On Chemical and Self-Healing Networking Protocols
|
|
- Conrad Tyler
- 5 years ago
- Views:
Transcription
1 Oly those who attempt the absurd will achieve the impossible. I thik it is i my basemet... let me go upstairs ad check. M.. Escher ( ) O hemical ad Self-Healig Networkig Protocols PhD Thesis Presetatio Thomas Meyer omputer Sciece Departmet, Uiversity of Basel, Switzerlad December 17 th, 2010
2 The Iteret From Fuctioal to Dyamic halleges 2 Seemigly perfect packet delivery service: But very complex dyamical system: millios of computers / applicatios omplexity TP/IP addressig, reliable trasmissio aual growth rate: 30-40% Routig autoomic adaptio to topology chages Protocol Dyamics barely uderstood / side-effect labor cost = 18 x equipmet cost
3 The Iteret From Fuctioal to Dyamic halleges 3 But very complex dyamical system: Desired Properties for the future etwork: omplexity millios of computers / applicatios aual growth rate: 30-40% Protocol Dyamics barely uderstood / side-effect labor cost = 18 x equipmet cost predictable autoomic
4 omputer Networkig Micro/Macro Levels 4 Microscopic Level (fuctioal) Ether Ether IP TP Payload IP TP Payload Node (State Machie) Packet
5 omputer Networkig Micro/Macro Levels 5 Queue Macroscopic Level (dyamical) Packet Flow Microscopic Level (fuctioal) Ether Ether IP TP Payload IP TP Payload Node (State Machie) Packet
6 omputer Networkig Micro/Macro Levels No theory to combie microscopic executio ad macroscopic aalysis 6 Queue Macroscopic Level (dyamical) Packet Flow Microscopic Level (fuctioal) Ether Ether IP TP Payload IP TP Payload Node (State Machie) Packet
7 hemistry Same Micro/Micro Levels 7 Reactio (Flow) Macroscopic Level (dyamical) Molecule Microscopic Level (fuctioal) a O O O Reactio (Structural) a + O O O Molecule (Atoms)
8 hemistry Same Micro/Micro Levels Nature: Emergece of life-like system level properties 8 System Level self-orgaizatio, self-healig, self-* Reactio (Flow) Macroscopic Level (dyamical) Molecule Microscopic Level (fuctioal) a O O O Reactio (Structural) a + O O O Molecule (Atoms)
9 hemistry Same Micro/Micro Levels System level properties ca be explaied by microscopic iteractios 9 System Level self-orgaizatio, self-healig, self-* Reactio (Flow) Macroscopic Level (dyamical) Molecule Microscopic Level (fuctioal) a O O O Reactio (Structural) a + O O O Molecule (Atoms)
10 Mai otributios of this Thesis 10 hemical Metaphor for Networkig Packet = Molecule Protocol = Reactio Network
11 Mai otributios of this Thesis 11 Desig Aalysis Reactio Network Motifs Egieerig Framework Proofs I-Network omputatio Executio Egie Novel Packet Schedulig Method hemical Metaphor for Networkig Self-* Properties Self- Healig Self- Orgaizatio ogestio otrol Protocol Examples Multipath Routig
12 Outlie 12 Motivatio hemical Networkig Protocols Itroductory Example The hemical Metaphor hemical Protocol Egieerig Framework Applicatio ase: 3A A hemical ogestio otrol Algorithm Self-Healig Protocols Robustess to ode Deletio Applicatio ase: Self-Healig Lik-Load Balacig Protocol oclusios
13 Itroductory Example The hemical Metaphor State iformatio is represeted by the cocetratio of molecules 13 Node = Reactio Vessel Value = ocetratio Packet = Molecule
14 14 Itroductory Example The hemical Metaphor Reactios may cross vessel boudary; rate proportioal to cocetratio Reactio We may start with a arbitrary distributio...
15 Itroductory Example The hemical Metaphor The molecules are dispersed over the etwork 15 We always ed with a uiform distributio. The reactio system computes the average.
16 A Artificial hemistry for Networkig Formal Defiitio of the Disperser Protocol 16 Network Graph: G = (V, E)
17 A Artificial hemistry for Networkig Formal Defiitio of the Disperser Protocol 17 Network Graph: G = (V, E) Node: Reactio vessel: cotais a multiset of molecules
18 A Artificial hemistry for Networkig Formal Defiitio of the Disperser Protocol 18 Network Graph: G = (V, E) Set of Molecular Species: S = i, ij i V, (i, j) E Node: Reactio vessel: cotais a multiset of molecules
19 A Artificial hemistry for Networkig Formal Defiitio of the Disperser Protocol 19 Network Graph: G = (V, E) Set of Molecular Species: Node: Reactio vessel: cotais a multiset of molecules S = i, ij i V, (i, j) E Set of Reactio Rules: R = r ij (i, j) E r ij ij + i ij + j
20 A Artificial hemistry for Networkig Formal Defiitio of the Disperser Protocol 20 Network Graph: Node: Reactio vessel: cotais a multiset of molecules v = c x G = (V, E) v = c x Set of Molecular Species: S = i, ij Set of Reactio Rules: R = r ij (i, j) E i V, (i, j) E r ij ij + i ij + j Reactor Algorithm: A Law of mass actio scheduler reactio rate = product of the multiplicity of the reactat species v = c x v ij = c ij x i
21 Law of Mass Actio Scheduler Equilibrium 21 Number of Number of may molecules = high trasmissio rate Node Node Time [s] less molecules = low trasmissio rate Node Node Time [s]
22 Law of Mass Actio Scheduler Equilibrium 22 Number of Number of Node Node Time [s] Node Node Time [s] equal quatity = same reactio rate
23 Formal overgece Proof of the Disperser Protocol Write dow the differetial equatios: ẋ = x + x + x iflow x outflow 2. Fid the fixed poit: ẋ ocetratios do ot chage aymore at equilibrium: v = c x v = c x ˆx = ˆx + ˆx + ˆx local average v = c x ˆx i = j V ˆx j V global average 3. Show that the fixed poit is asymptotically stable Liearize system aroud fixed poit (Jacobia), show that the real part of all eigevalues are egative.
24 The hemical Egieerig Framework Two levels of graularity 24 Macro Level Abstract Distributed Reactio Network Abstract Model: Desig ad Formal Aalysis Micro Level hemical Protocol Software [matchp sed v2 ] []1000 Executio Model: Virtual Machie
25 hemical Protocol Software Fraglets A laguage to express distributed reactio etworks 25 Abstract Model (for desig / aalysis) Executio Model (etwork of Fraglets virtual machies) matchp sed 1 matchp sed 3 [sed 1 ] [sed 3 ]
26 hemical Protocol Software Fraglets A laguage to express distributed reactio etworks 26 Abstract Model (for desig / aalysis) Executio Model (etwork of Fraglets virtual machies) Fraglet = molecule = code/data fragmet = strig of symbols matchp sed 1 matchp sed 3 [sed 1 ] [sed 3 ]
27 Dyamic Equivalece: Executio Abstract Model 27 Abstract Model (for desig / aalysis) Executio Model (etwork of Fraglets virtual machies) matchp sed 1 matchp sed 3 [sed 1 ] [sed 3 ]
28 The hemical Egieerig Framework Two related levels of graularity 28 Macro Level Abstract Distributed Reactio Network Abstract Model: Desig ad Formal Aalysis Micro Level hemical Protocol Software [matchp sed v2 ] []1000 Direct Relatio Executio Model: Virtual Machie
29 The hemical Egieerig Framework Top-dow desig: Dyamics first, fuctioal aspects later 29 Macro Level Micro Level Abstract Distributed Reactio Network Desig Desig hemical Protocol Software [matchp sed v2 ] []1000 Abstract Model: Desig ad Formal Aalysis Executio Model: Virtual Machie
30 The hemical Egieerig Framework Rules ad motifs assist the desiger i sythesizig protocols 30 Desig Macro Level Abstract Distributed Reactio Network Rules (oservatio Laws) Motifs = Desig Patters Desig Micro Level hemical Protocol Software [matchp sed v2 ] []1000
31 The hemical Egieerig Framework Model of both, the protocol ad the uderlyig etwork 31 Desig Macro Level Abstract Distributed Reactio Network Rules (oservatio Laws) Motifs = Desig Patters hemical Models of Network ompoets Desig Micro Level hemical Protocol Software [matchp sed v2 ] []1000
32 Outlie 32 Motivatio hemical Networkig Protocols Itroductory Example / The hemical Metaphor hemical Protocol Egieerig Framework Applicatio ase: 3A A hemical ogestio otrol Algorithm Self-Healig Protocols Robustess to ode Deletio Applicatio ase: Self-Healig Lik-Load Balacig Protocol oclusios
33 ogestio otrol i the Iteret 33 Src 1 Router queue cogested lik Router Dest 1 Src 2 tail drop Dest 2 TP Reo: additive icrease, multiplicative decrease Tx Rate Src 1 badwidth fairess efficiecy Tx Rate Src 2
34 3A A hemical ogestio otrol Algorithm Feedback cotrol of the trasmissio rate 34 "widow" lost regeerate lost packets from seq. r. i AKs src k v ack dest v ic k W L v loss v ack Iteret D v tx k data packet (tagged with seq. r.) v loss
35 3A ompetig for Badwidth agaist TP Network topology for OMNeT++ simulatios 35 A Router queue cogested lik Router A TP c = pkt tail drop b = MBs d = ms TP
36 3A ompetig for Badwidth agaist TP OMNeT++ simulatio results 36 3 A TP Tx Rate hem. Tx Rate [pkt/s] A pkts Tx Rate TP Tx Rate [pkt/s] TP pkts Fairess/ Efficiecy Eciecy/Fairess b b/2 0 b b/2 badwidth b b competitio competitio badwidth b b 0 fairess eciecy... competitio. 0 Time [s]
37 3A + ompetig for Badwidth agaist TP OMNeT++ simulatio results of the improved algorithm 37 3 A + TP Tx Rate hem. Tx Rate [pkt/s] A + pkts Tx Rate TP Tx Rate [pkt/s] TP pkts Fairess/ Efficiecy Eciecy/Fairess b b/2 0 b b/2 badwidth b b competitio competitio badwidth b b 0 fairess eciecy... competitio. 0 Time [s]
38 Outlie 38 Motivatio hemical Networkig Protocols Itroductory Example / The hemical Metaphor hemical Protocol Egieerig Framework Applicatio ase: 3A A hemical ogestio otrol Algorithm Self-Healig Protocols Robustess to ode Deletio Applicatio ase: Self-Healig Lik-Load Balacig Protocol oclusios
39 Traditioal Self-Healig Architecture 39 Feedback cotrol by a exteral Healer module... Healer detect Healer Healer Healer System repair Problem: Ifiite regressio Who is healig the healer?
40 Populatio Dyamics: Balace of Growth ad Death 40 Growth Death populatio size reproductio populatio size limited lifetime limited resources time time populatio size equilibrium perturbatio time
41 Growth i Fraglets The Replicatig Quie Fuctioal Aspect: Self-Replicatig ode 41 A B [op fork fork fork match op ] Active Part match fork fork fork match op Blueprit fork fork fork match op [fork fork fork match op fork fork fork match op ] 2 [fork match op fork fork fork match op ]
42 Growth i Fraglets The Replicatig Quie Dyamical Aspect: Hyperbolic Growth 42 A B umber of A,B hyperbolic growth time Hyperbolic growth ot realistic: Resource (memory) is limited
43 Death i Fraglets Radom Dilutio Flux Memory is limited 43 A B Reactio vessel of fiite volume
44 Death i Fraglets Radom Dilutio Flux Memory is limited; populatio grows 44 umber of A,B vessel capacity Reactio vessel of fiite volume time
45 Death i Fraglets Radom Dilutio Flux Memory is limited; populatio grows util vessel capacity is reached 45 Dilutio Flux umber of A,B vessel capacity Reactio vessel of fiite volume time
46 Growth & Death ode Equilibrium hemical program is self-healig to the destructio of molecules 46. cocetratio... (B)lueprit (A)ctive removed As removed Bs time [s]
47 47 Quatificatio of the Replicatig Quie s Robustess Based o the phase-type distributio of the uderlyig Markov process Mea surv. time E [Tabs][y] (log) age of the uiverse aalytical (Neuts, ) empirical (Fraglets) Vessel capacity N [molecules]
48 Decoratig the Quie with Useful omputatio 48 Replicatig Quie Data-Processig Quie B Blueprit B Blueprit A Active Active D Data A R symbolic comp. Reward replicates autoomously replicates whe processig data
49 A Self-Healig Load-Balacig Protocol Forwardig Quies compete for data packets, replicate with AK rate 49 src v dest Q src, Path p (bw: ) Q dest v D src v v D dest Q src, Path p (bw: b = pkts) v
50 A Self-Healig Load-Balacig Protocol Packets are balaced proportioally to the Quies cocetratio 50 src v dest Q src, Path p (bw: ) Q dest v D src v v D dest Q src, Path p (bw: b = pkts) v Quie!"#$%&'(&$ coc. Tx!98"%<>:87?7= Rate [pkts/s] )$- 0.6 )$, 0.4 )$+ 0.2 )$* /A) 100 /)) 50 A) 0) 5'#"&2#" Remove 6"78!2&83'( 80% of. Quie / %0123("%/4 1 all 9889&:%0-);4 molecules. Quie * %0123("%*4 2! / %098D%>/4! * %098D%>*4 Path 1 Path 30 +) 40 A) 50,) 60 B) 70 -) "%<7= Time [s]
51 Outlie 51 Motivatio hemical Networkig Protocols Itroductory Example / The hemical Metaphor hemical Protocol Egieerig Framework Applicatio ase: 3A A hemical ogestio otrol Algorithm Self-Healig Protocols Robustess to ode Deletio Applicatio ase: Self-Healig Lik-Load Balacig Protocol oclusios
52 oclusios 52 The chemical egieerig framework helps to bridge the micro/macro gap i etworkig. Aalysis: Desig: Executio: Simplified formal aalysis of protocol dyamics Allows to realize ew protocol ideas easily, quickly, ad icremetally Law of mass actio scheduler promotes good equilibrium solutios Systemic Protocol Egieerig Approach Itegrated model for aalysis, desig, ad executio of protocols
53 Future Networkig Predictable ad/or autoomic distributed dyamical systems 53 hemical Networkig maually desiged protocols evolved, self-optimizig protocols Predictable Systems??? Autoomic Systems
54 Thak You! Questios?
Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]
Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationModel Based Design: develpment of Electronic Systems
Model Based Desig: develpmet of Electroic Systems Stuttgart 16 Jue 2004 Ageda Model Based Desig: purposes ad process Model Based Desig: vehicle developmet process Tools Fuctioal Requiremets: Structure
More informationQuality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationCS2410 Computer Architecture. Flynn s Taxonomy
CS2410 Computer Architecture Dept. of Computer Sciece Uiversity of Pittsburgh http://www.cs.pitt.edu/~melhem/courses/2410p/idex.html 1 Fly s Taxoomy SISD Sigle istructio stream Sigle data stream (SIMD)
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationTraffic Models and QoS
Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright
More informationn Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers
EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationMarkov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size
Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationFundamentals of Communication Networks
Politecico di Milao Scuola di Igegeria Idustriale e dell Iformazioe Fudametals of Commuicatio Networks Alessadro Redodi Teacher o Alessadro Redodi o Office: Dip. di Elettroica, Iformazioe e Bioigegeria
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationSolutions to Final COMS W4115 Programming Languages and Translators Monday, May 4, :10-5:25pm, 309 Havemeyer
Departmet of Computer ciece Columbia Uiversity olutios to Fial COM W45 Programmig Laguages ad Traslators Moday, May 4, 2009 4:0-5:25pm, 309 Havemeyer Closed book, o aids. Do questios 5. Each questio is
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationPETRI NETS GENERATING KOLAM PATTERNS
. Lalitha et al / Idia Joural of omputer Sciece ad Egieerig (IJSE) PETRI NETS GENERATING KOLAM PATTERNS. Lalitha epartmet of Mathematics Sathyabama Uiversity, heai-119, Idia lalkrish_24@yahoo.co.i K. Ragaraja
More informationarxiv: v2 [cs.ds] 24 Mar 2018
Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationEfficiency and Fitness of Embedded Flash Storage
The Idustrial Flash Storage Expert. Efficiecy ad Fitess of Embedded Flash Storage By Chaso Li Email: Chaso.Li@embestor.com EmBestor Techology Ic. http://www.embestor.com Sata Clara, CA 1 Outlie The Idustrial
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationUsing a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations
Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag
More information2. ALGORITHM ANALYSIS
2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times 2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times Lecture slides by Kevi Waye Copyright 2005 Pearso-Addiso
More informationTransforming Irregular Algorithms for Heterogeneous Computing - Case Studies in Bioinformatics
Trasformig Irregular lgorithms for Heterogeeous omputig - ase Studies i ioiformatics Jig Zhag dvisor: Dr. Wu Feg ollaborator: Hao Wag syergy.cs.vt.edu Irregular lgorithms haracterized by Operate o irregular
More informationDesigning a learning system
CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try
More informationCS644 Advanced Networks
Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot
More informationEnhancing Cloud Computing Scheduling based on Queuing Models
Ehacig Cloud Computig Schedulig based o Queuig Models Mohamed Eisa Computer Sciece Departmet, Port Said Uiversity, 42526 Port Said, Egypt E. I. Esedimy Computer Sciece Departmet, Masoura Uiversity, Masoura,
More informationDesign of efficient, virtual non-blocking optical switches
Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig
More informationData Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types
Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More information802.1ad Provider & Provider Edge Bridges
802.ad rovider & rovider Edge Bridges age rovider Bridge rovider Edge Bridge Customer Systems S-VLAN S-VLAN E E E E C-VLAN C-VLAN CE CE C-tagged C-tagged S-tagged port based B & BB models / 2006-0-0 budlig/multiplexig
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationA PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT
GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationCourse Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks
Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationOutline n Introduction n Background o Distributed DBMS Architecture
Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2010 Itake Semester 7 Examiatio CS4532 CONCURRENT PROGRAMMING Time allowed: 2 Hours September 2014
More informationLecture 1: Introduction and Fundamental Concepts 1
Uderstadig Performace Lecture : Fudametal Cocepts ad Performace Aalysis CENG 332 Algorithm Determies umber of operatios executed Programmig laguage, compiler, architecture Determie umber of machie istructios
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationSwitch Construction CS
Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationCost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.
ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU
More informationUniversity of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani
Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442
More informationOutline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs
Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio
More informationArithmetic Sequences
. Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationNormal Distributions
Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationCMSC Computer Architecture Lecture 3: ISA and Introduction to Microarchitecture. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 3: ISA ad Itroductio to Microarchitecture Prof. Yajig Li Uiversity of Chicago Lecture Outlie ISA uarch (hardware implemetatio of a ISA) Logic desig basics Sigle-cycle
More informationIntroduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationLazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999
Lazy Type Chages i Object-orieted Database Sha Mig Woo ad Barbara Liskov MIT Lab. for Computer Sciece December 1999 Backgroud wbehavior of OODB apps compose of behavior of persistet obj wbehavior of objects
More informationCluster Computing Spring 2004 Paul A. Farrell
Cluster Computig Sprig 004 3/18/004 Parallel Programmig Overview Task Parallelism OS support for task parallelism Parameter Studies Domai Decompositio Sequece Matchig Work Assigmet Static schedulig Divide
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationTowards Efficient Selection of Web Services
Towards Efficiet Selectio of Web Services Amir Padovitz School of Computer Sciece & Software Egieerig, Moash Uiversity Padovitz@bigpodcom Shoali Krishaswamy School of Computer Sciece & Software Egieerig,
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationCMSC Computer Architecture Lecture 5: Pipelining. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 5: Pipeliig Prof. Yajig Li Uiversity of Chicago Admiistrative Stuff Lab1 Due toight Lab2: out later today; due 2 weeks from ow Review sessio this Friday Turig award
More informationWeb Text Feature Extraction with Particle Swarm Optimization
32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationThe Idea. Leader Election. Outline. Why Rings? Network. We study leader election in rings. Specification of Leader Election YAIR. Historical reasons
The Idea Leader Electio Network We study leader electio i rigs Why Rigs? Outlie Specificatio of Leader Electio Historical reasos origial motivatio: regeerate lost toke i toke rig etworks Illustrates techiques
More informationAbstract. Chapter 4 Computation. Overview 8/13/18. Bjarne Stroustrup Note:
Chapter 4 Computatio Bjare Stroustrup www.stroustrup.com/programmig Abstract Today, I ll preset the basics of computatio. I particular, we ll discuss expressios, how to iterate over a series of values
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationImage Analysis. Segmentation by Fitting a Model
Image Aalysis Segmetatio by Fittig a Model Christophoros Nikou cikou@cs.uoi.gr Images take from: D. Forsyth ad J. Poce. Computer Visio: A Moder Approach, Pretice Hall, 2003. Computer Visio course by Svetlaa
More informationEE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering
EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors
More informationAlgorithm. Counting Sort Analysis of Algorithms
Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will
More informationLecture 2: Spectra of Graphs
Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad
More informationLecture 1: Introduction
Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)
More informationCMSC Computer Architecture Lecture 2: ISA. Prof. Yanjing Li Department of Computer Science University of Chicago
CMSC 22200 Computer Architecture Lecture 2: ISA Prof. Yajig Li Departmet of Computer Sciece Uiversity of Chicago Admiistrative Stuff Lab1 out toight Due Thursday (10/18) Lab1 review sessio Tomorrow, 10/05,
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationEnergy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationDesigning a learning system
CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationHeaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder
More informationMinimum Spanning Trees
Miimum Spaig Trees Miimum Spaig Trees Spaig subgraph Subgraph of a graph G cotaiig all the vertices of G Spaig tree Spaig subgraph that is itself a (free) tree Miimum spaig tree (MST) Spaig tree of a weighted
More informationLecture 13: Validation
Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More information