomulation benefits theoetical studies of the system dynamics fom both netwok and tanspot layes. III. MODEL In this section we will fist descibe the netwok model and pesent the optimization poblem. We will then give a bief eview of TCP New Reno and TCP Vegas, and intoduce and analyze the TCP Hybla solution. We will finish consideing othe solutions by adding some comments on TCP CUBIC. Finally, we will show the steps in the design choices of TCP Liba and include a stability analysis, using a contol theoetic appoach. 3 The fluid model pesented in [3] shows, as a potential souce of instability, the RED adaptive sampling and aveaging algoithms. These algoithm, indeed, ae dependent on packet size and aival ates.

4 4 A. Netwok Model and Optimization Poblem The netwok is modeled as a finite set of nodes N and links L, which connect the nodes in N. Each link is chaacteized by a finite capacity. We define c as the vecto of capacities whee each ow (c l, l L) epesents the capacity of link l L. S is the set of souces that accesses netwok esouces, typically a subset of N and L. We may define the outing matix R as: {, if link l L is utilized by souce S R l = () 0, othewise Each souce S is chaacteized by x (t), the tansmission ate. The aggegateflow at link l is defined as the sum of the contibutions of the souces that use that link: y l (t) = R l x (t τ f l ) (2) whee τ f l is the fowad delay fom souce to link l. We define pice to be the maginal cost (o penalty) pe unit flow that a souce incus in sending that flow incement. The pice is sent back to souce as a feedback signal by the link when congestion is detected. The pice(s) to which an algoithm is sensitive shapes its dynamics: TCP New Reno is, fo example, sensitive to packet loss, while TCP Vegas is sensitive to queueing delay. The aggegate pice seen by souce is: q (t) = R l p l (t τl b ) (3) l whee τ b l is the backwad delay in the feedback path fom link l to souce, p l(t) is the pice signal sent by link l at time t. The pice, also known as baie [37] is a function of the link flow. We define f l (y) as the pice fo sending taffic at ate y l = :l x on link l. Let s now suppose we ae able to define a function that descibes pecisely the etun that each souce expeiences when sending data at ate x. In fact, it is vey difficult to undestand which is the tue advantage fo a use when sending at a cetain ate. The function that descibes this advantage, U (x ), is defined in economics as a Utility function. The utility function of a congestion contol scheme is vey impotant, since it detemines the equilibium popeties of the scheme, such as the equilibium sending ate and its fainess popeties. We now have all the ingedients to state the optimization poblem we want to addess: max x V (x) (4) subject to: { R x c x 0, S, (5) whee V (x) = U (x ) P s:l s xs l 0 f l (y)dy. By definition P s:l s xs 0 f l (y)dy is the cost incued by esouce l when it pushes flow y though the netwok. Thus, V (x) is the net gain, i.e. net utility of souces x, which must be maximized. Theoem 3.: Unde the assumptions [38] [37]: ) U (x ) is a continuously diffeentiable, non-deceasing, stictly concave function. 2) f l (y) is a non-deceasing, continuous function. Stating fom any initial condition {x (0) 0}, the congestion contol algoithm: x = k (x )(U (x ) q (t)) (6) (whee q is the aggegate pice function defined ealie and k (x) is any non-deceasing, continuous function such that k (x) > 0, x > 0) will convege to the unique solution of (4) (5), x(t) ˆx as t. The left-hand side of (6) epesents the component of the gadient of V (x), to which the multiplicative tem k (x ) was added. Nomally, in the conventional gadient method, k (x ) =. Thee is no ham, howeve, in intoducing a non-deceasing function that acts as an amplificato of the gadient. The convegence point does not

5 5 change. The eason fo this tem will become cleae late when the utility function will be used to intepet vaious existing heuistic flow contol schemes. The deivative ẋ on the ight-hand side eflects the fact that in the gadient optimization method, the incemental change of x ove a unit time should be popotional to the value of the gadient. The detailed poof of convegence is found in [40]. The caeful eade, howeve, will notice that the function with the deivative shown on the ight hand side of (6) is concave by constuction. The multiplicative tem does not change the value x that nullifies the gadient. Thus, the gadient method leads to the unique optimum of function V (x). This theoem is theefoe telling us that in the absence of feedback delay, any congestion contol algoithm that can be mapped into a concave utility function, attains global asymptotic stability. In the following sections we will show how the potocols that we use fo compaison fit into this famewok and how they implement diffeent vesions of this algoithm. B. TCP New Reno TCP New Reno implements a vey simple and effective algoithm. This algoithm is able to scale vaious odes of magnitude in tems of netwok dimensions and speed. The algoithm may be biefly summaized as follows: On eceiving an ACK: window n+ = window n + window n. On an indication of mild congestion (3 DUPACK): window n+ = 2 window n. This may be undestood as an attempt to pobe the netwok tying to sense which sending ate may be achieved at the cost of packet loss when the pobing fails [39]. Lets now conside the fluid model fo congestion contol of TCP New Reno. Fom now on we will follow the notation: The subscipt means we ae consideing the -th souce. x (t) is the ate of the connection at time t. w (t) is the window size of the connection at time t. T is the aveage ound tip time. λ (t) is the pobability of loss at time t. a, the incease facto, is a constant that in TCP New Reno is set to. b, the decease facto, is a constant that in TCP New Reno is set to /2. With the AIMD algoithm, TCP New Reno incements the window by /w (t) pe each eceived ACK, hence the window inceases instantaneously as x(t) w (t) ( λ (t)). Similaly, pe each 3 DUPACK, the window is cut by half. The ate of this event is x (t)λ (t). The window then deceases at a ate x (t)λ (t)w (t)/2. We now may wite the fluid model fo congestion contol fo an AIMD-like congestion contol scheme (of which TCP New Reno is an example): 4 ẇ (t) = a λ (t) T (t) By setting T (t) = T, w (t) = x (t) T, we have: b x (t)λ (t)w (t) (7) λ (t) ẋ (t) = a b x (t)λ (t)x (t) (8) T 2 This may be e-witten in a moe geneal fom, taking in account feedback delays, as: ẋ (t) = x (t T ) λ (t) (a T x (t) T b λ (t)x (t) T ) (9) We took in account that the update at time t is detemined by the flow that left the souce at a time T in advance. The incease o decease in the second paenthesis of the ight-hand side of equation (9) is then done in tems of the ate at time t T, because of feedback delay. 4 Hee and in the est of the pape, we will ignoe the 4 facto that takes in account that the window, w(t), oscillates between 2 w(t) 3 3 and 4 w(t) with an aveage w(t). We will also avoid substituting the values of a and b in ode to keep a clea undestanding of how 3 these paametes influence the dynamics of the algoithm.

6 6 TCP New Reno implements an appoximate gadient algoithm fo the esolution of the congestion contol poblem. In tems of (9), and consideing feedback delay negligible, we may wite [38]: x = a ( λ (t) T 2 b x 2 a (t)λ (t)) = a (( b )x 2 a (t) + T 2 )( b a T 2 x 2 (t) + λ (t)) (0) Following the stuctue of eq. (6), the deivative of the net utility function that TCP New Reno implements and the congestion measue TCP New Reno is sensitive to ae: Integating in x the tem U (x ), we get the utility function as: C. TCP Hybla U (x ) q t (t) = ( b a T 2 x 2 (t) + λ (t)) () U(x ) = T a b tan ( b a T x ) (2) The Hybla scheme has been intoduced in [35]. This scheme, fom a congestion contol point of view, is mainly based on the modification to the incease of the AIMD algoithm poposed in [5] and futhely analysed in [8] [9] [6] []. The fluid flow model may be easiliy obtained fom (9) by making the following substitution: We then have: dx (t) dt a a T 2 T 2 0 = x (t T ) T (a T x (t)t0 2 ( λ (t)) b x (t) T λ (t)) (4) whee the new vaiable, T 0, is a constant efeence value. We may intepet T 0 as the efeence ound-tip time to which Hybla is adjusting the behavio of a flow. Moe pecisely, whateve the ound-tip time of a geneic flow, the flow will attempt to behave as a flow that is a expeiencing a ound-tip time of T 0 with the sink. This popety becomes cleae by obseving the value of the stable point: x = a λ T 0 b w 2 a b λ T 0 T 2 λ T 2 0 (3) a b λ (5) By compaing (5) with (35), it is clea that TCP Hybla achieves the same aveage thoughput as a New Reno flow with aveage RTT T 0. Fom equation (6) we expect that in the futue Hybla will suffe fom the same scalability poblem known pe New Reno. The fluid model is showing that the pobability of loss necessay to suppot a lage window size may become exceedingly small, so that the equilibium window value expessed in (6) may be difficult to achieve. Hee we ecall the sufficient condition fo the local asymptotic stability of a netwok with hosts with heteogenous delays opeating an AIMD-like congestion contol scheme [22] [9] and apply it to Hybla: a x T = T x T 2 0 < π 2β Obseving (7) and efeing to Kelly [7], one concludes that fo Hybla, we expect thee may be delay instability on outes whee the atio T /x is lage and appoaches the theshold. Convesely, the convegence will be slow on outes whee the atio is small. We also deived the expession of the appoximate gadient pojection algoithms that Hybla implements: x = a ( λ (t) T0 2 b x 2 a (t)λ (t)) = a ( T0 2 + b x 2 a (t))( (6) (7) + b a T0 2x2 (t) λ (t)) (8)

7 7 The utility function that TCP Hybla optimizes is: U(x ) = T 0 a b tan ( b a T 0 x ) (9) We note the similaity with TCP New Reno, whee T is eplaced with constant T 0. Thus, the utility function does not depend on ound-tip time. D. TCP Vegas Hee we follow the simple model descibed in [40]. We hee assume that buffe size is lage enough so that equilibium queue length is smalle than the buffe and that thee is no packet loss in equilibium. In this situation, we may assume that the only pice that is sensed fo congestion is queueing time. As stated in [24], a souce monitos its diffeence between its expected ate and its actual ate, and incements o decements its window by one in the next ound-tip time accoding to whethe the diffeence is less o geate than a paamete α. Souce sets its window accoding to the following ule: whee T w (t) + w (t + ) = w (t) w (t) T (t) T (t) if w(t) T if w(t) T else w(t) T (t) < α w(t) T (t) > α is the popagation delay expeienced by the -th flow. We can then obseve that: w (t) T w (t) T (t) = w (t)( T (20) T (t) ) (2) = w (t) T (t) (T (t) T T ) (22) = x (t)( T (t) T T ) (23) = x (t) φ (t) T (24) whee in (24), φ (t) = T (t) T is the instantaneous queueing time expeienced by the -th flow. We then see that we can expess (20) moe simply as: ẇ (t) = T (t) sgn(α T φ (t) x (t)) (25) whee sgn(x) = if x > 0, sgn(x) = if x < 0 and sgn(x) = 0 if x = 0. By substituting w (t) = T (t)x (t) and assuming that T (t) T we see that we can wite (25) in tems of thoughput as: ẋ (t) = T 2 sgn( α T φ (t) x (t)) (26) = T 2 sgn( α T x (t) φ (t)) (27) Fom (27) we may notice that: ) The step of the Vegas algoithm is given by T 2. 2) Consideing that in the Vegas algoithm α is a paamate that depends on the invese of T, we may then assume α = k/t, whee k is some constant. The equilibium sending ate is then given by: x = α T φ = k φ (28) The above equation states that the equilibium ate achieved by the Vegas algoithm is independent fom popagation delay; it depends only fom aveage queuing time φ. 3) The utility function that TCP Vegas attempts to maximize is: U(x ) = α T log(x ) (29)

8 8 E. TCP CUBIC TCP CUBIC [34] has been designed to enhance the window contol of TCP BIC [4]. The congestion window of TCP CUBIC is detemined by the following: W cubic = C(t K) 3 + W max (30) whee t is the elapsed time fom the last window eduction, W max is the window size just befoe the last window eduction, C is a constant and K = 3 Wmax β/c, whee β is a constant multiplication decease facto applied fo window eduction at the time of loss event (i.e., the window educes to βw max at the time of the last eduction). TCP CUBIC claims linea RTT fainess in tems of thoughput. Suppose two competing flows, with two diffeent ound-tip times T and T 2, shae the same path. Let s also suppose both flows sense losses in a synchonized manne [42], and that the initial paametes ae the same. We then have that the instantaneous thoughputs fo the two flows (making the assumption that T (t) T and T 2 (t) T 2 ) may be witten as: x (t) = w (t) T (3) x 2 (t) = w 2(t) T 2 (32) But since the time elapsed fom the last window eduction is the same, we have that w (t) = w 2 (t). It is easy then to see that x(t) x = T 2 2(t) T, fom which we may deive the linea RTT-fainess popety that is claimed by this algoithm. F. Compaison We have witten all of the congestion contol algoithms (with the exception of TCP CUBIC which we popose to study in moe detail in the futue) that we have so fa analysed in the fom: ẋ (t) = k (x )(U (x ) q (t)) (33) The quantities that appea in the expession ae: ) k (x ) is the stepsize of the algoithm. As we mentioned ealie, this tem is an amplification facto that detemines the amount by which the algoithm moves towad the solution at each step. This tem detemines the speed of convegence and the stability of the algoithm. Fo all the algoithms we have consideed hee, k (x ) is a continuous, non-deceasing function such that k (x ) > 0, x > 0. 2) (U (x ) q (t)) is the diection in which the algoithm is poceeding, seaching fo a solution (stable point). Moe in paticula, U (x ) is the maginal utility function and q (t) is the congestion measue (i.e., the maginal penalty) to which the algoithm is sensitive to. The maginal (utility-penalty) functions chaacteizes the location of the equilibium point of the algoithm (see Table I). Algoithm Stable Point Stepsize Maginal Utility Congestion Measue NewReno Hybla Vegas q a λ T b λ q a λ T 0 b λ ( b a )x 2 (t) + T 2 b a ( b a x 2 (t) + ) T0 2 α T φ T 2 T a 2x2 (t)+ b a T 0 2x2 (t)+ α T x TABLE I DYNAMIC AND EQUILIBRIUM PROPERTIES loss pobability loss pobability queueing delay

9 9 G. Dynamic Analysis Let us stat by ecalling the fluid model fo the TCP New Reno congestion contol scheme: dx (t) dt = x (t T ) a ( T x (t) T ( λ (t)) b x (t) T λ (t)) (34) This is an NL diffeential equation in the vaiable x (t) and models the ate s behavio of the -th flow. Fo steady state equilibium we let t. The stable point coesponds to the value of x (t) that nullifies the gadient. It is found by setting the ight hand side = 0. We then have: x = T a b λ λ (35) whee x, T, λ ae the stable points that ae eached afte the tansient phase by the -th connection in the netwok. A dynamic system may be geneally expessed as: { ẋ = f(x, u) y = g(x, u) whee x is the vecto of state vaiables, u is the vecto of inputs to the system and y is the vecto of outputs. We want to lineaize system (34) aound its stable point, in ode to expess it as (fo a stictly causal system): { ẋ = A x + B u (37) y = C x In (34) we may identify x (t) and x (t T ) as state vaiables [44], and λ (t) as the input to the system. We lineaize (34) aound its stable point in ode to study the behavio of the system in its neighbohood. In equations (38) to (40) we show the esults of computing the deivatives of (34) with espect to the state and input vaiables, and we substitute the value of (35) fo x (t) and x (t T ). df ( dx (t) ) eq = 2 b λ a ( λ ) (38) T b λ (36) df ( dx (t T ) ) eq = 0 (39) df ( dλ (t) ) eq = a T 2 λ (40) In the lineaization we assume that x (t) = x + δx (t), x (t T ) = x + δx (t T ), and λ (t) = λ + δλ (t) and that these quantities vay slowly aound thei equilibium point. We ae now able to find A and B, both S x S matices, whee S is the numbe of souces, in the lineaized system: A = diag 2b λ T The lineaized fom of (34), fo the -th flow, is then : δẋ (t) = 2 b λ T a ( λ ) b λ { B = diag a } T 2 λ (4) (42) a b ( λ λ )δx (t) a T 2 λ δλ (t) (43)

10 0 The Laplace tansfom of the tansfe function esults to be (hee we have that C = I, the identity matix, in (37), since the output y is equal to state vaiable x): G(s) = C(sI A) B (44) = diag a T 2 λ ( ) (45) s + 2 λ b a T b ( λ ) λ Recall that a and b vay fom implementation to implementation of the AIMD-type contol mechanism. Now we choose these paametes in a way that will lead to the desied fainess esults. The values â and ˆb that we popose ae: â α T 2 T 0 + T a (46) ˆb T T 0 + T b (47) Note that a new coefficient α was intoduced. Its setting and function will be explained late. These values lead to the following stable point fo the -th souce: a α x = λ (48) b T λ We now have that (4) and (42) become: A = diag 2T λ b T 0 + T { B = diag λ T b λ } α a α a ( T + T 0 ) λ Kelly in [7] deives the vaiance fo a flow in the case of N flows though a single esouce (bottleneck), whee all flows shae the same values of â, ˆb, T ; and assuming that queues ae modeled as M/M/, with a finite buffe β. In ou case we have that: va {x (t)} = ˆb x 2 2N ( 2( λ ) + β + N 2( λ ) ) (5) = (49) (50) T b x 2 2N( T + T 0 ) ( 2( λ ) + β + N 2( λ ) ) (52) We can now explain the design choices in (46) and (47) fo â and ˆb : ) We achieve a stabilized ate independence fom ound-tip time by having â T 2. 2) We achieve a educed sensitivity to ound-tip time in (49), the system matix (fo T 0 >> T ). 3) We do not penalize the convegence speed of the system to the stable point by multiplying pe facto α. 4) We achieve scalability (this point will be thoughly discussed in the next section). 5) We educe the vaiance of thoughput with espect to TCP New Reno, accoding to expession (52). The vaiance of a flow may be contolled by setting the T 0 and T paametes. In paticula, by setting a value of T 0 and T, we can diminish the vaiance by a facto of at least /( T + ). 6) The vaiance of a flow scales with x 2. The coefficient of vaiation (i.e. the atio: standad deviation/mean) of x (t) does not depend on x. This scale invaiance popety was fist identified by Ott in [45].

11 H. The α Coefficient In the pevious section we intoduced the new α coefficient. The design of the α facto was accomplished with the objective of pusuing the following main objectives: ) Incease convegence speed and achieve scalability fo the algoithm. 2) Keep the algoithm behavio stable. 5 Fo the above easons, the α facto has been decoupled in the poduct of two components say: α = S P, whee ) S = Scalability facto. 2) P = Penalty o Damping facto. We achieve scalability by adjusting the scalability facto to the capacity of the bottleneck link. To compute the latte, we use packet pai techniques that ae un in paallel to the algoithm. In paticula, we set: S = k C (53) whee k is a constant and C is the capacity of the bottleneck link seen by the -th souce. The penalty facto P has been designed in ode to make the incease ate of the algoithm adaptive to the amount of congestion in the netwok. We adopted queueing time as a measue of congestion of the netwok, the same measue on which TCP Vegas elies, namely: (T (t) T min ) (54) The ole of the penalty facto is then to penalize the incease of the window in the pesence of congestion and to maintain the window as close to the maximum value as long as possible. We may use diffeent expessions of penalty functions fo this pupose. In Tab. II we show a few options, whee T (t) epesents the instantaneous the minimum ound-tip time expeienced by the -th connection. All these functions tend to penalize the gowth of the congestion window when the instant ound-tip time gets close to the maximum ound-tip time expeienced duing the connection. In Fig. and 2 we see the ound-tip time, T max the maximum ound-tip time and T min Penalty Functions T (t) T max T min k 2( T max ) max T (t) 2T ( T max T min T min T (t) T max T min k 2( T max )) e k T (t) T min 2 T max T min TABLE II MONOTONICALLY DECREASING FUNCTIONS IN TERMS OF QUEUEING DELAY esults of a simulation whee we have two flows, with ound-tip times of 400 and 0 ms espectively, in a buttefly configuation, competing in a 00Mbps bottleneck. In the simulation elated to Fig., we used a penalty function, while we omitted it in the simulation elated to Fig Hee we mean stability in tems of the local asymptotic stability. We then expect that in its stable behavio, the potocol will achieve the aveage thoughput expessed in (48).

12 2 Fig.. Thoughput of two flows, using a penalty function Fig. 2. Thoughput of two flows, omitting the penalty function I. Stability Analysis Hee we will give a simple stability analysis fo TCP Liba, which will show the impotance of the choice of the α coefficient. Let s conside a single TCP souce on a single link. We will ecall the esults fom the analysis available in [38] fo TCP New Reno and compae them with the same analysis fo TCP Liba. We assume that the pice is set as in [22] fo simplicity: λ(x) = ( x(t) C )β (55) which epesents the pobability of having a queue of length β o geate fo a M/M/ queueing system; x(t) is the aival ate and C is the capacity of the link. We make the assumption that the queue is close to full most of the time. We then have that the ound-tip time is equal to the sum of the queueing delay and popagation delay. The sufficient condition fo asymptotical local stability is: λ κ T λ < π (56) 2 consideing that fo a TCP New Reno flow κ = / T 2 we have that: λ λ < π T 2 Let s now conside a TCP Liba flow. Fo a TCP Liba flow we have that κ = we can simply substitute this value in (56) and obtain: λ λ < π( T + T 0 ) 2α T (57) α T 0+ T 6. The analysis is the same, fom which we ae able to find the uppe bound α < T +T 0, which gives us the values that α may assume in ode to T keep a stability egion geate than that of New Reno fo 2 this simple case. Recalling that α = Scalability F acto P enalty F acto = S P, we see that the above bound gives a condition on k 2 once k is fixed, and vice vesa. We can find the following expession: 6 Hee we substitute a =. (58) k 2 > T max T min log( T + T 0 ) (59) T T min k C T 2

13 3 Once k is fixed and the othe paametes and chaacteistics of the link ae known, the above expession establishes the minimum value of k 2 in ode to guaantee a stability egion at least as wide as New Reno s. The above is clealy a qualitative analysis, since we have consideed the simple case of a single link and a single flow, but it gives us a feeling of how the choice of k and k 2 must be made. As we intuitively expected, (59) is telling us that: If k is inceased, then k 2 must be also inceased in ode to keep the same stability bound as New Reno. Highe values of C and T equie a highe value of k 2.. J. TCP Liba Algoithm Finally, we ae eady to deive the algoithmic expession of TCP Liba. We will use a synthesis pocess that is the evese of what we employed in the analysis of pevious TCP potocols. As we did fo the algoithms analyzed and pesented until now, we will deive the utility function that TCP Liba optimizes (though we will do it befoe knowing the actual algoithm), and will deive the fluid model algoithm TCP Liba implements, with the modification we designed in (46) and (47). TCP Liba s fluid flow algoithm is: 7 dx (t) dt = x (t T ) α T ( T x (t)( T + T 0 ) ( λ (t)) T 2 x (t) T λ (t) T + T 0 ) (60) We may wite the fluid model algoithm as in (6), by pefoming the same substitutions in (0): ẋ = ( T T + T 0 x 2 (t) + α T + T 0 )( T α x 2 (t) + λ (t)) (6) and we can see that the maginal utility function, U (x), is not dependent on T. TCP Liba is attempting to minimize the sum of the tansfe delays in the netwok, independently fom the ound-tip time expeienced by the souce. Finally, the TCP Liba algoithm: window n+ window n + window n α nt 2 n T n+t 0 in case of a successful tansmission. window n+ window n Twindown 2(T n+t 0) in case of loss (and the theshold is set accodingly). In the following section we will show the simulation esults fo TCP Liba. The simulations have been obtained by substituting T 0 =, T =, k = 2, k 2 = 2 and using the exponential penalty function epoted in Table II. While a highe value of k 2 would have impoved the link utilization by keeping the window at its maximum fo a longe time, we have noticed that a highe value k 2 geneates an excessively timid behavio of TCP Liba towad TCP New Reno. We adjusted this value as a tadeoff between utilization and fiendliness. The paamete k is adjusted accodingly to k 2, as we discussed in the pevious section. We finally set T 0 to, since in the geat majoity of cases this will esult in T << T 0 [46], which gives a diminished sensitivity of (49) fom T, without excessively penalizing the stepsize in (6). IV. PERFORMANCE EVALUATION In this section we evaluate TCP Liba using the NS-2 [47] simulation platfom. We also compae it to TCP New Reno and with othe RTT-fai TCP vesions namely TCP Vegas, CUBIC and Hybla. Fo TCP New Reno and Vegas, we used existing NS-2 modules; fo TCP Hybla and TCP CUBIC we used the code povided by the developes; and we developed ou own code fo TCP Liba. Default paametes had to be changed only in the case of TCP Vegas, as inspied by liteatue [48]. Each expeiment was un fo 000 seconds of simulation time (if not othewise specified in the elative figue). We chose such a long peiod because we wanted to evaluate the behavio of the vaious potocols afte they stabilize. Unless stated diffeently, the netwok topology was set as in Figue 3. Fou FTP connections ae established between the souce destination pais Si, and Ri shown in Fig 3. The pais S, R and S2, R2 have RTT = 40 ms, 7 Hee we will substitute the values fo â and ˆb ; we also substitute a =, b = /2 in (46) and (47).

14 4 S3 R3 S R S2 X Y R2 S4 R4 Fig. 3. NS-2 simulation topolgy epesenting coss county links. The pais S3, R3 and S4, R4 have RTT = 60ms, epesenting intecontinental links. Link capacities ae unifom fo all links. Link X, Y is thus the common bottleneck. Buffe size at oute X (the bottleneck buffe) vaies with the expeiments. In one seies of expeiments we set the buffe size in X to the pipe size, i.e., to the numbe of outstanding packets that can fill the pipe. This is equal to the poduct of bottleneck capacity by the lagest RTT (i.e., 60ms in most of the simulations) divided by packet size. In the emainde of this pape we efe to this value as the longest pipe size. In othe expeiments, the buffe size was set equal to 200 o 500 packets which ae the suggested values fo buffes in Cisco Systems outes [49]. We ae, in this manne, able to test potocols behavio with buffes sizes that esemble the eal outes, as well as with buffe sizes simila to those found in the liteatue; moeove, we had the oppotunity to study TCP Liba stability in elation to the buffe size (see eq.59). Finally, the TCP packet size, including TCP/IP heades, was set to 500 Bytes. We evaluated the following pefomance measues: ) available bandwidth utilization 2) inta-potocol RTT-fainess 3) inte-potocol RTT-fainess 4) fiendliness to the legacy potocol TCP New Reno 5) scalability of TCP Liba to many flows, lage capacity and lage RTT

15 5 Is woth noting that in ou expeiments thee ae no andom eos on links. Thus TCP New Reno behaves the same as TCP Sack. Thus, ou fiendliness esults will hold also fo TCP Sack. A. Inta-Potocol Fainess The Jains Fainess Index [50] is geneally adopted in scientific liteatue to evaluate the RTT-fainess degee among data flows shaing a single bottleneck; theefoe we have adopted it even in ou analysis. We computed its values to compae the vaious potocols in vaious configuations chaacteized by diffeent bottleneck capacities and buffe sizes. In paticula, Figue 4 consides the scenaio having the buffe size always equal to the longest pipe size, while Figue 5 coesponds to the case whee the buffe size is set to 200 packets. TCP Liba shows a bette RTT-fainess than its competitos in almost all the consideed scenaios. An exception is TCP Hybla that shows a slightly bette RTT-fainess fo a bottleneck of 80 Mbps and 60 Mbps, and 200-packet buffe. This esult can be taced back to Hybla s stability with lage bottleneck capacities and small buffes, and can be deived fom the bound in equation (7). The slightly wost behavio of TCP Liba in the expeiment with a buffe size of 200 packets may be explained by obseving that fo smalle buffes the penalty potion in the α facto clealy has a less impotant influence compaed to the lage buffes sizes. This poblem may be educed by inceasing the value of k 2 in the functions of table II. 0.9 Jain s Fainess Index Bottleneck Capacity (Mbps) NRENO VEGAS CUBIC HYBLA LIBRA Fig. 4. Jain s Fainess Index vs. bottleneck capacity fo TCP New Reno, TCP Vegas, TCP Cubic, TCP Hybla, and TCP Liba. Buffe size at the bottleneck was set equal to the longest pipe size. B. Inte-Potcol Fainess (Fiendliness) With an aim at veifying the compatibility of newly poposed potocols with Intenet s de facto standad we need to evaluate scenaios whee each of the new potocols competes fo the same bottleneck with the taditional TCP

16 6 Jain s Fainess Index Bottleneck Capacity (Mbps) NRENO VEGAS CUBIC HYBLA LIBRA Fig. 5. Jain s Fainess Index vs. bottleneck capacity fo TCP New Reno, TCP Vegas, TCP Cubic, TCP Hybla, and TCP Liba. Buffe size at the bottleneck was set equal to 200 packets, as suggested default value in the CISCO Systems configuation manual(s) [49] New Reno. We theefoe consideed vaious configuations whee TCP New Reno was used fo one shot RTT flow (fom S2 to R2) and one long RTT flow (fom S4 to R4), while the othe two concuent flows wee diven by one of the othe TCP flavos. This allowed us to investigate the impact of coexistence on the RTT-fainess degee and the fiendliness of the altenative TCP vesions towads TCP New Reno. We chose the asymmety index [5] as fiendliness metic. The Asymmety Index A is defined in equation (62) below. A = x x 2 x + x 2 (62) In this fomula x and x 2 coespond to the aveage thoughputs achieved by two diffeent potocols competing fo the same channel. If, as in ou case, the two competing potocols ae povided with exactly the same initial conditions and each of them is able to exploit (almost) all the available bandwidth when employed alone, then this index can be employed to linealy indicate the degee of aggessiveness of the two potocols towad one anothe. In essence, when A = 0, the two potocols shae the bottleneck pefectly evenly. Convesely A > 0, coespond to having the fist potocol moe aggessive than the second, while A < 0 imply the invese situation. In Fig. 6 and Fig. 7 the asymmety index is pesented fo all the bandwidth configuations and, fo each of them, TCP New Reno coexists with one of the altenative TCP vesions. In paticula, in Fig. 6 the buffe size was equal to the longest pipe size (233 packets), while in Fig. 7 the buffe size was 200 packets. As can be seen in the chats, when TCP Vegas is used concuently with TCP New Reno, the latte always pesents vey high incements of thoughput (the Asymmety Index fo TCP Vegas is : A < 0). This is because as soon as TCP Vegas detects that the queue is stating to build up, it educes the tansmission ate. The same

17 7 00% 80% 60% Asymmety Index 40% 20% 0% -20% -40% % -80% -00% Bottleneck Capacity (Mbps) VEGAS-NRENO CUBIC-NRENO HYBLA-NRENO LIBRA-NRENO Fig. 6. SLAC Asymmety Index [5]. TCP New Reno vs. TCP Vegas, TCP CUBIC, TCP Hybla, and TCP Liba. Two TCP New Reno flows compete with two othe flows. RTT values 40ms and 60ms espectively. Index = 0 pefect fiendliness; Index < 0 TCP New Reno is moe aggessive; Index > 0 the compaed TCP is moe aggessive than TCP New Reno. Buffe size at the bottleneck has been set equal to the longest link pipe size. consevative behavio is not adopted by the concuent TCP New Reno, which continues to pobe the channel fully exploiting available queues and bandwidth along the path and making TCP Vegas sense a continuous congestion in the netwok. As a consequence, TCP Vegas quickly bings its congestion window to a stable but vey low value, thus achieving vey low thoughput levels. In opposition, TCP Hybla is pedisposed to be too aggessive towad TCP New Reno, thus using most of the bandwidth and sensibly educing TCP New Reno s thoughput when competing fo the same channel, as confimed by Hybla s Asymmety Index always positive. This is because egadless of the actual cuent RTT, TCP Hybla ties to make all the TCP connections achieve a tansmission ate equivalent to the one that would be attained by a connection expeiencing the efeence RTT value (i.e., in this expeiment, 25 ms as epoted in [35]). TCP CUBIC was not as highly consevative o aggessive towad TCP New Reno as TCP Vegas and TCP Hybla wee. Howeve, in all the configuations simulated, even in those that we did not pesented hee due to space limitation, TCP Liba showed the highest fiendliness degee among all the potocols compaed in this wok. Indeed, TCP Liba is the potocol that had the least impact on the thoughput achieved by the concuent TCP New Reno connections and, in a few configuations, (slightly) educed the thoughput attained by TCP New Reno as confimed by the Asymmety Index. In summay, TCP Vegas is excessively timid, while TCP Hybla and TCP CUBIC ae too aggessive. TCP

18 8 00% 80% 60% Asymmety Index 40% 20% 0% -20% -40% % -80% -00% Bottleneck Capacity (Mbps) VEGAS-NRENO CUBIC-NRENO HYBLA-NRENO LIBRA-NRENO Fig. 7. BIC, TCP Hybla, and TCP Liba. Two TCP New Reno flows compete with two othe flows. RTT values 40ms and 60ms espectively. Index = 0 pefect fiendliness; Index < 0 TCP New Reno is moe aggessive; Index > 0 the compaed TCP is moe aggessive than TCP New Reno. Buffe size at the bottleneck has been set equal to 200 packets. This is the suggested default value in the CISCO Systems configuation manual(s) [49]. Liba demonstates that is geneally able to faily shae the available bandwidth with TCP New Reno. The only configuation whee anothe potocol (i.e., TCP CUBIC) achieves a bette asymmety index than TCP Liba is when a buffe of 200 packets is employed in combination with a 60Mbps bottleneck link (in this configuation, the actual pipe size would be 233 packets an ode of magnitude geate). Finally, not only is TCP Liba RTT-fai when employed as the only tanspot potocol and fiendly to TCP New Reno when coexisting with it, but in this latte case it also maintains the inta-potocol RTT-fainess. Indeed, the simulation esults obtained using the afoementioned symmetic topology (see Fig. 3) showed that each of the two TCP Liba connections tends to achieve a thoughput which is close to the aveage thoughput attained by the two RTT-unfai connections utilizing TCP New Reno. C. TCP Liba Scalability Discussion We studied TCP Liba scalability focusing on thee diffeent aspects: () scalability in elation to link capacity, (2) scalability in elation to numbe of flows acoss a given bottleneck and, (3) scalability in elation to the displacement of RTT(s) among the flows. ) Link capacity scalability: The cuent slow stat and congestion contol mechanism implemented by taditional TCP flavos has poved to have difficulty eaching full utilization on high-speed 8 links, paticulaly on connections 8 Hee we ae tageting coe links at gigabit speeds

19 9 chaacteized by lage RTT [52]. We have theefoe decided to evaluate the scalability of TCP Liba with a 60ms RTT connection ove a 244Mbps link (i.e., OC24). Figue 8 shows the acknowledged packets as a function of time. The deivative is the thoughput. One can see that the slope (i.e., thoughput) stabilizes vey apidly in TCP Liba. In contast, TCP NReno is still climbing afte 000 seconds. In fact, in 8 one can veify that TCP Liba hits 96% of channel utilization afte 000 sec. Unde the same conditions, TCP New Reno only achieves about 9% (see Figue 9). We tested also configuations with 400Mbps, 500Mbps, and 622Mbps (i.e., OC2) obtaining simila esults. Fig. 8. TCP Liba. Acknowledged packets vs.time. Bottleneck link bandwidth equal to Oc24(i.e.,.244Gbps), RTT set to 60ms. The TCP Liba link utilization is about = 96%. Buffe size at the bottleneck has been set equal to the longest link pipe size. 2) Numbe of flows scalability: In this expeiment we studied TCP Liba scalability in elation to the numbe of flows shaing the same bottleneck. In paticula, we used the buttefly configuation in Fig. 3 with a bottleneck link of 622 Mbps (i.e., OC2). We designed thee expeiments involving 00 contempoaneous flows each. The RTT was set as follows: 30 flows with RTT 6 ms (i.e., a egional connection) 60 flows with RTT 60 ms (i.e., a coss-county connection) 20 flows with RTT 80 ms (i.e., tansatlantic connection) Fist we un TCP New Reno, and then we un TCP Liba using two diffeent settings fo the k 2 paamete (see eq. 59). TCP New Reno pefomance is shown in Fig. 0. As expected fom the model, in paticula fom the utility function in equation (2), TCP New Reno shows RTT-unfainess due to dependency on the RTT duing the incease phase. Using the same expeimental scenaio, we pefomed a set of expeiments diected at studying TCP Liba s stability and fiendliness. In paticula, Fig. shows TCP Liba s pefomance with k 2 = 2, while Fig. 2 shows the esults with k 2 = 2. It is woth noting the key ole played by TCP Liba s paamete k 2. In

20 20 Fig. 9. TCP New Reno. Acknowledged packets vs.time. Bottleneck link bandwidth equal to Oc24(i.e.,.244Gbps), RTT set to 60ms. The TCP New Reno link utilization is about 9% Buffe size at the bottleneck has been set equal to the bottleneck link pipe size. paticula, the stability bound in equation (59) suggests the following consideations: (a) in this expeiment we ae on the bode of the stability egion fo TCP Liba and by inceasing k 2 we safely etun to the stability egion and achieve a good RTT-fainess (see Fig. 2); (b) with elatively small buffes (compaed to the pipe size) the penalty function has a lowe effect thus educing the RTT-fainess and inceasing the fiendliness to TCP New Reno; (c) the cluste effect in Fig. 2 suggests that in this condition with k 2 = 2, TCP Liba still attenuates the RTT-unfainess even though aggegates the flows in egions due to the fact that is on the bode of its stability aea. In summay, especially with small buffes, a caeful selection of TCP Liba s paametes is needed to balance the algoithm s RTT-faness (o effectiveness aea) with its fiendliness to TCP New Reno as suggested by the TCP Liba s Model. 3) Flows with lage RTT spead and staggeed stat times: In this expeiment fou diffeent TCP Liba flows (Fig. 3) with RTTs 20, 00, 60, 200, 400 ms ae stated in sequence at diffeent times. Bottleneck link bandwidth is equal to 00 Mbps. The buffe size at the bottleneck has been set equal to the longest pipe size. Fig. 2 shows the acknowledged packets vesus time. It is woth noting that the slopes ae the same acoss the flows. Thus, even in the case of a atio of :20 in RTT, TCP Liba allows all the flows to achieve thei fai shae. In contast, Fig. 3 shows a simila expeiment with TCP New Reno. One can eadily see that the shot flow captues the bottleneck. V. CONCLUSIONS AND FUTURE WORK This pape intoduces TCP Liba, a new potocol designed to be RTT-fai while maintaining a good fiendliness with TCP New Reno, thus allowing a seamless deployment in the netwok. We analytically studied TCP-Liba and its competitos using the pimal/dual netwok modeling fomulation and deiving the elative stability bounds. Ou study was completed with a simulation analysis pefomed using NS2 that confimed TCP Liba chaacteistics. In paticula, we discoveed that TCP Liba, when used within its stability egion, is able povide RTT-fainess and

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Compute Netwoks 54 (2010) 2327 2344 Contents lists available at ScienceDiect Compute Netwoks jounal homepage: www.elsevie.com/locate/comnet TCP Liba: Deivation, analysis, and compaison with othe RTT-fai

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

DISTRIBUTION MIXTURES

DISTRIBUTION MIXTURES Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Optimal Peer Selection for P2P Downloading and Streaming

Optimal Peer Selection for P2P Downloading and Streaming Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Compute Science Depatment Faculty Publication Seies Compute Science 2005 Optimal Pee Selection fo P2P Downloading and Steaming Micah Adle Univesity

More information

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach Minimizing Application-Level Delay of Multi-Path TCP in Wieless netwoks: A Receive-Centic Appoach Se-Yong Pak, Changhee Joo, Yongseok Pak, and Saewoong Bahk Depament of ECE and INMC, Seoul National Univesity,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Ethernet PON (epon): Design and Analysis of an Optical Access Network.

Ethernet PON (epon): Design and Analysis of an Optical Access Network. Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization ICCAS25 June 2-5, KINTEX, Gyeonggi-Do, Koea Adaptation of Motion Captue Data of Human Ams to a Humanoid Robot Using Optimization ChangHwan Kim and Doik Kim Intelligent Robotics Reseach Cente, Koea Institute

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information