AN ABSTRACT OF THE THESIS OF. Arul Nambi Dhamodaran for the degree of Master of Science in

Size: px
Start display at page:

Download "AN ABSTRACT OF THE THESIS OF. Arul Nambi Dhamodaran for the degree of Master of Science in"

Transcription

1

2 AN ABSTRACT OF THE THESIS OF Arul Nambi Dhamodaran for the degree of Master of Science in Electrical and Computer Engineering presented on September 12, Title: Fast Data Replenishment in Peer to Peer Networks Abstract approved: Thinh Nguyen Peer-to-Peer (P2P) based distributed storage systems have gain much popularity in recent years. These systems rely greatly on the data redundancy to be robust under network dynamics, i.e., the dynamics of peer entering and departing the network. Hence, it is important to implement mechanisms for maintaining a certain level of data redundancy at all times in the network. One such mechanism is called distributed data replenishment which attempts to repair data due to a peer failure or departure in a distributed manner. Such distributed data replenishment schemes make use of the well-known Repetition code, the Reed Solomon code, or recently the Random Linear Network Coding techniques. However, these schemes do not consider bandwidth associated with peers during the replenishment. In this thesis we explore techniques for fast replenishment by taking into consideration the bandwidth capacities of peer links. Specifically, we formulate the problem of fast replenishment via linear programing framework. Our simulation results indicate that the proposed fast replenishment significantly outperforms the current approach under many typical network scenarios.

3 c Copyright by Arul Nambi Dhamodaran September 12, 2011 All Rights Reserved

4 Fast Data Replenishment in Peer to Peer Networks by Arul Nambi Dhamodaran A THESIS submitted to Oregon State University in partial fulfillment of the requirements for the degree of Master of Science Presented September 12, 2011 Commencement June 2012

5 Master of Science thesis of Arul Nambi Dhamodaran presented on September 12, 2011 APPROVED: Major Professor, representing Electrical and Computer Engineering Director of School of Electrical Engineering and Computer Science Dean of the Graduate School I understand that my thesis will become part of the permanent collection of Oregon State University libraries. My signature below authorizes release of my thesis to any reader upon request. Arul Nambi Dhamodaran, Author

6 ACKNOWLEDGEMENTS I would like to begin by expressing my sincere gratitude to my advisor, Prof. Thinh Nguyen, for his guidance and continuous encouragement, without his support this thesis would not have been possible. Working with him was enjoyable and refreshing. I would also like to thank Prof. Bella Bose for his support and inspiration, which helped me a great deal during my thesis work. I would like to thank all my friends and colleagues at Oregon State University for their friendships and useful discussions. My special thanks to my friends/roommates whose support helped me get through these two years with such ease and making every moment of it enjoyable and wonderful. I would like to thank my parents G. Dhamodaran and Kayali Dhamodaran for their constant support and encouragement. They have thought me the joy of love, the importance of family and the value of knowledge. They have stood by me in every one of my decisions and have always been a pillar of strength and support, without which I would not have reached this far.

7 TABLE OF CONTENTS 1. INTRODUCTION Distributed Storage Networks Data Replenishment Existing Methods Page Repetition Code Based Replenishment scheme Reed Solomon code based replenishment scheme Random Linear Network Coding based replenishment scheme Our Strategy BACKGROUND AND RELATED WORK Network Coding Linear Network Coding Peer to Peer Data Streaming Mesh Topology Linear Optimization Linear Programming The Simplex Method BANDWIDTH BASED TRAFFIC FLOW OPTIMIZATION FOR P2P NET- WORKS Introduction Fast Data Replenishment Scheme Bandwidth Based Optimization scheme General Case Bandwidth Based Optimization Linear Optimization for a N-node network node Bandwidth Based Optimization Example Optimization Function

8 TABLE OF CONTENTS (Continued) 3.5. Replenishment Time Analysis Page 4. SIMULATION RESULTS AND PERFORMANCE EVALUATION Simulations Results for Bandwidth Based Optimization Replenishment Time Analysis FUTURE WORK Bandwidth Based Optimization for Proportional Mixing Integer optimization of packet flow in P2P networks CONCLUSIONS BIBLIOGRAPHY

9 LIST OF FIGURES Figure Page 1.1 Simple P2P Network Simple illustration of Random Linear Network Coding (a) Represents the existing data replenishment method (b) Represents the proposed Fast Data Replenishment Technique Simple Butterfly Network illustrating the network coding technique Random Linear Network Coding example (a) Fully Connected Mesh Topology. (b) Partially Connected Mesh Topology Flow graph of the Simplex Algorithm (a) Packet Flow in Direct Method. (b) Packet Flow in Bandwidth Based Optimization Method N-node Mesh Network with one destination node (a). Packet flow of packet type P (1) using the existing methods. (b). Packet flow of packet type P (1) using bandwidth based optimization method Node Bandwidth Based Optimization Node Bandwidth Based Optimization Example Node Simulation Example Replenishment time for a 10 node network Bandwidth Based Optimization for Proportional Mixing Example of Integer based packet flow optimization

10 LIST OF TABLES Table Page 3.1 Packet Flow in a 4 node network with and without optimization Mean of Rate of packet flow with and without optimization for uniform distribution (R C < R D ) Mean of Rate of packet flow with and without optimization for uniform distribution (R C > R D ) Variance of packet flow with and without optimization for uniform distribution (R C < R D ) Variance of packet flow with and without optimization for uniform distribution (R C > R D ) Mean of Rate of packet flow with and without optimization for exponential distribution (R C < R D ) Mean of Rate of packet flow with and without optimization for exponential distribution (R C > R D ) Variance of packet flow with and without optimization for exponential distribution (R C < R D ) Variance of packet flow with and without optimization for exponential distribution (R C > R D )

11 FAST DATA REPLENISHMENT IN PEER TO PEER NETWORKS 1. INTRODUCTION 1.1. Distributed Storage Networks The distributed storage networks are computer networks in which the data is stored in several different nodes or peers. This is in stark contrast with traditional storage system where data is stored in a centralized location. Distributed storage network offer several advantages over traditional storage systems. First, due to its distributed design, a distributed storage system helps avoid the bottle neck failure which can be catastrophic in centralized storage systems. Second, if designed correctly, the storage capacity of distributed storage systems can also be increased incrementally, often with small costs, i. e., leading to high scalability in both capacity and cost. On the other hand, it is more complex to manage distributed storage systems as storage nodes are geographically far apart. This is especially true for the recently emerging Peer-to-Peer (P2P) based storage systems where peers can enter and depart the systems almost freely. As a result, data might disappear from the networks permanently or temporarily due to peer dynamics. Therefore, a major research effort in distributed storage system is to develop mechanisms for keeping the data in a P2P-based storage network in spite of the highly dynamic nature of P2P networks. One scalable mechanism is termed data replenishment. [7],[10].

12 Data Replenishment In the he last few years there has been an exponential increase in the use of Peer to Peer (P2P) Networks for sharing of information, video and audio files in the Internet. The P2P networks are distributed data storage systems where the data that is stored in them is replicated across multiple nodes or peers in different locations. This data replication across multiple nodes in a P2P Network helps avoid one of the main problems in a centralized storage network known as the bottleneck problem. [4],[5]. As peers in the P2P network can arrive and depart at any given time, now when a peer departs the P2P network the data stored in the peer is lost temporarily if the peer rejoins the network later, or permanently if the peer does not rejoin the network or if the data stored in that network is deleted. FIGURE 1.1: Simple P2P Network The files stored in such distributed storage networks will remain alive as long as there

13 3 is one full copy of the file present in the P2P network [14], [15]. In order to ensure that the files in the P2P network remain alive we must ensure that the data redundancy levels of the files stored in the P2P network always remain above one. The data redundancy levels are critical because, if the data redundancy level of a file goes below one then the file will no longer be recoverable and the information stored in the file is lost. In order to keep the files stored in the P2P networks active we must maintain the data redundancy levels of all the files stored in the network be above one, this can be achieved by constantly replenishing the lost data Existing Methods In the last few years various techniques have been created to improve the performance of the peer to peer networks. Data replenishment is one factor that plays a significant role in improving the performance of P2P networks by replenishing the data lost due to peer departure thus helping maintaining the data redundancy levels. Some important P2P data replenishment techniques are as listed below. Repetition code based replenishment scheme Reed Solomon code based replenishment scheme Random Linear Network Coding based replenishment scheme Repetition Code Based Replenishment scheme The Repetition code based replenishment scheme is the simplest and most straightforward replenishment technique. In this replenishment scheme, data is replicated across multiple peers. Specifically, suppose a file is divided into two parts A and B, and N peers are used to store the file. Then, half of the peers can store parts A and the remaining half

14 4 store parts B. In this case, the redundancy level or the ratio of the total data storage to the file size is N/2. Now, if a peer leaves the network, and a new peer joins the network, it will randomly connect to one of the existing peers and download its data. In this way, data is replenished. However, if the replenishments are repeated over many times, there will be a chance that there is only one identical part of a file that will remain in the network. Thus, a file is permanently irrecoverable since the file was originally composed of two parts. Note that one can change the redundancy level by dividing the file into an appropriate number of parts. For example, if a file is divided into three parts, and each third of peers store a different part of the file, then the redundancy level is N/ Reed Solomon code based replenishment scheme The Reed Solomon code based replenishment scheme is one of the data replenishment scheme in distributed storage networks, which employs standard channel coding techniques for data replenishment in P2P networks. In this scheme the data file of size L bits is divided into three equal parts of size L/3 bits. These three parts are then channel coded to produce K codewords. Each peer stores one such codeword with a redundancy level in such a type of network will be N/3. In such a type of coding technique only 3 unique codewords are required to reconstruct the original file [11], [12]. When a node leaves the network the new node that is joining the network will be replenished with the data from it s neighboring nodes. Here the new peer joining the network will randomly connect to other peers in the network and download any one codeword from any of the peers for replenishment of the data. If this process keeps repeating eventually the data file will not be recoverable when one set of the three set codewords is lost completely. The Reed Solomon code based technique performs better then the repetition code based technique. Also the data recoverability in such a system is longer.

15 Random Linear Network Coding based replenishment scheme The Random Linear Network Coding (RLNC) based replenishment scheme is very much similar to the Reed Solomon code based replenishment scheme where the file is first divided into there parts and then coded into K codewords, where each codeword is a Random Linear combination of the three parts of the original file [2],[8],[9]. Each peer or node in the network stores one such codeword, the data redundancy levels in the network is the same as the Reed Solomon code based technique N/3. M = x 1 A + x 2 B + x 3 C (1.1) The codeword generation using the random linear network coding technique is as given in the equation 1.1 where A, B and C are the three parts of the data file and x 1, x 2 and x 3 are the coefficients, the codeword M is a random linear combination of the file parts of A, B and C. Here the coefficients x i s are elements drawn uniformly at random intervals from a finite field. In this method since the coefficients x i s are known, we can say that if a peer has at least three independent codewords then that peer will be able to recover the original file. The figure given above shows the basic operations of random linear network coding technique where A, B and C are the source nodes and D is the destination node. S 1 and S 2 are the two parts of the data file. σ 1 and σ 2 are the segments of the data file parts S 1 and S 2 respectively and α 1 and α 2 are their coefficients. Now when a peer leaves the network and a new peer joins the network. The new peer that is joining the network will randomly connect to two or more of its neighboring nodes and instead of downloads the data packets from just one of its neighbors as is the case in the above two data replenishment schemes, it downloads data from all the neighboring nodes that it connects with and codes the downloaded data packets using the random linear network coding technique. By using this scheme we can prolong the duration for which the file will remain active in the network longer than the other two replenishment

16 6 FIGURE 1.2: Simple illustration of Random Linear Network Coding schemes mentioned above Our Strategy All of the above mentioned replenishment methods mainly focus on the different strategies for improving the data replenishment rates in P2P networks by using different coding techniques to achieve better replenishment rates, but none of these techniques focus on reducing the replenishment time to improve the performance of the P2P networks and in doing so it also increases the probability of successful data replenishment. Replenishment techniques that are commonly used today, all transfer the encoded data packets directly from the existing source nodes to the newcomer destination node and the new data is generated at the destination node only. Hence in this method the

17 7 total data transfer speed is essentially limited by the slowest link connecting the source nodes to the destination new node. This problem can be clearly explained by using the simple example that is given below. Consider a simple scenario in which a new node N connects with two existing source nodes A and B to download the data stored in these source nodes. The destination node then generates its own data by linear network coding the data downloaded form the source nodes A and B. Here the bandwidths between the three nodes of the network are R AN, R BN and R AB as shown in the figure below. FIGURE 1.3: (a) Represents the existing data replenishment method (b) Represents the proposed Fast Data Replenishment Technique. The figure 1.3(a) shows the packet flow route that is chosen by all the existing replenishment schemes mentioned above, here we can clearly see that all the existing replenishment methods only choose the most direct path between the source nodes to the destination node N and have no consideration of the bandwidth available between the source nodes A and B. This essentially limits the transmission speed of the nodes by the slowest link that is connecting the source nodes A and B to the destination node N. In our proposed method we also route some additional data packets through the link between the nodes A and B to reach the destination node N through the other source

18 8 node utilizing this unused bandwidth between the peers to increase the throughput and reduce the data replenishment time, thus improving the overall performance of the P2P Networks by increasing the probability of a successful replenishment before any of the nodes involved in the replenishment can depart the network.

19 9 2. BACKGROUND AND RELATED WORK 2.1. Network Coding Network coding is a traffic flow management technique introduced in the recent years, which has gained wide spread usage ever since it was first introduced by Ahlswede et. al., in the year 2000 [1]. Network coding is a technique where packets are encoded together at intermediate nodes and transmitted instead of simply forwording the packets of information that they receive from the source nodes towards the destination. Thus increasing the overall performance of the network and also reduce the congestion rates by reducing the traffic flow through the network. Another interesting fact about network coding is that using this technique we can achieve the maximum network capacity using some form of the random network coding techniques, while this is not usually possible with the traditional store and forward routing. [2]. The butterfly network given above is a simple example to illustrate the performance of network coding. In this example two packets A and B are to be sent to the two destination nodes as shown in the diagram. In the traditional approach we just send the two packets to each of the destination nodes, which requires four transmissions to complete the data transfer. In the network coding approach the packets A and B are sent to the destination nodes 1 and 2 directly and then a third packet A + B (network coding of A and B) is sent to the destination nodes thus reducing the number of required transmissions to only three transmissions to complete the data flow.

20 10 FIGURE 2.1: Simple Butterfly Network illustrating the network coding technique Linear Network Coding Traditionally all store and forward devices like the router, a node in P2P Networks or a node in an ad-hoc network will just relay the information that it has received to the destination node or another intermediate node. In network coding this node combines the information of the outgoing packets that it has received with the information packets that this node has generated or has received from another node and then forwards these new packets as outgoing packets in route to the destination node. Where the outgoing packets are a linear combination of the original packets present in that node. The linear network coding result of n bit packets will also have n bits only. [2]. The encoding and decoding process in the linear network coding scheme can be explained as given below. Assume that there are n original packets A 1, A 2,..., A n. which are generated by one or more source nodes in the network. Now each intermediate node present in the network generates new packets to forward by using linear network coding

21 11 to combine the original packets[16], [17]. m X i = g ij M j (2.1) j=1 The equation given above represents the encoding function in the linear network coding scheme where X i is the encoded packet and m is the number of original packets present in that node. g i1, g i2,..., g im are the coefficients which have been chosen from a finite field F n. The encoding node then includes the information about the coefficients (g ij ) in the header of these new packets and forwards these new packets to its neighbors. These encoding can be done recursively (i.e. the encoding process can be done on packets that have been already encoded). This operation can be repeated at any number of intermediate nodes present in the network and it will not affect the decoding process in the destination node. The decoding process of the linear network coding scheme is simple. Here let us assume that the destination node has already received a set of n packets. The decoding scheme retrieves the original packets by solving these n sets of linear equations. m (X i = g ij M j, i = 1, 2,...n) (2.2) j=1 The equation given above is used in the decoding processed where M i is unknown. That is the above given linear system has n encoded packets and m unknown variables. In order to recover all of the original data the receiver must have at-least received m linearly independent encoded packets (n m), i.e., the number of received packets must be at-least as large as the number of original packets. The most important aspect of this linear network coding scheme is how to select the linear combinations at each intermediate node of the network. A simple way to solve this problem is to let each node in the network select the coefficients uniformly at random over the field F n [3], which is completely independent and decentralized as shown in Figure

22 If the size of this field is large enough then the probability of the node selecting a combination that is linearly dependent will be very small and hence it is negligible. Hence by using this algorithm, the receiver will get enough number of independently encoded packets with high probability and small redundancy. That is it has a high probability of successfully decoding the encoded packets and retrieving the original data file. FIGURE 2.2: Random Linear Network Coding example.

23 13 The figure given above illustrates a simple example of random linear network coding in multicast scenario, where X 1 and X 2 are the original packets transmitted from the source node S. These data packets are received at the destination nodes E and F with network coding being performed at node B. The coefficients α i s are randomly chosen elements of a finite field F n Peer to Peer Data Streaming Peer to Peer system are raising in popularity with the increase in the number of internet users. The main reason for the increase in the usage of P2P systems is because of their ability to deliver large amounts of data at a significantly reduced cost. The most popular application of the P2P systems is the Bit-Torrent system [4]. In this system a Bit- Torrent file is partitioned into multiple distinct pieces. These pieces are then distributed among the peers present in the network to increase the receiving throughput as compared to the use of the centralized storage system in which all the data is stored in a single server which sends the pieces to multiple receivers which essentially limits the maximum speed at which the data can be sent. In P2P systems, since multiple peers store data a peer can receive multiple pieces of data from different peers in one time slot. In simple terms the Bit-Torrents can be viewed as a multi-sender multi-receiver system. The P2P systems also represent a simple scalable and cost effective alternative to traditional media streaming services enabling extended network coverage in the absence of IP multicast or expensive content distribution networks (CDN). The main drawback in using P2P systems for media streaming is that they do not provide any guaranteed support to the streaming services, hence these streaming systems must rely on self organized and adaptive network architectures to meet the stringent quality requirements of these systems.

24 Mesh Topology The Mesh topology is a simple network topology in which the nodes present in the network are self organized into a directed mesh. There are two types of mesh topologies a) Fully connected mesh topology and b) Partially connected mesh topology. The fully connected mesh topology is the one where every node in the network is connected to every other node that is present in the network as shown in the figure 2.3.(a) given below. The second type is the partially connected mesh network. In this type of a mesh network every node in the network is connected to one or more nodes present in that network as shown in the figure 2.3.(b) given below. FIGURE 2.3: (a) Fully Connected Mesh Topology. (b) Partially Connected Mesh Topology.

25 Linear Optimization Linear optimization is a mathematical modeling technique, which is used to obtain the optimal solution in resource allocation problems such as Production planning, optimizing packet flow in a network etc., The formulation of a linear programming problem requires a set of well-defined decision variables, with an objective function and a set of constraints. The objective function represents the aim or goal of the problem (i.e., decision variables), which has to be determined from the problem. Generally the objective in most cases would be to either maximize or minimize the decision variables based on the given set of constraints. The constraints are the set of limitations, and bounds that the variables cannot exceed Linear Programming Linear Programming is the process of transforming a real life problem into a mathematical model, which contains variables representing decisions that can be examined and solved for an optimal solution using algorithms. Linear programming problems are mainly concerned with the maximization or minimization of a linear objective function containing many variables subject to linear equality or inequality constraints. The General formulation of a linear programming problem is as given below n f(x) = c j x j = c T x (2.3) j=1 where c T x = c 1 x c n x n Subject to: n a ij x j b i for i = 1, 2,..., m. (2.4) j=1 x j 0 for j = 1, 2,..., n

26 16 here x j - variables that are to be optimized (i.e., Minimized or Maximized) c j - cost associated with each variable x j x j 0 is the non negativity constrain (i.e., the value of the variables cannot go below zero) a ij - coefficients of the functional constraints b i - amount of resources available The most Commonly used linear programming method is the Simplex method. Goerge B Dantzig is credited with creating the first solutions to linear programming problems using the Simplex Method in the year 1947 [5] The Simplex Method The simplex algorithm is an optimization algorithm, which is used to operate on the linear programs of the standard form. The simplex algorithm basically tackles linear programming problems that are too large to be handled by conventional means. This method simply uses the iterative process systematically to find out the maximum or minimum values defined by the objective function. The simplex method not only yields the optimal solution but also gains other valuable information to perform economic and what if analysis.

27 FIGURE 2.4: Flow graph of the Simplex Algorithm. 17

28 The basic operations of the simplex algorithm for solving linear optimization problems is given below: 18 The linear optimization problem given is first formulated into a system consisting of the objective function (OF) and its corresponding functional constraints. Here the objective function defines whether the given problem is a minimization problem or a maximization problem and optimizes it by altering the variables based on the functional constraints. The above defined system is then formulated into an initial tableau (i.e., in a matrix format in the form Ax = b). Calculate the initial best feasible solution (BFS). We then find the pivotal column in the initial tableau (it is the column with the most negative value in the objective function). If there are no negatives then the initial best feasible solution is the optimal solution. Find the ratios between the non-negative entries in the right hand side and the positive entries in the pivot column. If there are no positive entries, then there is no optimal solution for the problem. Now we find the pivotal row in the initial tableau (it is the row with the smallest non-negative ratio.) Here zero is also considered as a non-negative ratio. Now if identify the pivot element where the pivot row and pivot column meet. Return to step 4 and continue this operation until there are no more negatives in the bottom row. In the algorithm given above the first three steps are actually preliminary steps, which are used to setup the problem to be solved using the simplex algorithm. The

29 19 pivotal operation mentioned in the algorithm above is a geometrical operation of moving from one basic feasible solution to its adjacent feasible solution. This process is repeated until the optimal solution is found. The flow chart given below illustrates the functioning of the simplex algorithm.

30 3. BANDWIDTH BASED TRAFFIC FLOW OPTIMIZATION FOR P2P NETWORKS Introduction In the recent years the use of Pear to Pear (P2P) networks for information and video sharing in the internet has increased exponentially. This exponential growth has increased the need to improve the performance of these networks greatly. The P2P networks being a distributed storage and streaming network where peers share not only bandwidth but also storage, and computational resources between them. Given the nature of the P2P networks where peers can join or leave the network at any given time, results in the loss of data that is stored in these peers temporarily or permanently. Such data losses would result in the file becoming unusable. Hence it is important to develop techniques and protocols to help maintain sufficient redundancy levels, so that when a file is requested it will be available in the network irrespective of which peer leaves or joins the network. All the existing techniques for maintaining the data redundancy levels are some well known data replenishment techniques like the Random Linear Network Code, the Reed Solomon code and the Repetition code. All the above mentioned data replenishment schemes operate based on packet manipulation to ensure data replenishment by reducing the amount of traffic flow between the source and the destination node links, and maintain the redundancy levels, which in turn results in ensuring the data availability in the network for a prolonged period of time. However all the current replenishment mechanisms focus only on the techniques on how to replenish data to reduce the regeneration traffic, and to increase the lifetime of a piece of data stored in the system. Here, the data flow in these replenishment schemes is always the direct path between the source nodes and the destination node irrespective of the bandwidth capabilities associated with the peer links. Our scheme focuses on a fast

31 replenishment technique where the bandwidth capabilities of peer links are also taken into consideration and the traffic flow is optimized using the linear programming framework Fast Data Replenishment Scheme In a distributed storage network, to ensure the data reliability and availability, we need to minimize the data replenishment time to as little as possible. The less the replenishment time, more replenished data and higher the probability of a successful data replenishment before any of the peers involved in the replenishment processes can leave the network. Fast data replenishment results in the data file being preserved in the system without any data loss and it also increases the duration for which the file will remain active in the network. All the techniques involved in the data replenishment processes achieve it by reducing the network traffic flow between the peers and the newcomer destination node. Among all the different techniques replenish data in the P2P network the random linear network coding technique is the best as it is able to replenish the data much faster, compared to all the other data replenishment techniques. However even in the random linear network coding based replenishment scheme, the replenished data is always transferred directly from the existing peers to the newcomer destination node and the new data is generated at the destination node only. Therefore, the maximum number of packets that can flow through the peer links in these methods are limited by the slowest link that connects the source nodes to the newcomer destination node. In all distributed storage networks (specifically P2P Networks) there exists more than one path between the source and the destination nodes. In this work, we want to exploit any such alternate paths between the source and the destination nodes via other source nodes or peers and find an optimal packet flow route in which the data

32 22 replenishment is done in the shortest possible time Bandwidth Based Optimization scheme Distributed storage networks always have more than one path that connects the source and the destination nodes, but all the existing replenishment algorithms use the most direct route from the source to the destination irrespective of the bandwidth capabilities of the peer links found in the alternate routes. The replenishment time for all these replenishment schemes is limited by the link with the least bandwidth connecting the source and destination nodes directly. In the bandwidth based optimization method we exploit the unused bandwidth that exists between the peer links in the alternate paths between the source and the destination via other source nodes to improve the replenishment time. FIGURE 3.1: (a) Packet Flow in Direct Method. (b) Packet Flow in Bandwidth Based Optimization Method The bandwidth based traffic flow optimization problem consists of the source nodes and the newcomer destination node where all the nodes in the network are connected to every other node in the network (fully connected mesh network). Here the source nodes are the nodes that are already present in the network and have some data stored in them.

33 23 The newcomer destination node is the new node that is joining the network and does not have any data stored in it. To maintain the data redundancy levels in the distributed storage networks (P2P Networks) it is important to replenish the data from the source nodes to the newcomer destination node in the fastest possible time. Our optimization technique being a traffic flow regulation technique, it is independent of all the other replenishment schemes that are currently being used. This is one major advantage because this technique exploits the full bandwidth capacities of a distributed storage network by regulating the traffic flow through the bandwidths of the peer links to improve the replenishment time instead of focusing only on the direct link between the provider and the destination node as in the case of all existing data replenishment schemes. The bandwidth based optimization problem can be explained clearly by the following example. Consider the scenario that a newcomer destination node N, which connects to two existing source nodes A and B to replenish data by downloading the information that is stored in these nodes. It then generates its own data by using random linear network coding on the downloaded data from nodes A and B. Assuming link bandwidths between source and destination nodes are as shown in Figure 3.1. In the random linear code based replenishment scheme or any other data replenishment scheme that is currently being used, the destination node receives data from each source node directly as in Figure 3.1(a). In this scheme, the replenishment speed depends on the minimal edge connecting the destination node to the source node, which is 30KB/s on link A N. Thus, the bandwidth bottleneck on link A N limits the actual transmission rate during the replenishment process to 30KB/s only. Now if we allow the source node B to download data from source node A, and combine it with its own stored data then send to the destination node N. Using this updated scheme, the bottleneck link is A B with 40KB/s. It increases the actual transmission rate during the replenishment process to 40KB/s. We can clearly see

34 24 the improvement in replenishment speed if we utilize the available bandwidth between providers, which will reduce the replenishment time as well. The traffic flow method that is shown in Figure 3.1.(b) is optimal because it use the excess unused bandwidth between the source node A and source node B to transmit additional data to the destination via whichever node that can afford additional traffic flow, without essentially limiting the traffic flow between the source node to the destination node to the slowest node connecting the source nodes and the destination node as in the case shown in Figure 3.1.(a). By transmitting data via other source node instead of just transmitting the data directly from the source node to the destination node we greatly increases the throughput and reduce the replenishment time as it makes better utilizes the distributed bandwidth among the source and the destination nodes. For experimental purposes the packet size of the data packets used in bandwidth based optimization technique is kept very small and hence the delay time for the packet to reach the destination node via an intermediate node is proportionally small and hence neglected. In our model we have limited the traffic flow between the source and the destination is limited to a single hop transmission because multi-hop transfer greatly increases the packet loss rate the packet error rate and the propagation delay time. These factors negate any of the performance enhancements resulting due to the implementation of the multi-hop transmission scheme. The other constraint that we have applied in our bandwidth based traffic flow optimization scheme is that the destination node must have equal number of packets of all packet types at any given time. This equality constraint is implemented to enable the use of Random Linear Network Coding scheme to further improve the performance of the P2P network. If the equality constraint is not met, then the Random Linear Network Coding scheme will perform the mixing based on the smallest number of packets of a particular type. We will discuss this further in Section 3.3.1

35 General Case Bandwidth Based Optimization The general case bandwidth based optimization technique to optimize the traffic flow for an N node mesh network with one destination node and I source nodes (where I = N 1). In this type of a network every node is connected to every other node in the network with bi-directional communication capabilities between the nodes. Now we optimize the traffic flow in this network using linear optimization techniques such that equal number of packets of all packet types is received at the destination at any given time. FIGURE 3.2: N-node Mesh Network with one destination node.

36 26 The general case N-node mesh network given in Figure 3.2. consists of I source nodes (where I = N 1 and one destination node. The link R ij represents the maximum rate of traffic that can flow between the nodes i and j, and P (1) to P (i) represent the packet types present in the source nodes 1 to I respectively. The main objective of this bandwidth based optimization scheme is to receive equal number of packets of all packet types at the destination node at any given time. All the existing packet flow algorithms and replenishment schemes take the paths R 1N to R IN (most direct path between the source and the destination) as the preferred route for the traffic flow from the source nodes 1 to I to the destination node N respectively, without even considering all the other alternative paths that are available, their unused bandwidth capabilities and their potential to significantly reduce the replenishment time. The bandwidth based optimization scheme for fast data replenishment focuses on exploiting the bandwidth capacities of such alternate paths where the packet flow is routed via other source nodes (Peers) to significantly reduce the time required for data replenishment by increasing the throughput and in doing so increasing the probability of successful replenishment before any of the nodes involved in the replenishment leaves the network. Since this optimization scheme utilizes the alternate paths to reach the destination node via other source nodes we use the linear optimization technique to optimize the traffic flow between these nodes subject to certain constraints. The Packets that are traveling in the alternate path can travel through a maximum of one source node to reach the destination. This constrain is enforced to keep the packet loss rates and the packet delays to a minimum acceptable range. The second constrain is that the packet flow between the nodes is limited by the maximum available bandwidth R i,j between those nodes. The regulation of the packet flow in this type of a network using the linear optimization technique subject to the constraints given above for a N-node mesh network is explained below. The Figure 3.3 shows the difference in the packet flow of packet P (1) from its

37 source node 1 to its destination node N using the existing methods and the bandwidth based optimization method. 27 FIGURE 3.3: (a). Packet flow of packet type P (1) using the existing methods. (b). Packet flow of packet type P (1) using bandwidth based optimization method. The packet flow of packet type P (1) from the source node 1 to the destination node N takes the most direct path between the source and the destination in all of the existing methods which in this case is the path through the interconnect link R 1N and hence the data transfer rate of packet type P (1) is limited. But using the bandwidth based optimization technique we can increase the data transfer rate of packet type P (1) by sending these packets by exploiting the unused bandwidth available in the alternate paths where the packets are transferred via other source nodes to the destination node as shown in Figure 3.3.(b).

38 Linear Optimization for a N-node network The traffic flow in the bandwidth based optimization scheme is regulated using the linear optimization technique. Linear optimization is a mathematical modeling technique, which is used to find the optimal route for traffic flow in the given network, subject to certain constraints. The main parameters that we deal with in the bandwidth-based optimization technique are listed below: R i,j represents the maximum number of packets that flows between the nodes i and j per time slot. and P (1) i,j Actual number of packets of type P (1) that flows between the nodes i and j per time slot. P (2) i,j Actual number of packets of type P (2) that flows between the nodes i and j per time slot.... P (I) i,j Actual number of packets of type P () that flows between the nodes i and j per time slot. Where I = N-1 Here: P (x) i,j Represents the actual number of packets of type P (x) that flows between the nodes i and j per time slot. Where x = 1,2,3,..,I Goal: Maximize the number of received packets per time slot for the packet type with the mini-

39 29 mum number of packets. This objective is important as Random Linear Network Coding replenishment technique uses the same number of packets of different types for mixing. Thus the rate that can be generated from packet mixing is the minimal overall packet type rate. Constraints: The number of packets per time slot traverses a link cannot exceed the link capacity. These packets can take a maximum of one hop to reach the destination node. Based on the constrains given we can formulate our problem into a max-min optimization problem as shown in the equation (3.1). Optimization: max P (x) in [min( P (1) in, P (2) in, P (3) in,..., P () in, )] (3.1) The above equation can be re-written as: Where x = 1, 2, 3,..., n 1. max P (x) in [min( P (x) in )] (3.2) constraints: P (1) ij 0; P (2) ij 0; P (3) ij 0;... ; P () ij 0; and R ij x P (x) ij ; P (1) Xj P (1) jn ; P (2) Xj P (2) jn ; P (3) Xj P (3) jn ;... ; P () Xj P () jn ;

40 30 Where X - is the source node which contains all the packets of type X. N - is the final destination node Note that the total number of packets of type j is P j in. So the formulation in (3.1) is intuitively clear as it describes the maximization of the minimal rates over all the packet types. Furthermore, the constraints above are simply capacity constraints. We note that the problem above does not have the canonical form of a linear programming problem. However it can be easily transformed into multiple linear programming problems. Each can be solved separately, the results then can be combined. The main idea here is to pretend sequentially that each of the sum in the min is the actual minimum value. If it is, then it must be smaller than any other sum. We then use this fact as additional constraints. If there are n nodes, then we will have n different linear programming problems. We note that the objective for each problem will only have one max expression, and is of linear programming form. For optimization: Case(1) max... P (1) in P (1) in P (1) in P (1) in (Subject to all the constraints given above) And P (2) in ; P (3) in ; P () in ;

41 31 Case(2) max... P (2) in P (2) in P (2) in P (2) in (Subject to all the constraints given above) And P (1) in ; P (3) in ; P () in ; Case(3) max... n 1 P (3) in P (3) in P (3) in P (3) in (Subject to all the constraints given above) And P (1) in ; P (2) in ; P () in ;... Case(N-1) max... P () in P () in P () in P () in (Subject to all the constraints given above) And P (1) in ; P (2) in ; P (N 2) in ;

42 32 Here we choose the maximum value case as the optimal path for traffic flow, because it will produce better traffic flow routes as compared to the other cases without violating any of the constraints listed above node Bandwidth Based Optimization Example To fully understand the potential and benefits of the proposed bandwidth based traffic flow optimization using linear optimization scheme, let us consider a simple 4 - node P2P network as an example. In this example the nodes are mesh connected (i.e., every node in the network is connected to every other node in the network) which is as shown in the Figure 3.4 give below. Here the nodes 1, 2 and 3 are the source nodes and the node N is the destination node. Our goal here is to transmit the data in the source nodes to the destination node in the fastest possible time. The only constrain for this transmission being that the destination node must have equal amount of data from all the three source nodes at any given time. In all of the existing data replenishment schemes the traffic flow for such type of a network with the given constrain is essentially limited by the slowest link that is connecting the source nodes and the destination node N (i.e., min(r 1N, R 2N, R 3N )). But using the bandwidth based optimization scheme we can achieve much better throughput.

43 33 FIGURE 3.4: 4-Node Bandwidth Based Optimization. Let R 1N = 40kbps, R 2N = 60kbps and R 3N = 80kbps and R 12 = R 13 = R 32 = 50kbps. In this network the interconnect links are bi-directional full duplex links with equal bandwidth available in both directions. Now for this given scenario let us compare the performance of the existing replenishment methods to that of the bandwidth based replenishment scheme. For the network given above traffic flow using the existing replenishment techniques is essentially limited by the slowest link connecting the source and the destination nodes, which is 40kbps in this case. But using the bandwidth based optimization technique for data replenishment we can achieve a throughput of 60kbps as the traffic also flows in the alternate paths R 12, R 13 and R 23 which are ignored in all of the existing replenishment techniques. Hence by exploiting this unused bandwidth we increase the amount of traffic flow by 1.5times and proportionally reduce the replenishment time thus greatly enhancing the probability of a successful data replenishment.

44 34 FIGURE 3.5: 4-Node Bandwidth Based Optimization Example Optimization Function The Linear optimization of the traffic flow pattern in a 4 node network is formulated as given below: Optimization function: max[min( 3 P (1) i4, 3 P (2) i4, 3 P (3) i4 )] (3.3) Constraints: P (1) ij 0; P (2) ij 0; P (3) ij 0; and R 1N 3 x=1 P (x) ij ; P (1) 12 P (1) 24 ; P (1) 13 P (1) 34 ; P (2) 12 P (2) 14 ; P (2) 23 P (2) 34 ; P (3) 13 P (3) 14 ; P (3) 23 P (3) 24 ;

45 35 For optimization: Case(1) max P (1) i4 P (1) i4 P (1) i4 3 3 (Subject to all the constraints given above) and P (2) i4 ; P (3) i4 ; Case(2) max P (2) i4 P (2) i4 P (2) i4 3 3 (Subject to all the constraints given above) and P (1) i4 ; P (3) i4 ; Case(3) max P (3) i4 P (3) i4 P (3) i4 3 3 (Subject to all the constraints given above) and P (1) i4 ; P (2) i4 ; The matrix representation of the above given optimization problem can be written in the form Ax b as given below for the optimization constraints given in case(1):

46 P (1) 12 P (1) 13 P (1) 14 P (1) 24 P (1) 34 P (2) 12 P (2) 14 P (2) 24 P (2) 23 P (2) 34 P (3) 13 P (3) 14 P (3) 23 P (3) 24 P (3) R 14 R 24 R 34 R 12 R 13 R 12 R 23 R 13 R Based on the matrix given above we can obtain the optimal traffic flow routes by using the linear programming. The results of the optimal traffic flow pattern of the 4 node network is as given in the table 3.1 below. This table clearly shows that the packet flow rates of the 4 node network with optimization produces better results as compared to that of all the existing data replenishment methods, thus resulting in faster replenishment.

47 37 List of variables Packet Flow With optimization P (1) P (1) P (1) P (1) P (1) P (2) P (2) P (2) P (2) P (2) P (3) P (3) P (3) P (3) Packet Flow Without optimization P (3) TABLE 3.1: Packet Flow in a 4 node network with and without optimization Replenishment Time Analysis In the bandwidth based optimization technique that we discussed above we neglected the propagation delay (i.e., the time taken for a packet to flow from one node to another) because in this technique we consider the packet size to be very small and hence the delay is very small thus neglected. For the packet delay analysis we fix the packet size to be significantly large which in turn increases the propagation delay.

48 38 All the existing data replenishment algorithms will have low propagation delay because the traffic flow in these scheme is sent directly from source to the destination. The bandwidth based optimization scheme however tries to exploit the additional bandwidth that is available between the source nodes thus increasing the propagation delay, because the packets reach the destination by flowing through other source nodes. That is in this method the packet is to flow from node A (source node) to node N (destination node) via node B then the node B has to wait until it has received the full data packet from the node A before it can begin to transmit that packet to the destination node N. This wait time is called as the Propagation delay time. This delay time increases as the size of the data packet being transmitted is increasing thus resulting in the need for the time based optimization scheme. In this Replenishment time analysis we mainly focus on the size of the packet and the resulting propagation delay. Once the delay is computed for traffic flow between all the nodes in the network we use the linear optimization technique to find the optimal traffic flow route between the source nodes and the destination.

49 4. SIMULATION RESULTS AND PERFORMANCE EVALUATION 39 In this chapter, we show the simulation results that demonstrate that the bandwidth based traffic flow regulation using linear optimization techniques produces better replenishment rates as compared to the various replenishment schemes that are currently in use. Our Replenishment scheme also increases the probability of successful replenishment of the data before any of the nodes involved in the replenishment can leave the network Simulations Results for Bandwidth Based Optimization The Simulation setup is implemented using the MATLAB s Linear Optimization tool. Here we simulate a N node P2P network that consists of N 1 source nodes (existing nodes) and one destination nodes (newcomer nodes). Since data replenishment in P2P networks are done between neighbors where all neighboring nodes are interconnected our P2P network has a fully connected mesh network. The simulator complies with all the traffic flow constraints mentioned above. The bandwidth of each link present in the topology of the P2P network that is being simulated is chosen at random using uniform distribution or exponential distribution. In our simulations we implement a 3 node network to a 10 node network and compare the traffic flow rates between these networks for various bandwidth values. The simulations results of a 3 - node network to a 10 node network whose bandwidths were chosen at random between the limits specified below for R C and R D respectively. where R C - represents the interconnect links between the source nodes R D - represents the interconnect links between the source nodes and the destination node

50 40 The functioning of the simulator can be explained using a 3-node P2P network where node A and node B are the source nodes and the node N is the destination node, where R C represents the link R AB and R D represents links R AN and R BN as shown in the Figure 4.1. Now we select the bandwidths of the interconnect links in a random uniform distribution or random exponential distribution. This process is repeated for several different bandwidth values as illustrated in the table below. The simulation is repeated for the 4-node to 10-node networks. The tables given below illustrate the results for the traffic flow patterns in a 3-node to a 10-node networks. FIGURE 4.1: 3-Node Simulation Example.

51 41 The tables 4.1 and 4.2 given below shows the mean rate of packet flow for a 3-node to 10-node P2P network with and without optimization for R C < R D and R C > R D respectively. Here the R C and R D values are drawn randomly using uniform distribution. These tables clearly show that the packet flow rates are better in the traffic flow with optimization method than the existing methods. R C = packets per time slot and R D = packets per time slot No. Of Nodes Mean Rate of Packet Flow With optimization Mean Rate of Packet Flow Without optimization TABLE 4.1: Mean of Rate of packet flow with and without optimization for uniform distribution (R C < R D ) R C = packets per time slot and R D = packets per time slot No. Of Nodes Mean Rate of Packet Flow With optimization Mean Rate of Packet Flow Without optimization TABLE 4.2: Mean of Rate of packet flow with and without optimization for uniform distribution (R C > R D )

52 42 The tables 4.3 and 4.4 given below show the variance in packet flow for a 3 to 10 node P2P network with and without optimization for R C < R D and R C > R D respectively. The R C and R D values are drawn randomly using uniform distribution. The variance levels for the packet flow with optimization as compared to that of packet flow without optimization shows reduced variance in the traffic flow with optimization. R C = packets per time slot and R D = packets per time slot No. Of Nodes Variance of Packet Flow With optimization Variance of Packet Flow Without optimization TABLE 4.3: Variance of packet flow with and without optimization for uniform distribution (R C < R D ) R C = packets per time slot and R D = packets per time slot No. Of Nodes Variance of Packet Flow With optimization Variance of Packet Flow Without optimization TABLE 4.4: Variance of packet flow with and without optimization for uniform distribution (R C > R D )

53 43 The tables 4.5 and 4.6 given below show the mean rate of packet flow for a 3 to 10 node P2P network with and without optimization for R C < R D and R C > R D respectively. The R C and R D values are drawn randomly using exponential distribution. These tables clearly that the packet flow rates are better in the traffic flow with optimization method than the existing methods. R C = packets per time slot and R D = packets per time slot No. Of Nodes Mean Rate of Packet Flow With optimization Mean Rate of Packet Flow Without optimization TABLE 4.5: Mean of Rate of packet flow with and without optimization for exponential distribution (R C < R D ) R C = packets per time slot and R D = packets per time slot No. Of Nodes Mean Rate of Packet Flow With optimization Mean Rate of Packet Flow Without optimization TABLE 4.6: Mean of Rate of packet flow with and without optimization for exponential distribution (R C > R D )

54 44 The tables 4.7 and 4.8 given below show the variance in packet flow for a 3 to 10 node P2P network with and without optimization for R C < R D and R C > R D respectively. The R C and R D values are drawn randomly using exponential distribution. The variance levels for the packet flow with optimization as compared to that of packet flow without optimization show that the packet flow with optimization has greater variance indicating higher change in the traffic flow rates for different bandwidth values of the network. R C = packets per time slot and R D = packets per time slot No. Of Nodes Variance of Packet Flow With optimization Variance of Packet Flow Without optimization TABLE 4.7: Variance of packet flow with and without optimization for exponential distribution (R C < R D ) R C = packets per time slot and R D = packets per time slot No. Of Nodes Variance of Packet Flow With optimization Variance of Packet Flow Without optimization TABLE 4.8: Variance of packet flow with and without optimization for exponential distribution (R C > R D )

55 Replenishment Time Analysis The replenishment time analysis computes the average time taken for successful replenishment of data with and without optimization. The Figure 4.2 given below shows the difference in the replenishment time for traffic flow in a 10 node network with and without optimization, for a fixed packet size. The results given below clearly indicate the performance enhancement in the replenishment time of the 10 node network with optimization. FIGURE 4.2: Replenishment time for a 10 node network

AN ABSTRACT OF THE THESIS OF

AN ABSTRACT OF THE THESIS OF AN ABSTRACT OF THE THESIS OF Richard Edgecombe for the degree of Master of Science in Computer Science presented on March 17, 2008. Title: An Implementation of a Reliable Broadcast Scheme for 802.11 using

More information

Video Streaming with Network Coding

Video Streaming with Network Coding J Sign Process Syst (2) 59:39 333 DOI 7/s265-9-342-7 Video Streaming with Network Coding Kien Nguyen Thinh Nguyen Sen-Ching Cheung Received: 5 February 28 / Revised: 6 September 28 / Accepted: 9 January

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Topology basics. Constraints and measures. Butterfly networks.

Topology basics. Constraints and measures. Butterfly networks. EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS An Undergraduate Research Scholars Thesis by DENISE IRVIN Submitted to the Undergraduate Research Scholars program at Texas

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing Sanya Tangpongprasit, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba Graduate School of Information

More information

Network-on-chip (NOC) Topologies

Network-on-chip (NOC) Topologies Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance

More information

AN ABSTRACT OF THE THESIS OF. Krishnan Kolazhi for the degree of Master of Science in Computer Science

AN ABSTRACT OF THE THESIS OF. Krishnan Kolazhi for the degree of Master of Science in Computer Science AN ABSTRACT OF THE THESIS OF Krishnan Kolazhi for the degree of Master of Science in Computer Science presented on June 5, 2006. Title: Node and Topology Management for Content Distribution in Source Constraint

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

The History and the layers of the OSI Model 30 - October

The History and the layers of the OSI Model 30 - October THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

EECS 122: Introduction to Communication Networks Final Exam Solutions

EECS 122: Introduction to Communication Networks Final Exam Solutions EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead

More information

CMPSCI611: The Simplex Algorithm Lecture 24

CMPSCI611: The Simplex Algorithm Lecture 24 CMPSCI611: The Simplex Algorithm Lecture 24 Let s first review the general situation for linear programming problems. Our problem in standard form is to choose a vector x R n, such that x 0 and Ax = b,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Interconnection Networks: Topology. Prof. Natalie Enright Jerger

Interconnection Networks: Topology. Prof. Natalie Enright Jerger Interconnection Networks: Topology Prof. Natalie Enright Jerger Topology Overview Definition: determines arrangement of channels and nodes in network Analogous to road map Often first step in network design

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Combinatorial Optimization G. Guérard Department of Nouvelles Energies Ecole Supérieur d Ingénieurs Léonard de Vinci Lecture 1 GG A.I. 1/34 Outline 1 Motivation 2 Geometric resolution

More information

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016 Simulation Lecture O Optimization: Linear Programming Saeed Bastani April 06 Outline of the course Linear Programming ( lecture) Integer Programming ( lecture) Heuristics and Metaheursitics (3 lectures)

More information

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks Suranjit Paul spaul2@connect.carleton.ca Broadband Network Lab, Carleton University Acknowledgements

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Lecture 4 September 17

Lecture 4 September 17 CS 559: Algorithmic Aspects of Computer Networks Fall 2007 Lecture 4 September 17 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Sowmya Manjanatha In today s lecture, we discussed and characterized the

More information

Allows IGRP or Enhanced IGRP exterior routes to be advertised in updates.

Allows IGRP or Enhanced IGRP exterior routes to be advertised in updates. IGRP Commands Use the commands in this chapter to configure and monitor Internet Gateway Routing Protocol (IGRP). For IGRP configuration information and examples, refer to the Configuring IGRP chapter

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: Answers SUNet ID: root @stanford.edu Check if you would like exam routed

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking

More information

The Simplex Algorithm

The Simplex Algorithm The Simplex Algorithm Uri Feige November 2011 1 The simplex algorithm The simplex algorithm was designed by Danzig in 1947. This write-up presents the main ideas involved. It is a slight update (mostly

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Networks, Routers and Transputers:

Networks, Routers and Transputers: This is Chapter 1 from the second edition of : Networks, Routers and Transputers: Function, Performance and applications Edited M.D. by: May, P.W. Thompson, and P.H. Welch INMOS Limited 1993 This edition

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

UNIT- 2 Physical Layer and Overview of PL Switching

UNIT- 2 Physical Layer and Overview of PL Switching UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

NOTATION AND TERMINOLOGY

NOTATION AND TERMINOLOGY 15.053x, Optimization Methods in Business Analytics Fall, 2016 October 4, 2016 A glossary of notation and terms used in 15.053x Weeks 1, 2, 3, 4 and 5. (The most recent week's terms are in blue). NOTATION

More information

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 1 9 (2010) 1 Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless

More information

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University Congestion-aware Rate Allocation For Multipath Video Streaming Over Ad Hoc Wireless Networks Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering

More information

CSC 8301 Design & Analysis of Algorithms: Linear Programming

CSC 8301 Design & Analysis of Algorithms: Linear Programming CSC 8301 Design & Analysis of Algorithms: Linear Programming Professor Henry Carter Fall 2016 Iterative Improvement Start with a feasible solution Improve some part of the solution Repeat until the solution

More information

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed

More information

Configuring IGRP. The Cisco IGRP Implementation

Configuring IGRP. The Cisco IGRP Implementation Configuring IGRP This chapter describes how to configure the Interior Gateway Routing Protocol (IGRP). For a complete description of the IGRP commands in this chapter, refer to the IGRP s chapter of the

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC) Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid

More information

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach Received August 14, 2017, accepted September 18, 2017, date of publication September 27, 2017, date of current version October 25, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2757241 Caterpillar

More information

Lecture 3: Topology - II

Lecture 3: Topology - II ECE 8823 A / CS 8803 - ICN Interconnection Networks Spring 2017 http://tusharkrishna.ece.gatech.edu/teaching/icn_s17/ Lecture 3: Topology - II Tushar Krishna Assistant Professor School of Electrical and

More information

Methods and Models for Combinatorial Optimization Modeling by Linear Programming

Methods and Models for Combinatorial Optimization Modeling by Linear Programming Methods and Models for Combinatorial Optimization Modeling by Linear Programming Luigi De Giovanni, Marco Di Summa 1 Linear programming models Linear programming models are a special class of mathematical

More information

Big Data Management and NoSQL Databases

Big Data Management and NoSQL Databases NDBI040 Big Data Management and NoSQL Databases Lecture 10. Graph databases Doc. RNDr. Irena Holubova, Ph.D. holubova@ksi.mff.cuni.cz http://www.ksi.mff.cuni.cz/~holubova/ndbi040/ Graph Databases Basic

More information

What is linear programming (LP)? NATCOR Convex Optimization Linear Programming 1. Solving LP problems: The standard simplex method

What is linear programming (LP)? NATCOR Convex Optimization Linear Programming 1. Solving LP problems: The standard simplex method NATCOR Convex Optimization Linear Programming 1 Julian Hall School of Mathematics University of Edinburgh jajhall@ed.ac.uk 14 June 2016 What is linear programming (LP)? The most important model used in

More information

An iteration of the simplex method (a pivot )

An iteration of the simplex method (a pivot ) Recap, and outline of Lecture 13 Previously Developed and justified all the steps in a typical iteration ( pivot ) of the Simplex Method (see next page). Today Simplex Method Initialization Start with

More information

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 )

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) Abstract Traditionally, Content Delivery Networks (CDNs)

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Outline. CS38 Introduction to Algorithms. Linear programming 5/21/2014. Linear programming. Lecture 15 May 20, 2014

Outline. CS38 Introduction to Algorithms. Linear programming 5/21/2014. Linear programming. Lecture 15 May 20, 2014 5/2/24 Outline CS38 Introduction to Algorithms Lecture 5 May 2, 24 Linear programming simplex algorithm LP duality ellipsoid algorithm * slides from Kevin Wayne May 2, 24 CS38 Lecture 5 May 2, 24 CS38

More information

Erasure Codes for Heterogeneous Networked Storage Systems

Erasure Codes for Heterogeneous Networked Storage Systems Erasure Codes for Heterogeneous Networked Storage Systems Lluís Pàmies i Juárez Lluís Pàmies i Juárez lpjuarez@ntu.edu.sg . Introduction Outline 2. Distributed Storage Allocation Problem 3. Homogeneous

More information

High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS)

High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS) The University of Akron IdeaExchange@UAkron Mechanical Engineering Faculty Research Mechanical Engineering Department 2008 High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS) Ajay

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

Improving the QOS in Video Streaming Multicast

Improving the QOS in Video Streaming Multicast Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a

More information

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function

More information

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Material handling and Transportation in Logistics Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Introduction to Graph Theory Graph Theory As Mathematical

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information