Automated Planning for Open Network Architectures

Size: px
Start display at page:

Download "Automated Planning for Open Network Architectures"

Transcription

1 UNIVERSITY OF CALIFORNIA Los Angeles Automated Planning for Open Network Architectures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Alexey Rudenko 2002

2 The dissertation of Alexey Rudenko is approved. Gerald J. Popek D. Stott Parker Milos Ercegovac Greg J. Pottie Wesley W. Chu, Committee Co-chair Peter Reiher, Committee Co-chair University of California, Los Angeles 2002 ii

3 my mother Larisa my father Oliver and my sister Marina iii

4 Table of Contents Abstract. xvi 1. Introduction Motivation Deployment of new protocols Heterogeneous networks User application requirements Service for legacy applications Open Network Architectures Active networks Adaptation of data stream Planning for Active Networks Implementation of the Planner Road Map to the Dissertation Background on Active Networks Active Network Concept Architecture of Active Network Node Panda as an Active Network Middleware Panda Node Architecture Problems of Active Networks iv

5 3. Planning Alternatives The Requirements to Planning Temporal factor Consistency of adaptations Ordering of adapters User preferences as an element of planning Efficiency of the plan Extensibility of the system Resource management for planning Other problems Complexity of Planning Problem Physical model Observation on planning problem Estimation of the space of solutions NP-completeness Inefficiency of exhaustive search Naïve Planning Template Planning Heuristic Search Routing Around Network Resources Planning Automated Planning Incremental planning v

6 3.7.2 Central planning Distributed planning Where to run central planning Reuse of earlier computed plans Approach to planning for multicast communication Adapter Design Classes of adapters Adapters with flexible/rigid architecture Two-lever hierarchy of an access to adapters Summary Planning Protocol Requirements to the Planning Protocol Planning Protocol Design Where to Run the Plan Calculation Implementation of Planning Protocol in Panda User Preferences, Data Stream Characteristics, and Planning Data Planning Data Collection Calculation of a Plan Deployment of a Plan Incremental Planning Protocol Elements of Resource Management Assumptions on resource management. 67 vi

7 Detailed description of the resource management implementation Periodic decommissioning of inactive connections Replanning User Access to Resources Security in ONA Planning Classification of ONA planning insecurities Security of incremental planning protocol Untrustworthy ONA node for central planning protocol Secure central planning procedure Secure central planning protocol Poor quality and malicious design of adapters Security measures on adapter requests Electronic signatures with public key and key distribution Summary Planning Algorithm Heuristic Search Adapter selection in two-level adaptation database Adapter description data Adapter ordering Plan optimization Resources and temporal constraints Example of a Plan Calculation vii

8 5.2.1 Peer-to-peer communication session Adapter selection Adapter ordering Plan optimization Using Unary Model for the Plan Calculation Algorithm Summary The Measuremenst of Performance Performance of Heuristic Search-based Planning Costs of Incremental versus Central Planning Planning Process Test The testbed The latency of packet delivery and adaptation Planning procedure latency with the Connector application and null adapters Planning procedure latency with real life applications and adaptations Quality of service improvement The discussion on performance Related work ONA Implementations for ONA-aware Applications ONA Implementation for ONA-unaware Applications AI Planning Planning for ONA. 184 viii

9 8. Future work Change of Adapters Planning fails because no feasible or consistent plan found Connections failure Planning for Multicast Connection ONA Resource Management Secure Planning Protocol Alternative Path Planning Other Communication/Distributed Systems that will Benefit from Automated Planning Conclusion Contributions The Discussion. 195 Appendices 202 References. 218 ix

10 List of Figures 2.1 Active network node A Panda-enabled node Two-fold and four-fold data compression A unicast connection Estimation of solution space Peer-to-peer connection as a bunch of alternative plans Alternative plans for three-node connection Examples of naïve solutions Efficiency of planning Multicast tree planning Planning procedure Panda planning procedure Resource redistribution among sessions Add flow Reject flow Preemption flow Replanning of flow if another connection must be added Replan flow if extra resource are released Replanning if the network conditions changed Incremental planning procedure.. 82 x

11 4.11 The example of the exemption of an intermediate node(s) in planning data collection via tête-a-tête protocol Central planning procedure with UNC service UNC node does not approve a node as a trustworthy node The chain of signatures Selection of adapters, ordering of adapters, and location of adapters run sequentially Building a local plan The example of exhaustive search with evaluation The prototype partial order library plan for adapter ordering Resolution of a conflict between preconditions and postconditions Plan merging failures Peer-to peer communication through nodes A, B, C, D Adapting partial order plan for link AB Local plan for link AB Local plan for link BC and CD The chain of local plans on node A, B, C, and D ABC plan after merging AB and BC plans ABCD plan after merging ABC and CD plans Heuristic to exhaustive search time cost ration Heuristic search performance by adapters Heuristic search performance by nodes xi

12 6.4 Incremental versus central planning time cost Incremental versus central planning efficiency Panda peer-to-peer connection Packet delivery latency Adaptation latency Packet loss Throughput of Panda associated with packet size Sample of the distribution of packet latency on packet numbers Deployment without preloaded adapters Deployment with preloaded adapters Latency of the deployment protocol without adaptations Incremental planning and deployment latency Incremental versus central planning latency The number of packets sent under incremental plan before central plan is calculated and deployed The latency of pre-planning process Planning procedure latency for the Connector and WaveVideo applications Plan calculation latency for the Connector and WaveVideo applications Deployment latency for the Connector and WaveVideo applications Planning procedure latency on Dell Inspirons Plan calculation latency on Dell Inspirons Deployment latency on Dell Inspirons xii

13 6.25 Incremental planning latency on Dell Inspirons Incremental and central planning procedure (Resolution Drop only) on Dell Inspirons connection The number of packet sent under the incremental plan before the central plan is calculated and deployed Central replanning process on Dell Inspirons The comparison of adaptation latencies on Dell Inspirons and Hewlett Packard machines connections The planning procedure latency on Dell Inspirons and HPs The plan calculation latency on Dell Inspirons and HPs Deployment latency on Dell Inspirons and HPs The planning procedure latency on HPs Plan calculation latency on HPs Deployment latency on HPs Incremental planning latency for Resolution Drop for HPs Incremental planning latency for Resolution Drop and Encryption for HPs The number of packets sent under the incremental plan before the central plan was calculated and deployed Replanning procedure latency on HPs The plan calculation latency for Rat and VideoWave applications PSNR (luminance) on Dell Inspirons for 150 Kbps links PSNR (Cb) on Dell Inspirons connection for 150 Kbps 167 xiii

14 6.43 PSNR (luminace) on Dell Inspirons for 5000 Kbps PSNR (Cb) on Dell Inspirons for 5000 Kbps PSNR (luminace) on HPs for 150 Kbps PSNR (Cb) on HPs for 150 Kbps PSNR (luminace) on HPs for 5000 Kbps PSNR (Cb) on HPs for 5000 Kbps PSNR (luminance) on HPs The advantage of central planning over incremental planning PSNR (luminance) for incremental and central plans xiv

15 Acknowledgements This research would have not been possible without the expert guidance of my advisors, Dr. Peter Reiher and Dr. Gerald J. Popek. I also thank Dr. D. Stott Parker, Dr. Milos Ercegovac, Dr. Richard Muntz, Dr. Wesley Chu, and Dr. Greg J. Pottie for serving on my dissertation committee. I am also grateful for all the support provided by Dr. Richard Korf and Dr. Elias Koutsoupias and the members of LASR research group, especially Dr. Mark Yarvis, Vincent Ferreria, Scott Michel, Kevin Justice, and Li Jun. Generous financial support was provided by DARPA research contract N C I would also like to thank Janice Wheeler for helping me improve my writing style and for the careful proofreading of my papers and this dissertation. Of the many who encourage me, I especially want to thank Verra Morgan, Roberta Nelson, my mother Larisa, my father Oliver, my grandmother Anna, my sister Marina, and my friends. xv

16 Abstract of the Dissertation Automated Planning for Open Network Architectures by Alexey Rudenko Doctor of Philosophy University of California, Los Angeles, 2002 Professor Peter Reiher, Co-chair Professor Wesley W. Chu, Co-chair Open Network Architectures (ONA) is a relatively new technology for computer systems that allows dynamic deployment of services. The Internet is an obvious area that would benefit from fast deployment of protocols that can appropriately modify or reroute user data streams. ONA systems are meant to use the fast-growing computational resources of modern computer systems to lessen the load on the resources of network communication channels with their often-limited capacity. The balance between communication channels and execution resources depends on user application requirements and network conditions at the moment of the communication. Complex network conditions, in conjunction with temporal constraints, make the automatic choice of necessary measures for improving communications a highly desirable capability. Automatic planning of ONA services should be an important function of ONA. We propose an approach to the design of a planner for ONA. The approach is focused on the overwhelming number of problems of adaptation planning, such as feasibility and efficiency of a plan, extensibility and composability of adaptations, and temporal limits. The planner automatically calculates properly ordered sequences of xvi

17 adaptations that modify user data. The purpose of these modifications is to increase throughput, reliability, and safety of communication channels. The goal of the planner design is to be able to formulate a plan for real-time applications that are very sensitive to the latency of the handshaking phase of the connection. It uses the heuristic search for a plan calculation. The planner is targeted for use by ONA nodes. The actual implementation of this planner was done in Panda, active network middleware that serves adaptation-unaware applications. The latency of the planning algorithm is below 160 milliseconds for realistic cases, which is magnitudes faster than the exhaustive search. The planner was used to calculate plans equally as good as the heuristic search in at least 99% of tested cases. The resulting planning system can be used for adaptation planning in open network architectures, active networks, remote code invocation systems, etc. This dissertation describes the design, implementation, and performance of the ONA planner. xvii

FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN

FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN Approved by: Dr. Richard Barr Dr. Eli Olinick Dr. Marion Sobol Dr. Jerrell Stracener Dr. Stephen A. Szygenda FORMULATION

More information

ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY

ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY DELHI JUNE 2016 c Indian Institute of Technology Delhi (IITD), New Delhi, 2016.

More information

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study... vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST

More information

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page. CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)

More information

Panda: Providing the Benefits of Active Network to Legacy Applications

Panda: Providing the Benefits of Active Network to Legacy Applications Panda: Providing the Benefits of Active Network to Legacy Applications Abstract Kevin Eustice, Vincent Ferrerio, Richard Guy, V. Ramakrishna, Alexey Rudenko, and Peter Reiher 1. Introduction The continuing

More information

Report: A Comparison of Synchrophasor Protocols

Report: A Comparison of Synchrophasor Protocols J. Ritchie Carroll Grid Protection Alliance Report: A Comparison of Synchrophasor Protocols NASPI Fall Meeting Philadelphia, PA October 24, 2018 Abstract Paper compares three protocols used for continuous

More information

Q3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below.

Q3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below. Q1. What is DuitNow? DuitNow is a new real-time online fund transfer service that allows consumers and business owners to transfer money using an ID called DuitNow ID instead of having to exchange bank

More information

Content distribution networks over shared infrastructure : a paradigm for future content network deployment

Content distribution networks over shared infrastructure : a paradigm for future content network deployment University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :

More information

CITY UNIVERSITY OF NEW YORK. i. Visit:

CITY UNIVERSITY OF NEW YORK. i. Visit: CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the

More information

The Automatic Design of Batch Processing Systems

The Automatic Design of Batch Processing Systems The Automatic Design of Batch Processing Systems by Barry Dwyer, M.A., D.A.E., Grad.Dip. A thesis submitted for the degree of Doctor of Philosophy in the Department of Computer Science University of Adelaide

More information

Business Intelligence Roadmap HDT923 Three Days

Business Intelligence Roadmap HDT923 Three Days Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are

More information

Contents The Definition of a Fieldbus An Introduction to Industrial Systems Communications.

Contents The Definition of a Fieldbus An Introduction to Industrial Systems Communications. Contents Page List of Tables. List of Figures. List of Symbols. Dedication. Acknowledgment. Abstract. x xi xv xxi xxi xxii Chapter 1 Introduction to FieldBuses Systems. 1 1.1. The Definition of a Fieldbus.

More information

On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling

On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling by John Michael Chase A thesis presented to the University of Waterloo in fulfillment of the thesis requirement

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

An Ontological Framework for Contextualising Information in Hypermedia Systems.

An Ontological Framework for Contextualising Information in Hypermedia Systems. An Ontological Framework for Contextualising Information in Hypermedia Systems. by Andrew James Bucknell Thesis submitted for the degree of Doctor of Philosophy University of Technology, Sydney 2008 CERTIFICATE

More information

A Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana

A Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana School of Information Technology A Frequent Max Substring Technique for Thai Text Indexing Todsanai Chumwatana This thesis is presented for the Degree of Doctor of Philosophy of Murdoch University May

More information

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented

More information

Building Self-configuring Services Using Service-specific Knowledge

Building Self-configuring Services Using Service-specific Knowledge Building Self-configuring Services Using Service-specific Knowledge An-Cheng Huang December 2004 CMU-CS-04-186 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee:

More information

Remote Access Guide. https://remote.lghealth.org

Remote Access Guide. https://remote.lghealth.org Remote Access Guide https://remote.lghealth.org Created by: Joshua Steele Revision 1.0 7/14/2015 Table of Contents I. Remote Access using Internet Explorer... 2 II. Remote Access using Google Chrome...

More information

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE DISSEMINATING SECURITY UPDATES AT INTERNET SCALE Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email:

More information

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University

More information

Dissertation Formatting Rules. Basic Format

Dissertation Formatting Rules. Basic Format All doctoral students will follow APA (6 th edition) formatting for the narrative portion of the dissertation. Refer to this guide for rules specific to Missouri Baptist University dissertations. *Instructions

More information

Certificate Program. Introduction to Microsoft Excel 2013

Certificate Program. Introduction to Microsoft Excel 2013 Certificate Program We offer online education programs designed to provide the workforce skills necessary to enter a new field or advance your current career. Our Online Career Training Programs in the

More information

AN EFFICIENT FRAMEWORK FOR PERFORMING EXECUTION-CONSTRAINT-SENSITIVE TRANSFORMATIONS THAT INCREASE INSTRUCTION-LEVEL PARALLELISM

AN EFFICIENT FRAMEWORK FOR PERFORMING EXECUTION-CONSTRAINT-SENSITIVE TRANSFORMATIONS THAT INCREASE INSTRUCTION-LEVEL PARALLELISM Copyright by John Christopher Gyllenhaal, 1997 AN EFFICIENT FRAMEWORK FOR PERFORMING EXECUTION-CONSTRAINT-SENSITIVE TRANSFORMATIONS THAT INCREASE INSTRUCTION-LEVEL PARALLELISM BY JOHN CHRISTOPHER GYLLENHAAL

More information

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science

More information

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November

More information

VERIFICATION AND VALIDATION FOR QUALITY OF UML 2.0 MODELS

VERIFICATION AND VALIDATION FOR QUALITY OF UML 2.0 MODELS VERIFICATION AND VALIDATION FOR QUALITY OF UML 2.0 MODELS BHUVAN UNHELKAR, PHD WILEY- INTERSCIENCE A Wiley-lnterscience Publication JOHN WILEY & SONS, INC. Contents Figures Foreword Preface Acknowledgments

More information

Social Networks: Service Selection and Recommendation

Social Networks: Service Selection and Recommendation Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

Step 1: Download the Overdrive Media Console App

Step 1: Download the Overdrive Media Console App Step 1: Download the Overdrive Media Console App I. Tap the Play Store icon on your tablet. II. Using the Search Feature, Type Overdrive and select the first entry in the suggested apps list (it has an

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Storage Hierarchy Management for Scientific Computing

Storage Hierarchy Management for Scientific Computing Storage Hierarchy Management for Scientific Computing by Ethan Leo Miller Sc. B. (Brown University) 1987 M.S. (University of California at Berkeley) 1990 A dissertation submitted in partial satisfaction

More information

IP Camera Installation Brief Manual

IP Camera Installation Brief Manual I IP Camera Installation Brief Manual The purpose of this manual is to give you basic help how to successfully connect your camera(s) to the network and make the initial configurations. There is a whole

More information

Graduate School of Library and Information Science Spring Document Processing (LIS 450 )

Graduate School of Library and Information Science Spring Document Processing (LIS 450 ) Graduate School of Library and Information Science Spring 2000 Document Processing (LIS 450 ) Section DP Wednesday, 8 10:50 AM Room 143, Henry Building David Dubin Office: LIS 222 Office hours: Tuesdays,

More information

Requirements for Model Validation

Requirements for Model Validation Draft Need Requirements Application for Model Validation Reporting Requirements for Model Validation Reporting for Generators and Generator Control Systems Revision 0 Wednesday 16 November 2005 Prepared

More information

Volume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis

Volume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis Volume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis by Ulrich Neumann A dissertation submitted to the faculty of The University of North Carolina at Chapel Hill in partial fulfillment

More information

Corrective Action User Walkthrough: New Portal Login

Corrective Action User Walkthrough: New Portal Login Corrective Action User Walkthrough: New Portal Login The updated URL for the PST Portal is: https://apps.occeweb.com/pstportal There are five scenarios to consider if you are experiencing difficulty logging

More information

Albertson AP Calculus AB AP CALCULUS AB SUMMER PACKET DUE DATE: The beginning of class on the last class day of the first week of school.

Albertson AP Calculus AB AP CALCULUS AB SUMMER PACKET DUE DATE: The beginning of class on the last class day of the first week of school. Albertson AP Calculus AB Name AP CALCULUS AB SUMMER PACKET 2017 DUE DATE: The beginning of class on the last class day of the first week of school. This assignment is to be done at you leisure during the

More information

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON. DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

This Document is intended as a user guide for providers who are planning to use the eligibility check system.

This Document is intended as a user guide for providers who are planning to use the eligibility check system. [ELIGIBILITY CHECK USER GUIDE] This Document is intended as a user guide for providers who are planning to use the eligibility check system. Contents I. Introduction... 2 II. Purpose of Document... 2 III.

More information

Security Standards for Information Systems

Security Standards for Information Systems Security Standards for Information Systems Area: Information Technology Services Number: IT-3610-00 Subject: Information Systems Management Issued: 8/1/2012 Applies To: University Revised: 4/1/2015 Sources:

More information

TexConnect Online User Guide

TexConnect Online User Guide TexConnect Online User Guide TexConnect Online User Guide I. Log on.. 2 A. Create Password. 3 B. Reset Password... 4 II. Disclaimer... 5 III. Pool Information.. 6 IV. Transactions A. Deposit... 7 B. Withdrawal.

More information

Oracle RMAN for Absolute Beginners

Oracle RMAN for Absolute Beginners Oracle RMAN for Absolute Beginners Darl Kuhn Apress Contents About the Author Acknowledgments Introduction xvii xix xxi Chapter 1: Getting Started... 1 Connecting to Your Database 1 Establishing OS Variables

More information

Improving the QOS in Video Streaming Multicast

Improving the QOS in Video Streaming Multicast Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a

More information

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown Scheduling Algorithms for Input-Queued Cell Switches by Nicholas William McKeown B.Eng (University of Leeds) 1986 M.S. (University of California at Berkeley) 1992 A thesis submitted in partial satisfaction

More information

Introduction to PTC Windchill ProjectLink 11.0

Introduction to PTC Windchill ProjectLink 11.0 Introduction to PTC Windchill ProjectLink 11.0 Overview Course Code Course Length TRN-4756-T 8 Hours In this course, you will learn how to participate in and manage projects using Windchill ProjectLink

More information

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Department of Computer Systems Faculty of Information Technology University of Technology,

More information

Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018

Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Overview POSITION STATEMENTS Position Statements Purpose To document and analyze policy and/or standardized surveillance

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 An agent-based peer-to-peer grid computing architecture Jia

More information

ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES

ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES By STIAN FEDJE ABELSEN A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF

More information

Oracle BI 11g R1: Build Repositories

Oracle BI 11g R1: Build Repositories Oracle BI 11g R1: Build Repositories Volume I - Student Guide D63514GC11 Edition 1.1 June 2011 D73309 Author Jim Sarokin Technical Contributors and Reviewers Marla Azriel Roger Bolsius Bob Ertl Alan Lee

More information

Mechanism Design using Creo Parametric 3.0

Mechanism Design using Creo Parametric 3.0 Mechanism Design using Creo Parametric 3.0 Overview Course Code Course Length TRN-4521-T 1 Day In this course, you will learn about creating mechanism connections, configuring the mechanism model, creating

More information

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1 CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a

More information

Chapter 1 Introduction Motivation Approach Significance of Research Overview of Material... 5

Chapter 1 Introduction Motivation Approach Significance of Research Overview of Material... 5 ACKNOWLEDGEMENT First and foremost, I would like to thank my thesis advisor, Dr. A. Lynn Abbott, for his invaluable guidance and patience throughout my entire study at Virginia Tech. Beyond gaining academic

More information

Knowledge libraries and information space

Knowledge libraries and information space University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Knowledge libraries and information space Eric Rayner University

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO.

TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. vi TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. ABSTRACT iii LIST OF TABLES xiii LIST OF FIGURES xiv LIST OF SYMBOLS AND ABBREVIATIONS xix 1 INTRODUCTION 1 1.1 CLOUD COMPUTING 1 1.1.1 Introduction to Cloud

More information

USER GUIDE UTRADE ID Mobile for iphone & ipad

USER GUIDE UTRADE ID Mobile for iphone & ipad Table of Contents Recommended MOBILE TYPE... 2 DOWNLOAD UTRADE ID MOBILE FOR IPHONE & IPAD... 2 I How to run UTRADE Online Trading... 3 II How to sign OUT... 5 III How to monitor YOUR FAVORITE stocks...

More information

Mathematics Shape and Space: Polygon Angles

Mathematics Shape and Space: Polygon Angles a place of mind F A C U L T Y O F E D U C A T I O N Department of Curriculum and Pedagogy Mathematics Shape and Space: Polygon Angles Science and Mathematics Education Research Group Supported by UBC Teaching

More information

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY Thesis by Peter Anthony Leong In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute

More information

"Charting the Course... SharePoint 2007 Hands-On Labs Course Summary

Charting the Course... SharePoint 2007 Hands-On Labs Course Summary Course Summary Description This series of 33 hands-on labs allows students to explore the new features of Microsoft SharePoint Server, Microsoft Windows, Microsoft Office, including Microsoft Office Groove,

More information

"Charting the Course to Your Success!" MOC A Developing High-performance Applications using Microsoft Windows HPC Server 2008

Charting the Course to Your Success! MOC A Developing High-performance Applications using Microsoft Windows HPC Server 2008 Description Course Summary This course provides students with the knowledge and skills to develop high-performance computing (HPC) applications for Microsoft. Students learn about the product Microsoft,

More information

Efficient Index Maintenance for Text Databases

Efficient Index Maintenance for Text Databases Efficient Index Maintenance for Text Databases A thesis submitted for the degree of Doctor of Philosophy Nicholas Lester B.E. (Hons.), B.Sc, School of Computer Science and Information Technology, Science,

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

"Charting the Course... Agile Database Design Techniques Course Summary

Charting the Course... Agile Database Design Techniques Course Summary Course Summary Description This course provides students with the skills necessary to design databases using Agile design techniques. It is based on the Scott Ambler book Agile Database Techniques: Effective

More information

Bob Kahn s Conclusions at a DoD Conference

Bob Kahn s Conclusions at a DoD Conference Sep 12, BRUSSELS Bob Kahn s Conclusions at a DoD Conference IPv6 is under hyped (for what it really will do) Industry cannot make it happen DOD must return to leadership Richard Clarke, Special Advisor

More information

TECHNICAL TRANSLATION

TECHNICAL TRANSLATION TECHNICAL TRANSLATION Technical Translation Usability Strategies for Translating Technical Documentation JODY BYRNE University of Sheffield, UK A C.I.P. Catalogue record for this book is available from

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Privacy Preserving Data Sharing in Data Mining Environment

Privacy Preserving Data Sharing in Data Mining Environment Privacy Preserving Data Sharing in Data Mining Environment PH.D DISSERTATION BY SUN, XIAOXUN A DISSERTATION SUBMITTED TO THE UNIVERSITY OF SOUTHERN QUEENSLAND IN FULLFILLMENT OF THE REQUIREMENTS FOR THE

More information

Oracle BPM 10g R3 Programming 1 Essentials

Oracle BPM 10g R3 Programming 1 Essentials Oracle BPM 10g R3 Programming 1 Essentials Volume I Student Guide D55633GC10 Edition 1.0 March 2009 D58927 Authors Jill Moritz Kenny Somerville Technical Contributors and Reviewers Fernando Dobladez Carolina

More information

"Charting the Course... JNCIP-SP Class of Service / Multicast Bundle. Course Summary

Charting the Course... JNCIP-SP Class of Service / Multicast Bundle. Course Summary Course Summary Description This bundle combines Junos Class of Service (JCOS) and Junos Multicast Routing (JMR). JCOS COURSE OVERVIEW: This two-day course provides students with advanced class-of-service

More information

My sample dissertation title. Jo Student. A dissertation [choose dissertation or thesis] submitted to the graduate faculty

My sample dissertation title. Jo Student. A dissertation [choose dissertation or thesis] submitted to the graduate faculty My sample dissertation title by Jo Student A dissertation [choose dissertation or thesis] submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY

More information

CROSS-REFERENCE TABLE ASME A Including A17.1a-1997 Through A17.1d 2000 vs. ASME A

CROSS-REFERENCE TABLE ASME A Including A17.1a-1997 Through A17.1d 2000 vs. ASME A CROSS-REFERENCE TABLE ASME Including A17.1a-1997 Through A17.1d 2000 vs. ASME 1 1.1 1.1 1.1.1 1.2 1.1.2 1.3 1.1.3 1.4 1.1.4 2 1.2 3 1.3 4 Part 9 100 2.1 100.1 2.1.1 100.1a 2.1.1.1 100.1b 2.1.1.2 100.1c

More information

THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES

THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES AUTOMATIC EMPIRICAL TECHNIQUES FOR DEVELOPING EFFICIENT MPI COLLECTIVE COMMUNICATION ROUTINES By AHMAD FARAJ A Dissertation submitted to the Department

More information

Contents. Preface. 1 An Introduction to Web Engineering 1 Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger. 1.1 Motivation...

Contents. Preface. 1 An Introduction to Web Engineering 1 Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger. 1.1 Motivation... Gerti Kappel ftoc.tex V2 - March 31, 2006 4:11 P.M. Page v v Preface Forward xv xvii 1 An Introduction to Web Engineering 1 Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger 1.1 Motivation...

More information

A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE

A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE Chris Mattmann University of Southern California University Park Campus, Los Angeles, CA 90007 mattmann@usc.edu

More information

Oracle Data Integrator: Administration and Development Volume I Student Guide

Oracle Data Integrator: Administration and Development Volume I Student Guide Oracle Data Integrator: Administration and Development Volume I Student Guide D48459GC30 Edition 3.0 December 2007 D53463 Authors Laura Hofman Miquel FX Nicolas Technical Contributor and Reviewer Sharath

More information

Contributions to image encryption and authentication

Contributions to image encryption and authentication University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2003 Contributions to image encryption and authentication T. Uehara

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

Enterprise JavaBeans 3.1

Enterprise JavaBeans 3.1 SIXTH EDITION Enterprise JavaBeans 3.1 Andrew Lee Rubinger and Bill Burke O'REILLY* Beijing Cambridge Farnham Kbln Sebastopol Tokyo Table of Contents Preface xv Part I. Why Enterprise JavaBeans? 1. Introduction

More information

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of iv ACKNOWLEDGEMENT It is my pleasant duty to thank a large number of people for the various forms of help, encouragement and support that they have provided during the time I have been working on this

More information

MULTIMEDIA COMMUNICATIONS

MULTIMEDIA COMMUNICATIONS MULTIMEDIA COMMUNICATIONS Protocols and Applications Edited by: Franklin F. Kuo Wolfgang Effelsberg J.J. Garcia-Luna-Aceves To join a Prentice Hall PTR Internet mailing list, point to: http://www.prenhall.com/mailjists/

More information

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE Yau-Tsun Steven Li Monterey Design Systems, Inc. Sharad Malik Princeton University ~. " SPRINGER

More information

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934

More information

Sub: Invitation of sealed quotations for Procurement of UPS systems for MDI Gurgaon

Sub: Invitation of sealed quotations for Procurement of UPS systems for MDI Gurgaon Ref. No. : MDI/PROCUREMENT OF UPS SYSTEMS/2016 Date: July 6, 2016 Kind Attn: Dear Sir, Sub: Invitation of sealed quotations for Procurement of UPS systems for MDI Gurgaon Sealed Quotations are invited

More information

ITEC2620 Introduction to Data Structures

ITEC2620 Introduction to Data Structures ITEC2620 Introduction to Data Structures Searching and Sorting It is faster to search a sorted array What happens if our data set changes? We have to keep the array in sorted order Lecture 3b Linked-Lists

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DETECTING A MULTI-HOMED DEVICE USING CLOCK SKEW by Bryan J. Martin September 2016 Co-Advisor: Co-Advisor: Murali Tummala John C. McEachen Approved

More information

Introduction xvii. Assessment Test xxxiii

Introduction xvii. Assessment Test xxxiii Contents at a Glance Introduction xvii Assessment Test xxxiii Chapter 1 The Components of a Juniper Networks Router 1 Chapter 2 Interfaces 61 Chapter 3 Protocol-Independent Routing 107 Chapter 4 Routing

More information

4) Discuss on various types of software myths and the true aspects of these myths.

4) Discuss on various types of software myths and the true aspects of these myths. (DMSIT 21) ASSIGNMENT - 1, DEC - 2018. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) CMMI b) RAD model 2) Elaborate different requirement engineering tasks. 3) Discuss about class-based

More information

Thesis in a Box. Mark Andrew Paskin. B.A. Hon. (Cornell University) 1998 M.S. (University of California, Berkeley) 2000

Thesis in a Box. Mark Andrew Paskin. B.A. Hon. (Cornell University) 1998 M.S. (University of California, Berkeley) 2000 Thesis in a Box by Mark Andrew Paskin B.A. Hon. (Cornell University) 1998 M.S. (University of California, Berkeley) 2000 A dissertation submitted in partial satisfaction of the requirements for the degree

More information

BSynchro [E-AUTHORIZATION USER GUIDE] BSYNCHRO

BSynchro [E-AUTHORIZATION USER GUIDE] BSYNCHRO BSynchro 2014 BSYNCHRO [E-AUTHORIZATION USER GUIDE] This Document is intended as a user guide for providers who are planning to use the e-authorization system. Contents I. Introduction... 2 II. Purpose

More information

DLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014

DLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014 Case 2:13-cv-00193 Document 774-33 Filed in TXSD on 11/19/14 Page 1 of 10 An USE CASE SPECIFICATION ISSUE ELECTION CERTIFICATE Texas Department of Public Safety September 13 2013 Version 10 2:13-cv-193

More information

Contents. Excel 2013 Workbook... 1 Starting Excel The Startup Screen... 3 The Excel Screen... 4 Quick Access Toolbar...

Contents. Excel 2013 Workbook... 1 Starting Excel The Startup Screen... 3 The Excel Screen... 4 Quick Access Toolbar... Contents How to Use this Workbook... i BSBITU202A Create and use spreadsheets... ii BSBITU304A Produce spreadsheets... ix Files Used in this Workbook... xvi How to Download Exercise Files... xviii Office

More information

"Charting the Course... WebSphere Portal 8 Development using Rational Application Developer 8.5. Course Summary

Charting the Course... WebSphere Portal 8 Development using Rational Application Developer 8.5. Course Summary Course Summary Description This course will introduce attendees to Portlet development using Rational Application Developer 8.5 as their development platform. It will cover JSR 286 development, iwidget

More information

2.) ilit Welcome Screen

2.) ilit Welcome Screen 1.) ilit Login Page a. Single Sign On (VPN) if you are logged in the VPN (getting emails, etc.), no password will be required when you launch I-Lit. You will be taken directly to the welcome screen. b.

More information

PT310M: Contents. Preface... xiii. Lesson 1. Pro Tools HD Hardware Configuration... 1

PT310M: Contents. Preface... xiii. Lesson 1. Pro Tools HD Hardware Configuration... 1 PT310M: Contents Preface... xiii Using the DVD... xiii Prerequisites for This Course... xiii System Requirements... xiv Becoming Avid Certified... xiv Pro Tools Certification... xiv User Certification...

More information

HIGH PERFORMANCE CACHE ARCHITECTURES FOR IP ROUTING: REPLACEMENT, COMPACTION AND SAMPLING SCHEMES RUIRUI GUO

HIGH PERFORMANCE CACHE ARCHITECTURES FOR IP ROUTING: REPLACEMENT, COMPACTION AND SAMPLING SCHEMES RUIRUI GUO HIGH PERFORMANCE CACHE ARCHITECTURES FOR IP ROUTING: REPLACEMENT, COMPACTION AND SAMPLING SCHEMES By RUIRUI GUO A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR

More information

Particle Swarm Optimization Methods for Pattern. Recognition and Image Processing

Particle Swarm Optimization Methods for Pattern. Recognition and Image Processing Particle Swarm Optimization Methods for Pattern Recognition and Image Processing by Mahamed G. H. Omran Submitted in partial fulfillment of the requirements for the degree Philosophiae Doctor in the Faculty

More information