Load Sharing in Networking Systems

Size: px
Start display at page:

Download "Load Sharing in Networking Systems"

Transcription

1 Load Sharing in Networking Systems Lukas Kencl Intel Research Cambridge MFF UK Praha,, November 2005 (With lots of help from Weiguang Shi, University of Alberta, and citations from D. Thaler, R. Ravishankar and K. Ross)

2 Outline Intel Research Cambridge Intel Research Cambridge Load sharing in networking systems Problem statement Motivation Imbalance due to traffic properties. Break. Inspiration: distributed Web caching Solutions and properties: Adaptive HRW hashing Adaptive Burst Shifting. Break. Seminar: Q&A, Exercises and Homeworks IR Movies!!! 2

3 Intel Research Cambridge 3

4 Intel R&D Commitment Intel Research: 4 Lablets,, target 80 people worldwide Intel Research Cambridge California Washington Oregon Massachusetts Illinois Pennsylvania New Mexico Swindon Cambridge Shannon Glasgow Barcelona Copenhagen Stockholm Nice Gdansk Braunschweig, Ulm Nizhny Novgorod Sarov Beijing Shanghai China Arizona Haifa Delhi Bangalore Mumbai India Tsukuba Tokyo Over 75 labs & 7000 R&D professionals worldwide 4

5 Intel Research Mission Build the technical leadership, knowledge assets and systems perspective to make Intel a preeminent driver of disruptive information technologies David Tennenhouse Vice President, Corporate Technology Group Director of Research, Intel Corporation 5

6 What is unique about Intel Research? Research is largely exploratory Off roadmap, years out on timeline Innovative collaborative model engaging with key Universities Lablets (Berkeley, Seattle, Pittsburgh, Cambridge) Intel employee facilities co-located on University campus to facilitate collaboration Open Collaborative Agreements signed with Universities Strategic Research Projects (SRP) inside Intel Technology transfer mechanism from open collaborative research Proprietary exploratory research outside scope of any business unitu Alignment of University engagements Research Council, Academic Relations, Labs, Visiting Faculty, Internships!!! 6

7 Intel Research Cambridge (IRC) Established in March 2003 Currently 12 full-time time researchers Visiting faculty, student interns Make sure the smartest work with us: cooperation with Cambridge University, as well as others throughout UK, Europe and elsewhere 7

8 IRC Key Research Areas Optical Packet Switching Virtualisation Xen Para-virtualisation - run modified or new OS on specialised guest architecture Wired Networking CoMo Continuous Monitoring Adaptive methods Anticipate the wireless WIP: from internet to Intairnet wireless access network using multidirectional antennas HAGGLE: mobile ad-hoc networks Ubiquitous computing 8

9 Load Sharing in Networking Systems Problem Statement 9

10 Map packets to processors Incoming Packets Multiple (N) Inputs Multiple (M) Processors Assumptions: Data arrives in packets. Any processor can process any packet. Heterogenous processor capacity μ j. N M Task: Map packets to processors so that load within some measure of balance. 10

11 Packet flows: avoid remapping or out-of-sequence!!! Incoming Packets Multiple (N) Inputs Multiple (M) Processors Assumptions: Data arrives in packetized flows. Any processor can process any packet. Heterogenous processor capacity μ j. N M Task: Load on processors within some measure of balance. Same flow to same processor (reordering, context). Advantage: system optimization. Drawback: complexity, overhead. 11

12 Reduce state maintenance of Flow-to to-processor Mapping Incoming Packet Multiple (N) Inputs 1 Multiple (M) Processors 1 v 2 f ( v ) = flow identifier vector v 4 3 N M Upon packet arrival, a decision is made where to process the packet, based on the flow identifier. A flow-to to-processor mapping f is thus established. 12

13 Acceptable load sharing as a measure of balance Processing load on processor j j (t) Capacity on processor j Workload intensity on processor j j (t) = j (t) / j Total system workload intensity (t) = Σ j (t) / Σ j j Acceptable load sharing: if (t) [ 1 then j, j (t) [ 1, if (t) > 1 then j, j (t) > 1. No single processor is overutilized if the system in total is not overutilized, and vice versa. 13

14 Coefficient of Variation (CV) as a measure of balance Useful, as it takes the scale of measurements out of consideration. 14

15 Minimizing Disruption Possible Goal: Acceptable load sharing without maintaining flow state information and yet minimizing the probability of mapping disruption (flow remapping or reordering). Special Integer Programming Problem: max Σ v Δ v (t) ). Σ j (1{ f(t-δ t)(v) ) = j}. 1{ f(t)(v)= )= j}), while Σ v a v (t) ). 1{ f(t)(v)= )= j} = j (t) [ j, j. v - flow identifier vector in the packet header, f (t) (v) - function mapping flows to processors, changing over time, Δ v (t)c {0,1} - indicator if v has appeared in the intervals (t-2δ t, t t-δ t) and (t-δ t, t), a v (t) - how many times has v appeared in the interval (t-δ t, t), t - iteration interval. We suspect an NP-complete problem use heuristics. 15

16 Summarize Balance load Avoid remapping - or packets out-of of-sequence Minimize overhead 16

17 Load Sharing in Networking Systems Motivation 17

18 Practical Examples Distributed Router, or Parallel Forwarding Engine Server Farm Load Balancer Network Processor Multiple (M) Servers S 1 S 2 Incoming Packet Packet-toserver mapping computation Packet forwarding S M Server Farm Load Balancer 18

19 Network Processor NP Network processor: Pool of multi-threaded threaded forwarding engines Integrated or attached GPP Memories of varying bandwidth and capacity Large parallel programming problem Concurrency Packet order Resource allocation Load balancing At 10 Gbps,, packets arrive every 36 ns!!! Packets SRAM GPP DRAM Pool of Microengines (ME) 19

20 Load Sharing in Networking Systems Traffic properties make balancing difficult 20

21 Traffic Properties Address distribution 32bit address space very unevenly assigned and populated Burstiness Power law 21

22 TCP Traffic is Bursty TCP behaviour: ideal and typical Packets arrive in periodic bursts! 22

23 Networking Traffic Exhibits Power-Law (Zipf-law) Properties P(R)~1/R a Flow popularities in traffic traces Frequency of an event as a function of its rank obeys powerlaw. Popularity of network flows with a close to 1 (from above). 23

24 Power-law leads to imbalance if static mapping (Shi et al, 2004) m - number of processors, K - number of distinct object addresses or flow IDs, p i (0<i<K) - popularity of object i, q j (0<j<m) - number of distinct adresses or flow IDs mapped to processor j 24

25 Conclusion Part I Complex problem Traffic properties work against static solutions 25

26 Break 5 minutes 26

27 Load Sharing in Networking Systems Inspiration: Distributed Web Caching and Web Server Load Balancing 27

28 What is a Distributed Web Cache Internet Intranet Proxy Cache stores Web objects locally Collection of distributed Web caches 28

29 HRW Mapping Intel Research Cambridge Highest Random Weight (HRW) Mapping, Thaler, Ravishankar,, 1997, Ross, 1998,, CARP Protocol, Windows NT LB Def.: Object-to to-processor mapping function f, f (v): V d M : f (v)( ) = j w x j. g ( v, j ) = max k x k. g (v, k), where v is the object identifier vector, x = (x 1,..., x m ) is a weights' vector and g (v,(, j)c (0,1) is a pseudorandom function of uniform distribution. Minimal disruption of mapping in case of processor addition or removal/failure. Load balancing over heterogenous processors: : weights vector x is in a 1-to1 to-1 correspondence to p = (p 1,..., p m ), the vector of object fractions received at each processor. Pseudorandom function g (v,( j)c (0,1) can be implemented as a fast-computable hash function. Example: 3 processors x 3. g (v, 3) x 3 Map to max of: x 2 x 1. g (v, 2). g (v, 1) x 2 x

30 HRW Minimal Disruption Minimal disruption of mapping in case of processor addition: Partitioning into contiguous set HRW Example: Add processor No. 4, vectors mapped either (i) as before addition or (ii) to the newly added processor minimal number of vectors change mapping. Max of: 1 Max of: 1 g (v, 2) g (v, 4) g (v, 3) g (v, 1) g (v, 4) g (v, 2) g (v, 3) g (v, 1) 30

31 HRW Load Balancing Intel Research Cambridge m - number of servers, S 1,, S m K - number of distinct object addresses or flow IDs, from the set of objects O p i (0<i<K) - popularity of object i, q j (0<j<m) - number of distinct adresses or flow IDs mapped to processor j, e.g. sum of the popularities of objects mapped to S j 31

32 Load Sharing in Networking Systems Adaptive Methods - Adaptive HRW Hashing - Adaptive Burst Shifting 32

33 Adaptive HRW Hashing (Kencl, Le Boudec 2002) 33

34 Adaptive HRW mapping 34

35 Adaptation through Feedback Problem: incoming requests are packets, not flows! Packets not evenly distributed over flows -> not evenly distributed over the request object space -> > HRW mapping not sufficient for acceptable load sharing bounds > > need to adapt! 3. Compute new x (t) = (x 1 (t),,..., x m (t)). ). 4. Download new x := x(t). x Multiple (N) Input Cards 4 N Control Point CP 2. Evaluate (t) = ( ( 1 (t), 2 (t),,..., m (t)) (compare threshold). 1. Filtered workload intensity ( j) = j (t) M Multiple (M) processors Trigger definition targets preventing overload, if system in total not overloaded, and vice versa. A threshold triggers adaptation when close to load sharing bounds. Flow-to to-processor mapping f becomes a function of time f(t)(v) Adaptation may cause flow remapping! How to minimize the amount remapped? 35

36 Adaptation Algorithm Start Wait time t Compute filtered processor workload intensity (t) No Trigger Adaptation? Yes Adapt weights' vector x and upload Triggering Policy Adaptation Policy 36

37 Triggering Policy Intel Research Cambridge ρ(t), system in total workload intensity threshold ρ(t), system in total triggering threshold ρ(t), system in total max, min hysteresis bound Dynamic workload intensity threshold ' (t) = 1/2 (1+ (t)) (t)) Example: (t) = (0.8, 0.2, 0.2), (t) = 0.4 e (t) = 0.7, 1 (t) > (t) e adapt. Triggering threshold (t) = max( ' (t), upper) or vice versa Hysteresis bound upper: (1+ H (t)). (t) lower: (1 - H (t)). (t) Triggering policy (i) if (t) [ 1 and max j (t) > (t) then adapt; (ii) if (t) ) > 1 and min j (t) < (t) then adapt. 37

38 Adaptation Policy: Minimal Disruption A, B - mutually exclusive subsets of M={1,...,m}, M=A 4 B. α c (0, 1). f, f' two HRW mappings with the weights' vectors x, x': x' j = α. x j, j c A, x' j = x j, j c B. p j, p' j - fraction of objects mapped to node j using f, f'. Intel Research Cambridge p' j [ p j, j c A, 1) p' p' j m p j, j c B. 2) Fraction of objects mapped to a different node by each mapping is MINIMAL, that is, equal to p' j - p j. V at every node j. 38

39 Adaptation Policy: Minimal Disruption Example (3 proc.) Intel Research Cambridge x 3 x 3. g (v, 3) x 2 x Max of: x 2 x 1. g (v, 2). g (v, 1) x 3 x 3. g (v, 3) 2/3.x 2 Max of: 2/3. x 2. g (v, 2) 2/3.x 1 2/3. x 1. g (v, 1) reduced receives less, unaltered receives more, if reduction by a single, invariable multiplier. minimal disruption of the mapping. 39

40 Adaptation Policy Let (t) [ 1. Then: x j (t) : = c(t). x j (t- t) t), if j (t) > (t) ( j exceeds threshold (t)), x j (t) : = x j (t- t), t), if j (t) [ (t) ( j does not exceed threshold (t)). If (t) > 1, 1 the adaptation is carried out in a symmetrical manner. The weights' multiplier coefficient c(t) : c(t) = (t) ( ) min { j (t) j (t) > (t)} Factor c(t) is proportional to the minimal error and to the number of nodes. 1/m 40

41 Adaptive Burst Shifting (Shi, MacGregor, Gburzynski 2005) 41

42 Adaptive Burst Shifting Insight: the periodicity of bursts may allow shifting flows in-between bursts, without affecting order within flows. 42

43 Adaptive Burst Shifting Burst Distributor Algorithm 43

44 Performance evaluation 44

45 Adaptive HRW on generated traffic 45

46 Expectations Workload intensity on individual processors close to that of the system in total (acceptable load sharing); Packet loss probability lowered (acceptable load sharing); Persistent flows (appearing in two consecutive iterations) seldom remapped (minimize disruption). 46

47 AHH Keeps Per-processor Workload Intensity Close to Ideal 2.5 ρ(t), system in total 2.5 ρ(t), system in total 2 2 Workload intensity Workload intensity Time Naive, no LS Time Adaptive HRW ρ(t), system in total ρ(t), system in total Max, min ρj(t), no LS Max, min ρj(t), static LS Max, min ρj(t), adaptive LS Workload intensity Workload intensity Time Time Static HRW Max and min of all. 47

48 Packet Loss Significantly Reduced with the Adaptive Control Loop Packets droppeds x 10 4 System in total No LS Static LS Adaptive LS Packets dropped 3.5 x Static LS Adaptive LS Time Packet loss: Naive, Static, Adaptive, Ideal Time Packet loss in excess of Ideal: Static, Adaptive. Adaptive HRW saves on average 60% of packets dropped in by the static load sharing. 48

49 Minimal Disruption Property Ensures Few Flow Remappings Flows Flows appearing Flows persistent Flows remapped Time Flows, per iteration: appearing, persitent and remapped. Adaptive control loop leads on average to: less than 0.05% of the appearing flows remapped per iteration; less than 0.2% of the persistent flows remapped per iteration. 49

50 AHH and ABS on generated traffic 50

51 Adaptive HRW and Intel Research Cambridge Adaptive Burst Switching Packet drop rates. Packet reordering. Packet remapping. 51

52 Conclusion ABS better in preventing packet drop AHH better in preventing remapping and reordering, although larger table would improve ABS ABS works on much smaller time-scale can address packet bursts AHH converges to optimal allocation, but timescale too long for bursts Best solution probably hybrid under investigation must be careful to avoid conflicting feedback-control control mechanisms 52

53 The End Thank you! 10:40 53

54 Seminar 54

55 Seminar agenda Q & A Exercises 1, 2, 3 IRC Homework Q & A II. Cinema? 55

56 Exercise 1: Mapping Disruption Let there be a system with M servers of the same capacity, and an (M+1)th server be added to the system. Compute the amount of mapping disruption with the: a) Contiguous mapping b) Mod M mapping 56

57 Exercise 2: Prove the x2p relationship of HRW mapping 57

58 Homework: 1. Prove the mindisruption property of Adaptive HRW hashing 2. Try and design your own adaptive load balancing mapping that a) reduces packet reordering within flows, or b) reduces flow remapping. 58

59 Q & A 59

60 Internships? Films? Thank you! research.net/cambridge/ 60

Load Balancing with Minimal Flow Remapping for Network Processors

Load Balancing with Minimal Flow Remapping for Network Processors Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,

More information

Flow-Based Routing Architecture for Valiant Load-Balanced Networks

Flow-Based Routing Architecture for Valiant Load-Balanced Networks Flow-Based Routing Architecture for Valiant Load-Balanced Networks Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,

More information

Intel Corporation Silicon Technology Review

Intel Corporation Silicon Technology Review Intel Corporation Silicon Technology Review Ken David Director, Components Research SEMI Strategic Business Conference April 2003 Agenda Corporate Mission Leadership in Technology Leadership in Integration

More information

LOAD SCHEDULING FOR FLOW-BASED PACKET PROCESSING ON MULTI-CORE NETWORK PROCESSORS

LOAD SCHEDULING FOR FLOW-BASED PACKET PROCESSING ON MULTI-CORE NETWORK PROCESSORS LOAD SCHEDULING FOR FLOW-BASED PACKET PROCESSING ON MULTI-CORE NETWORK PROCESSORS Fei He,2, Yaxuan Qi,2, Yibo Xue 2,3 and Jun Li 2,3 Department of Automation, Tsinghua University, Beijing, China 2 Research

More information

Load Sharing with OCGRR for Network Processors Which Supports Different services

Load Sharing with OCGRR for Network Processors Which Supports Different services 1 Load Sharing with OCGRR for Network Processors Which Supports Different services R.Sunitha, Assistant Professor, CMS College of science and commerce. sunithar2001@yahoo.co.in Abstract A new scheme for

More information

TOGETHER, the continuing Internet bandwidth explosion

TOGETHER, the continuing Internet bandwidth explosion 790 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 4, AUGUST 2005 Load Balancing for Parallel Forwarding Weiguang Shi, M. H. MacGregor, Senior Member, IEEE, and Pawel Gburzynski Abstract Workload distribution

More information

Network-on-chip (NOC) Topologies

Network-on-chip (NOC) Topologies Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Jinho Hwang and Timothy Wood George Washington University

Jinho Hwang and Timothy Wood George Washington University Jinho Hwang and Timothy Wood George Washington University Background: Memory Caching Two orders of magnitude more reads than writes Solution: Deploy memcached hosts to handle the read capacity 6. HTTP

More information

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer

More information

Application of SDN: Load Balancing & Traffic Engineering

Application of SDN: Load Balancing & Traffic Engineering Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection

More information

Achieving the Science DMZ

Achieving the Science DMZ Achieving the Science DMZ Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2012 Baton Rouge, LA January 22, 2012 Outline of the Day Motivation Services Overview Science DMZ

More information

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

CHAPTER 7 CONCLUSION AND FUTURE SCOPE 121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution

More information

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G Motivation Mobile Internet and explosion of its applications,

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Real-Time

More information

Stochastic Analysis of Horizontal IP Scanning

Stochastic Analysis of Horizontal IP Scanning Stochastic Analysis of Horizontal IP Scanning Derek Leonard, Zhongmei Yao,, Xiaoming Wang, and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University

More information

Huawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei

Huawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei Huawei European Research University Partnerships Michael Hill-King European Research Institute, Huawei Next 20 30 Years: The World Will Become Intelligent All things Sensing All things Connected All things

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

SEDA: An Architecture for Well-Conditioned, Scalable Internet Services

SEDA: An Architecture for Well-Conditioned, Scalable Internet Services SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles

More information

CPU Scheduling. Operating Systems (Fall/Winter 2018) Yajin Zhou ( Zhejiang University

CPU Scheduling. Operating Systems (Fall/Winter 2018) Yajin Zhou (  Zhejiang University Operating Systems (Fall/Winter 2018) CPU Scheduling Yajin Zhou (http://yajin.org) Zhejiang University Acknowledgement: some pages are based on the slides from Zhi Wang(fsu). Review Motivation to use threads

More information

6 Distributed data management I Hashing

6 Distributed data management I Hashing 6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Nested QoS: Providing Flexible Performance in Shared IO Environment

Nested QoS: Providing Flexible Performance in Shared IO Environment Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman Rice University Houston, TX 1 Outline Introduction System model Analysis Evaluation Conclusions and future work

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Introducing the FX-14 ASIC Design System. Embargoed until November 10, 2015

Introducing the FX-14 ASIC Design System. Embargoed until November 10, 2015 Introducing the FX-14 ASIC Design System Embargoed until November 10, 2015 Market Forces Are Driving Need for a New Breed of Semiconductor By 2019: Bandwidth Roughly one million minutes of video will cross

More information

Effects of a Hash-based Scheduler on Cache Performance in a Parallel Forwarding System

Effects of a Hash-based Scheduler on Cache Performance in a Parallel Forwarding System Effects of a Hash-based Scheduler on Cache Performance in a Parallel Forwarding System Weiguang Shi, Mike H. MacGregor and Pawel Gburzynski Department of Computing Science, University of Alberta, Edmonton,

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010 Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3

More information

Towards a hybrid approach to Netflix Challenge

Towards a hybrid approach to Netflix Challenge Towards a hybrid approach to Netflix Challenge Abhishek Gupta, Abhijeet Mohapatra, Tejaswi Tenneti March 12, 2009 1 Introduction Today Recommendation systems [3] have become indispensible because of the

More information

Single Chip Heterogeneous Multiprocessor Design

Single Chip Heterogeneous Multiprocessor Design Single Chip Heterogeneous Multiprocessor Design JoAnn M. Paul July 7, 2004 Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 The Cell Phone, Circa 2010 Cell

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu

More information

Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors

Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors Yaxuan Qi (presenter), Bo Xu, Fei He, Baohua Yang, Jianming Yu and Jun Li ANCS 2007, Orlando, USA Outline Introduction

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS ITU Kaleidoscope 2015 Trust in the Information Society Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS Presenter: Prof. PhD. Takuro SATO Waseda

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

LECTURE 3:CPU SCHEDULING

LECTURE 3:CPU SCHEDULING LECTURE 3:CPU SCHEDULING 1 Outline Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time CPU Scheduling Operating Systems Examples Algorithm Evaluation 2 Objectives

More information

Synthetic Trace Generation for the Internet: An Integrated Model

Synthetic Trace Generation for the Internet: An Integrated Model Synthetic Trace Generation for the Internet: An Integrated Model W. Shi, M. H. MacGregor and P. Gburzynski Department of Computing Science, University of Alberta, Edmonton, AB, T6G 2E8, Canada {wgshi,

More information

Advanced Operating Systems (CS 202) Scheduling (2)

Advanced Operating Systems (CS 202) Scheduling (2) Advanced Operating Systems (CS 202) Scheduling (2) Lottery Scheduling 2 2 2 Problems with Traditional schedulers Priority systems are ad hoc: highest priority always wins Try to support fair share by adjusting

More information

Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400

Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400 The International Arab Journal of Information Technology, Vol. 6, No. 3, July 2009 289 Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400 Kandasamy Anusuya, Karupagouder

More information

Load Balancing Overview

Load Balancing Overview The "Load Balancing" feature is available only in the Barracuda Web Application Firewall 460 and above. A load balancer is a networking device that distributes traffic across multiple back-end servers

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

GRASP. Greedy Randomized Adaptive. Search Procedure

GRASP. Greedy Randomized Adaptive. Search Procedure GRASP Greedy Randomized Adaptive Search Procedure Type of problems Combinatorial optimization problem: Finite ensemble E = {1,2,... n } Subset of feasible solutions F 2 Objective function f : 2 Minimisation

More information

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution

More information

INCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD. Amit Uppal

INCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD. Amit Uppal INCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD By Amit Uppal A Thesis Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Master of

More information

Complexity results for throughput and latency optimization of replicated and data-parallel workflows

Complexity results for throughput and latency optimization of replicated and data-parallel workflows Complexity results for throughput and latency optimization of replicated and data-parallel workflows Anne Benoit and Yves Robert GRAAL team, LIP École Normale Supérieure de Lyon June 2007 Anne.Benoit@ens-lyon.fr

More information

Extending SLURM with Support for GPU Ranges

Extending SLURM with Support for GPU Ranges Available on-line at www.prace-ri.eu Partnership for Advanced Computing in Europe Extending SLURM with Support for GPU Ranges Seren Soner a, Can Özturana,, Itir Karac a a Computer Engineering Department,

More information

CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE. George Porter November 27, 2017

CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE. George Porter November 27, 2017 CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE George Porter November 27, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative

More information

TESTING A COGNITIVE PACKET CONCEPT ON A LAN

TESTING A COGNITIVE PACKET CONCEPT ON A LAN TESTING A COGNITIVE PACKET CONCEPT ON A LAN X. Hu, A. N. Zincir-Heywood, M. I. Heywood Faculty of Computer Science, Dalhousie University {xhu@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca} Abstract The

More information

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Stanley Bak Abstract Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid

More information

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued

More information

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers TCP & Routers 15-744: Computer Networking RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay Product Networks L-6

More information

Implementing and Experimenting with XCP

Implementing and Experimenting with XCP Implementing and Experimenting with XCP Ted Faber, Aaron Falk, Yuri Pryadkin, Bob Braden, Eric Coe, Aman Kapoor, Amit Yajurvedi, Nirav Jasapara USC/ISI USC Viterbi School of Engineering 28 Sept 2005 Outline

More information

Process Scheduling. Copyright : University of Illinois CS 241 Staff

Process Scheduling. Copyright : University of Illinois CS 241 Staff Process Scheduling Copyright : University of Illinois CS 241 Staff 1 Process Scheduling Deciding which process/thread should occupy the resource (CPU, disk, etc) CPU I want to play Whose turn is it? Process

More information

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description

More information

Optimize New Intel Xeon E based Ser vers with Emulex OneConnect and OneCommand Manager

Optimize New Intel Xeon E based Ser vers with Emulex OneConnect and OneCommand Manager W h i t e p a p e r Optimize New Intel Xeon E5-2600-based Ser vers with Emulex OneConnect and OneCommand Manager Emulex products complement Intel Xeon E5-2600 processor capabilities for virtualization,

More information

Counter Braids: A novel counter architecture

Counter Braids: A novel counter architecture Counter Braids: A novel counter architecture Balaji Prabhakar Balaji Prabhakar Stanford University Joint work with: Yi Lu, Andrea Montanari, Sarang Dharmapurikar and Abdul Kabbani Overview Counter Braids

More information

Packet Doppler: Network Monitoring using Packet Shift Detection

Packet Doppler: Network Monitoring using Packet Shift Detection Packet Doppler: Network Monitoring using Packet Shift Detection Tongqing Qiu, Nan Hua, Jun (Jim) Xu Georgia Tech Jian Ni, Hao Wang, Richard (Yang) Yang Yale University Presenter: Richard Ma December 10th,

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

Table of Contents. Cisco Buffer Tuning for all Cisco Routers

Table of Contents. Cisco Buffer Tuning for all Cisco Routers Table of Contents Buffer Tuning for all Cisco Routers...1 Interactive: This document offers customized analysis of your Cisco device...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

Data Intensive Science Impact on Networks

Data Intensive Science Impact on Networks Data Intensive Science Impact on Networks Eli Dart, Network Engineer ESnet Network Engineering g Group IEEE Bandwidth Assessment Ad Hoc December 13, 2011 Outline Data intensive science examples Collaboration

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

Towards Systematic Design of Enterprise Networks

Towards Systematic Design of Enterprise Networks Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All

More information

Cache/Memory Optimization. - Krishna Parthaje

Cache/Memory Optimization. - Krishna Parthaje Cache/Memory Optimization - Krishna Parthaje Hybrid Cache Architecture Replacing SRAM Cache with Future Memory Technology Suji Lee, Jongpil Jung, and Chong-Min Kyung Department of Electrical Engineering,KAIST

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-6 Router Congestion Control TCP & Routers RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

A Study of Cache-Based IP Flow Switching

A Study of Cache-Based IP Flow Switching University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania

More information

AN exam March

AN exam March AN exam March 29 2018 Dear student This exam consists of 7 questions. The total number of points is 100. Read the questions carefully. Be precise and concise. Write in a readable way. Q1. UDP and TCP (25

More information

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director

More information

BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes

BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines AtHoc SMS Codes Version Version 7.5, May 1.0, November 2018 2016 1 Copyright 2010 2018 BlackBerry Limited. All Rights Reserved.

More information

Chapter 5: Process Scheduling

Chapter 5: Process Scheduling Chapter 5: Process Scheduling Chapter 5: Process Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Thread Scheduling Operating Systems Examples Algorithm

More information

Passive NFS Tracing of and Research Workloads. Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST April 1, 2003

Passive NFS Tracing of  and Research Workloads. Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST April 1, 2003 Passive NFS Tracing of Email and Research Workloads Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST 2003 - April 1, 2003 Talk Outline Motivation Tracing Methodology Trace Summary New Findings

More information

arxiv: v3 [cs.ni] 3 May 2017

arxiv: v3 [cs.ni] 3 May 2017 Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Synthetic Trace Generation for the Internet: An Integrated Model

Synthetic Trace Generation for the Internet: An Integrated Model Synthetic Trace Generation for the Internet: An Integrated Model W. Shi, M. H. MacGregor and P. Gburzynski Department of Computing Science, University of Alberta, Edmonton, AB, T6G 2E8, Canada {wgshi,

More information

Measurement of packet networks, e.g. the internet

Measurement of packet networks, e.g. the internet Measurement of packet networks, e.g. the internet John Schormans (EE) Ben Parker (SMS) (next speaker in this joint talk) and Steven Gilmour (SMS Head of the Statistics Research Group and Director for the

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing

More information

AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA

AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA Ramyashree K.S, Arvind S & Shesharao M. Wanjerkhede GNDEC, Bidar-585403, Karnataka

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture

Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Chuck Zhao 1 Hao Wang 2 Bill Lin 2 Jim Xu 1 1 Georgia Institute of Technology 2 University of California, San Diego

More information

PageRank. CS16: Introduction to Data Structures & Algorithms Spring 2018

PageRank. CS16: Introduction to Data Structures & Algorithms Spring 2018 PageRank CS16: Introduction to Data Structures & Algorithms Spring 2018 Outline Background The Internet World Wide Web Search Engines The PageRank Algorithm Basic PageRank Full PageRank Spectral Analysis

More information

Maximum flow problem CE 377K. March 3, 2015

Maximum flow problem CE 377K. March 3, 2015 Maximum flow problem CE 377K March 3, 2015 Informal evaluation results 2 slow, 16 OK, 2 fast Most unclear topics: max-flow/min-cut, WHAT WILL BE ON THE MIDTERM? Most helpful things: review at start of

More information