Analytical Model for Voice over IP traffic characterization

Size: px
Start display at page:

Download "Analytical Model for Voice over IP traffic characterization"

Transcription

1 Analytical Model for Voice oer IP traffic characterization A.E.GARCÍA 1, K. D. HACKBARTH 1, A. BRAD 2, R. LEHERT 2 1 Telematic Engineering Grou of Communication Engineering Det. 2 Institut für achrichtentechnik Uniersity of Cantabria A. los Castros s/n, Santander (Cantabria), Tel: , Fax: SPAI agarcia@tlmat.unican.es htt:// Abstract: - The scoe of this aer is to derie a set of simle formulas to dimension irtual aths in IP/ATM acket networks that carry comressed oice traffic. The roject further gies an oeriew of oice oer acket technology with a secial focus on oice oer IP and its most rominent standard ITU-T H.323. After introducing a network model for oice oer acket networks, the dimensioning formulas for the communication alication are deried for two different leels: call and burst leel. The obtained formulas for acketized oice serices are alidated with the use of the simulation software OPET. Key-Words: - Voice oer IP, Internet telehony, Traffic modeling, network simulation. 1 Introduction Voice transmission has more than enough networks tyically based on ackets like for examle IP, ATM or Frame-Relay are winning ositions regarding traditional circuit switching networks as PST and ISD. Basically we can consider two reasons that they hae taken to the necessity of carrying out the integration of oice in acket networks. On one hand reduction of the costs comes gien by the best use in bandwidth that is made in these networks. This fact is translated in the case of oice in code outlines and efficient oice comression, silences comression, and the ossibility of carrying out statistical multilex. On the other hand new serices aears, secially based on IP, indeendent to the network technologies and user's latforms, see [1]. We are this way scenarios of such serices as multimedia data oer single line, ideoconference, multicasting, CCA's (Call Center A.), unification of messages, etc. Crucial oints so that comanies accet to use of IP oice serices it has more than enough they are fundamentally their readiness, qualities comarable to the ublic serice of oice, the reliability, and their manageability [2]. This way, client of business waits some concrete arameters of quality of serice [3], at least comarable to that of traditional serices. 2 Voice oer IP For technologies of such comressed oice as oice oer IP (VoIP), oice oer ATM (VoATM) and oice oer Frame-Relay (VoFR), different standard exist. 2.1 ITU-T H.323 Denominated "Systems for multimedia communications based on ackets", it is art of the family of standard H.32x that secify the serices of multimedia communication on different networks, as ISD (H.320) or BB-ISD (H.231 and H310). H.323 is not secific of IP, so that it can be used by IPX or AleTalk. Howeer, it makes use of IETF standards: RTP (Real Time Protocol) and RTCP (Real Time Control Protocol). It describes all the entities of a system H.323:!"Terminals: roide full-dulex connections in real time, oint to oint and oint-multioint, being able to be comuters or secial deices as ideohones.!"gateway: allows the interconnection with other terminal (H, PST or ISD).!"GateKeeer: roides the admission control and addresses translation serices on terminals, gateways and MCUs.!"Multioint Control Unit (MCU): gies suort for multioint conferences. 3 etwork and network layer model To carry out the modeling of the network we can leae of a scenario where a number of users of a cororate network can establish oice calls by means of the connection through a VoIP gateway and a sulier of VoIP serice. Gateway includes a IP router that guides the calls carried out in Internet toward a VoIP gateway of the PST network in which the destination telehone is located. Voice is comressed in client's art using G.729 recommendation with silences comression, what

2 means that ackets will only be transmitted to the gateway and Internet when oice actiity is detected. During oice actiity a fixed number of audio samles is either acked in RTP, UDP or IP, taking a size of deterministic ackets. Protocols stack would be the corresonding to H323 standard: 5: Session H.323 4: Transort RTP/UDP RTCP/TCP /RSVP 3: etwork IP IP 2: Link (MLPPP/FR /ATM-AAL 1) (MLPPP/FR /ATM-AAL 1) 1: Physical (SET) (SET) Table 1 : Stack for H.323 oerip terminal 4. Analytic models for oice serices In general, analytic models can be diided in three different scale leels: call leel, burst leel and cell/acket leel. In this study call leel will be used to determine the number of irtual connections that they are necessary under a robability of gien loss. In the burst leel bandwidth will be calculated for each one of these connections, being obtained the width of uialent band for the oice transort through a irtual channel VBR. If this bandwidth was multilied by the number of established irtual channels at the call leel, it will be a good estimate of the width of global band. This estimation will be alidated ia the simulation in the next chater Call leel The VoIP gateway described in the reious chater can be characterized as a ure loss system because calls will only be acceted as long as there are free orts for the calls aailable. Thus a traffic model would look like the following: A R 1 2 S Fig. 1: Traffic model for call leel Origin of calls is characterized random when in a ery short time interal!t"0 three conditions are true:!"stationarity: robability for one call in this time interal tends to #!t indeendent of t with λ=const.!"single arrials: robability that more than one call arries in a ery small time interal tends to zero i.e. no batch arrials. Y!"Call indeendence: each call originates indeendent from other calls Assumtion of random call arrials is reasonable if the number of otential callers is large. With this assumtion call arrial rocess with the offered traffic A=λ t is oissonian. The number of serers (=orts) s is finite, therefore call losses can occur and offered traffic A is the sum of carried traffic Y and lost traffic R. The calls shall be sered first-in first-out (FIFO). If also call termination is considered as random, serice time can be assumed exonentially distributed, which agrees fairly well with actual telehone conersation times [1]. With that gien descrition of the call leel traffic system it can be classified using the Kendall notation as a M/M/s(0), that is Poissonian inut rocess, exonential serice (call holding) times, s serers and no waiting room. Traffic tye in this system is firstorder random traffic also known as Erlang-traffic. We are only interested in the steady state of the system, so we can derie formulas from global balances of the steady state transition diagram of the M/M/s(0) system: λ λ λ λ 0 1 r-1 r r+1 s-1 s µ rµ (r+1)µ sµ Fig. 2: M/M/s(0) steady state transition diagram Erlang formula will be used to determine the number of irtual channels under a gien loss robability. This loss robability P r is ual to the blocking robability P B = P(all connections are busy) = P(i=s) because of PASTA roerty (=Poisson Arrials See Time Aerage) of Poisson streams [4] which leads to the Erlang B formula. For the determination of the number of lines r needed for a gien loss robability recurrence formula is used iteratiely Burst leel On-Off oice model Multimedia traffic is ery bursty in nature and simle models as the Poisson rocess do not cature the imortant characteristics of these sources. To model bursty traffic sources different aroaches are aailable many of them using Marko modulated rocesses (MMP). These are doubly stochastic rocesses in which each state of states of embedded marko chain originates another stochastic rocess. If this originated rocess is a Poisson rocess the MMP is called Marko modulated Poisson

3 rocess (MMPP), if it is deterministic it is a Marko modulated deterministic rocess (MMDP). One secial case that is ery suitable to model oice sources is the On-Off model. This is a MMDP with only 2 states as shown in the following figure: OFF Fig. 3: On-Off model According to the On-Off model signal stream of a single source is modeled through an alternating suence of burst and silence eriods. Duration times of burst and silent eriods are exonentially distributed with mean t =1/$ and t OFF =1/% resectiely. During the burst eriod ackets with fixed length are generated with constant interarrial time!t. Some studies hae roosed t =0.4 sec and t OFF =0.6 sec [5], setting the transition rates to $=1.6 and %=2.5. Steady state robabilities can easily be deried from balance uations of aboe grah: OFF =%/($+%)=0.6 and =$/($+%)=0.4. In the actie state ackets are generated with constant seed =L/!t (-eak rate) with L as the acket length and!t as the constant acket interarrial time. This is also deicted in the next figure: t =0.4 sec t=const t +t OFF = 1 sec t OFF =0.6 sec time Fig. 4: On-Off oice acketization Each generated oice acket with two G.729 audio frames has a fixed length of 20 bytes audio + 40 bytes oerhead = 60 bytes, generated eery 20 msec. So the eak bit rate of oice source in actie state is = bs or k = 50 ackets/sec. Aerage data rate is E() = = 9600 bs and the standard deiation. (1) σ () = (1- ) bs = Aggregating On-Off sources The multilexing of indeendent On-Off sources is outlined in the figure 5. Each source generates bits/sec in it s actie state. Aggregated data rate would be in the CBR source case. source 1 2 E() = buffer serer C = ε > E() Fig. 5: Multilexing of On-Off sources Because of silence comression, one can rofit from statistical multilexing gain so that the needed serer caacity C will be C = ε with ε as the number of uialent CBR sources. If k indeendent oice sources are actie with robability, (-k) sources are inactie with OFF = (1- ). Further there are ( oer k) ossibilities for choosing k elements out of. Thus the robability of k actie sources follows a binomial distribution: (2) In the mean E(k) = sources are actie so the aerage data rate generated by sources is E() = E(k) =. Therefore ε should satisfy the condition ε > E(k) =. If serer caacity is less than otential maximum source data rate an oerload condition can aear. Under this condition serer buffer will be filled and if no more buffer sace is aailable acket loss occurs. This can also be deried from Marko chain of M()/M/ binomial source model. If the serer roides caacity for ε sources with S u < ε < S o all states from S o to cause oerload. (-1) (-s u) s u s o -1 2 s o 2 s u s o (-1) Fig. 6: M()/M/ state transition diagram Oerload robability is calculated as the robability that they are more oice sources actie than caacity is aailable: P = P ( k > C) = i i ( 1 ) i ol (3) i= C + 1 with C as the serer (=backbone) caacity in number of sources, k as the number of actie sources and as the total number of sources. ote that for ure loss systems without buffers oerload robability becomes loss robability of the system. In the following we will assume a ure loss system. To take into account loss robability as a function of and the number of sources, serer caacity

4 must be augmented by a correction alue γ(p B,,). This γ can be interreted as a multilier of standard deiation of aggregated data stream. Corresonding formulas are deried below: (4) C = E( ) + γ ( PB,, ) σ ( ) = ( + γ ( PB,, ) (1 )) (5) C = = E ) + γ( P,, ) σ( ) = + γ( P,, ) (1 ) (6) (7) ( B B C C = = = = + γ ( PB,, ) CCBR const lim = lim( + ) = (1 Resectiely, total caacity of aggregated binomial sources in bs, total number of uialent circuits for sources in units, uialent caacity for one binomial source in units, and limiting behaiour of the uialent caacity. For a great number of sources uialent caacity of one source conerges against it s actie robability =40% esecially for great loss robabilities that go along with small γ alues. As an examle for 1000 sources under P B =0.1 needed number of uialent circuits is 420 which gies us a uialent caacity of 42%. Theoretically slowly conerges against with 1 / Poisson source with waiting system model M/M/1(m) In the first analytic model a ure loss system was resented which gae an exression to estimate the needed bandwidth of a acket oice backbone. ow we introduce a system buffer of size m to estimate further QoS arameters such as mean waiting time and mean queue length. This will allow a comarison with the alues obtained by simulation. To model the bursty traffic of On-Off sources in the waiting system, a simlification of the source behaiour will be done. The On-Off source in the reious chater was modeled with exonentially distributed actie and silence eriods with the mean alues t and t OFF resectiely. ow the burst length t and the burst interarrial time t +t OFF will be considered as exonentially distributed. This allows aroximating the system as M/M/1(m) and aoids comlicated models such as MMPP/E k /1(m), which are used in literature, see e.g. [4], [5]. The addition of two exonential distributions with mean t and t OFF and ariances t 2 and t OFF 2 leads to a hyoexonential distribution with the mean alue t +t OFF and the ariance t 2 +t OFF 2. Because we assume burst interarrial time as exonentially distributed with mean t +t OFF = 1 sec and not as hyoexonentially distributed, we oerestimate the ariance with (t +t OFF ) 2 = 1 sec 2 in comarison to the correct alue of the ) hyoexonential distribution with ariance t 2 +t OFF 2 = 0,52 sec 2. Therefore this model will also oerestimate the needed caacity and gies a essimistic scenario, which makes sure that results remain useful Aggregating the modified On-Off sources Multilexing of modified On-Off sources leads to an aggregated arrial rate of λ= bursts/sec. Serice rate µ of the system is a function of the mean burst length E(L) and the serer caacity C as shown in the traffic system model for M/M/1(m): λ E(L) P B m Fig. 7: M/M/1(m) traffic model Formulas for the QoS arameters of M/M/s(m) and their deriation can be found in any traffic theory book, e.g. [4]. System behaes like a M/M/1 system with infinite buffer when the buffer size is ual or greater than Cell/Packet leel In IP/ATM networks signal stream of a MMM or an On-Off source is normally not encasulated in only one acket but a suence of ackets or cells. Therefore cell leel ruires more sohisticated models such as semi-marko models, fluid models or Marko modulated oisson models. These models are mainly ruired for the design of router and switching uiment. They normally need much rocessing time and therefore are not well suited for dimensioning of large networks with many nodes. For reasons stated the cell leel will not be considered exlicitly. If oice ackets in On-Off model or the bursts in M/M/1(m) model are further diided into smaller transmission units such as ATM cells this can be taken into account by incrementing the source data rate in the burst model. 5. Validation of the VoIP models To carry out the erification of the reious models it is necessary to deelo the behaior of the oice sources comletely. Most of the rograms for alone network simulation hae defaulted traffic generators based on tyical distributions (exonential, Erlang, etc). This makes necessary to design a model on-off based on generic modules of this tye, emulating the behaior of the same one by means of the corresonding machine of finite states. C

5 5.1. on-off source model As it was indicated reiously, on-off source consists of two basic states, actiity and silence. It should gie the ossibility to establish such arameters as the distribution of time among arrials, silences distribution and distribution of calls duration. Resulting machine of states is directed by three tyes of eents, one to create the ackets, and two for the transition among states: Fig. 8: On-off source rocess model Gateway model For the interconnection of oice nodes, it is necessary to define a deice that format the oice ackets and route toward the address of corresonding destination. Gateway model roides transmission / recetion orts for 100 oice nodes, and an interconnection ort with other sub-networks, so that its direct connection is facilitated to the dorsal connection, which will be used for the study of statistical multilex of all the sources. Gateway has a finite queue of size m oice ackets that can be used to adjust the extreme retard to end. Also the routing caacities are ery simle, so that different ackets are addressed toward the destination node that should be modeled as a drain located in the sub-network. This tye of nodes allows to obtain ery interesting statistical figures, e.g. acket loss rate and total receied ackets. Additionally, by means of an additional arameter, gateway caacity in bits and/or in ackets, it is ossible to model the global queue of incoming oice ackets etwork model Once designed the different nodes, it is necessary to establish the network toology that allows to interconnect them. Selected network model consists on the interconnection of two subnetworks through a dorsal connection. First subnetwork contains the gateway node with access to 100 oice nodes in star. Second subnetwork consists on a single oice node that takes charge of icking u the traffic of the dorsal connection, writes statistics of receied ackets, and finally it destroys all them. Fig. 9: Full etwork model and delay comonents 6. Validation of the analytic models by means of simulation For the obtaining of corresonding results we will treat network model described before as a block in which inut arameters will be the number of users, the size of gateway queue m, and the caacity of dorsal connection C. Howeer, the behaior of the sources will be fixed for all the simulations (it is fixed the rate of burst for examle). Probabilities corresonding to each one of the states and OFF is also fixed resectiely at 0.4 and 0.6, and the time among arrials is of 0.02 sec. (for ackets of fixed size of 480 bits). The most interesting results are mainly the robability of loss P B and the mean and ariance of delay in the gateway queue. By means of these alues it is ossible to obtain the minimum of caacity low gien conditions of P B and delay comarison with the binomial model Grahic results shown next reresent the caacities of the dorsal connection for robabilities of inferior losses at 10-4, 10-3 and 10-2, obtained by means of simulation and making use of binomial attern. It is obsered that binomial attern carries out an oerestimation of necessary caacity in the connection for all cases, such and like it was assumed in its theoretical analysis. Backbone caacity 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Loss robability PB< umber of sources Binomial model Simulation Fig. 10: Theoretical and simulated backbone caacity (loss rob. < 0.001)

6 The reason rests in that the size buffer m used by the simulated model disaear in the theoretical attern. This buffer diminishes the robability of loss substantially, imeding that it leaes of ackets that found the busy connection they can be lost. This is translated in a better use of connection. Howeer, an unexected effect aears, en-to-end delay then is increased. Backbone caacity 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Loss robability PB< umber of sources Binomial model Simulation Fig. 11: Theoretical and simulated backbone caacity (loss rob. < 0.01) fruency Distribution of burst loss lengths simulation set: 100C m80S burstlength in ackets Fig. 12: Distribution of burst loss length comarison with the M/M/1(m) system While for the comarison of indiidual alues it is not reresentatie, it was obsered that binomial model gae better results in comarison with M/M/1(M) attern. Howeer, it is ruired of more intensie studies that suort this statement. Another interesting fact when comaring both models was the one that stos relatiely big sizes of buffer (79 ositions) and caacities of connection dros (50%) Probability of loss in the M/M/1(m) model it is inferior to the one obtained by simulation. This way, theoretical model underestimates the caacities of the according connection it increases the size of the buffer and the load of the connection. A ossible exlanation is that due to the nature of the bursts generated by on-off sources, a buffer near to congestion is much easier that it is surassed its caacity that in the case of Posisson sources. A detailed analysis of this henomenon will be reason of future studies. 7. Conclusion Simulations and deeloed analytic models are relatiely simle leaing aside certain asects that aear in the reality. For examle, suosition used by M/M/1(m) system of a FIFO queue, suoses that sources with long eriods of burst can reent that other sources can be enqueued, when it would be ossibly more aroriate to use more ual oliticians of haing enqueued, as for examle Round Robin. Binomial model can be used for the estimation of the caacities of the connections and the control of admission of calls. Howeer, as ure system of losses that is, it cannot be used for the estimation of the buffer, in site of being fundamental arameter in the oice gateway. For the calculation of this alue, it is ossible to make use of M/M/1(m) model like comlement to binomial model. Bursty model that it neither follows the loss of ackets can be dear by means of theoretical models. Only by means of simulations it can be carried out, what takes to think of new studies that allow to define those arameters that affect to this behaior, taking like base the simulations for the obtaining of aroriate theoretical models. References: [1] Kulenkamff, G.: Der Markt fuer Internet Telefonie - Rahmenbedingungen, Unternehmensstrategien und Marktentwicklung. Diskussionsbeitrag r Wissenschaftliches Institut fuer Kommunikationsdienste GmbH, Juni [2] White Paer: Market oortunities in Internet rotocol telehony. Killen & Associates, Inc htt:// [3] Rinde, J.: The future direction of Internet Telehony and its effect on business. V conference aer, 1997, htt:// [4] Akimaru, Haruo: Teletraffic: theory and alications. 2nd ed. Sringer-Verlag London [5] Schwartz, Mischa: Broadband Integrated etworks. Prentice Hall, 1996.

Optimal Pricing for Multiple Services in Telecommunications Networks Offering Quality of Service Guarantees

Optimal Pricing for Multiple Services in Telecommunications Networks Offering Quality of Service Guarantees To Appear in IEEE/ACM Transactions on etworking, February 2003 Optimal Pricing for Multiple Serices in Telecommunications etworks Offering Quality of Serice Guarantees eil J. Keon Member, IEEE, G. Anandalingam,

More information

Traffic Analysis for Voice in Wireless IP Networks

Traffic Analysis for Voice in Wireless IP Networks Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

A Method to Segment a 3D Surface Point Cloud for Selective Sensing in Robotic Exploration

A Method to Segment a 3D Surface Point Cloud for Selective Sensing in Robotic Exploration A Method to Segment a 3D Surface Point Cloud for Selectie Sensing in Robotic Exloration Philli Curtis, Pierre Payeur School of Information Technology and Engineering Uniersity of Ottawa Ottawa, O, Canada

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes Chater 2 POISSON PROCESSES 2.1 Introduction A Poisson rocess is a simle and widely used stochastic rocess for modeling the times at which arrivals enter a system. It is in many ways the continuous-time

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

On the intensimetric analysis and monitoring of flue organ pipes. 1 Introduction

On the intensimetric analysis and monitoring of flue organ pipes. 1 Introduction On the intensimetric analysis and monitoring of flue organ ies Domenico Stanzial FSSG, National Research Council of Italy, Fondazione G. Cini, Isola di San Giorgio Maggiore, I-3014 Venezia, Italy, domenico.stanzial@cini.e.cnr.it,

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

CSI:FLORIDA. Section 4.4: Logistic Regression

CSI:FLORIDA. Section 4.4: Logistic Regression SI:FLORIDA Section 4.4: Logistic Regression SI:FLORIDA Reisit Masked lass Problem.5.5 2 -.5 - -.5 -.5 - -.5.5.5 We can generalize this roblem to two class roblem as well! SI:FLORIDA Reisit Masked lass

More information

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Receiver Buffer Requirement for Video Streaming over TCP

Receiver Buffer Requirement for Video Streaming over TCP Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: taehyun.kim@freescale.com

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

EVOLUTIONARY GAME ANALYSIS ON CYBER SECURITY INVESTMENT

EVOLUTIONARY GAME ANALYSIS ON CYBER SECURITY INVESTMENT EVOLUTONAY GAME ANALYSS ON CYBE SECUTY NVESTMENT ong Pan, School/College of Business, Hohai Uniersity & Bryant Uniersity, ran@bryant.edu Chen Zhang, Ph.D., College of Business, Bryant Uniersity, Smithfield,,

More information

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China The current issue and full text archive of this journal is available at www.emeraldinsight.com/2044-1398.htm CFRI 3,4 322 constraints and cororate caital structure: a model Wuxiang Zhu School of Economics

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Computational Finance The Martingale Measure and Pricing of Derivatives

Computational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet

More information

2D Modeling of the consolidation of soft soils. Introduction

2D Modeling of the consolidation of soft soils. Introduction D Modeling of the consolidation of soft soils Matthias Haase, WISMUT GmbH, Chemnitz, Germany Mario Exner, WISMUT GmbH, Chemnitz, Germany Uwe Reichel, Technical University Chemnitz, Chemnitz, Germany Abstract:

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431 VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com sales@advancedvoip.com support@advancedvoip.com Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this

More information

Getting Started with IBM Firewall for AS/400

Getting Started with IBM Firewall for AS/400 Getting Started with IBM Firewall for AS/400 Version 4 Getting Started with IBM Firewall for AS/400 Version 4 ii Getting Started with IBM Firewall for AS/400 Contents Chapter 1. Getting started with IBM

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

QoS-aware bandwidth provisioning for IP network links

QoS-aware bandwidth provisioning for IP network links Comuter Networks 5 (26) 631 647 www.elsevier.com/locate/comnet QoS-aware bandwidth rovisioning for IP network links Hans van den Berg a,b, Michel Mandjes c,b,1, Remco van de Meent b, Aiko Pras b, Frank

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow.

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow. Princiles of Hydrology Unit Hydrograh Runoff hydrograh usually consists of a fairly regular lower ortion that changes slowly throughout the year and a raidly fluctuating comonent that reresents the immediate

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings An Energy-Efficient Commnication Scheme in Wireless Cable

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference Note Before using this information and the product it supports,

More information

Probabilistic models for mechanical properties of prestressing strands

Probabilistic models for mechanical properties of prestressing strands Probabilistic models for mechanical roerties of restressing strands Luciano Jacinto a, Manuel Pia b, Luís Neves c, Luís Oliveira Santos b a Instituto Suerior de Engenharia de Lisboa, Rua Conselheiro Emídio

More information

Burst (of packets) and Burstiness

Burst (of packets) and Burstiness 66th IETF - Montreal, Quebec, Canada Burst (of packets) and Burstiness R. Krzanowski Ver 1.0 7/10/2006 1 Outline Objectives Definition of a phenomena Definition of Burst and burstiness Future research

More information

Networking Connecting to the Internet

Networking Connecting to the Internet Networking Connecting to the Internet Networking Connecting to the Internet ii Networking Connecting to the Internet Contents Part 1. Connecting to the Internet.. 1 Chapter 1. Print this topic.......

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA F. Mojžíš, J. Švihlík Detartment of Comuting and Control Engineering, ICT Prague Abstract This aer is devoted to statistical analysis of Nikon D40 digital

More information

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives 10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Multimedia Requirements. Multimedia and Networks. Quality of Service

Multimedia Requirements. Multimedia and Networks. Quality of Service Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Mixer/Translator VOIP/SIP. Translator. Mixer

Mixer/Translator VOIP/SIP. Translator. Mixer Mixer/Translator VOIP/SIP RTP Mixer, translator A mixer combines several media stream into a one new stream (with possible new encoding) reduced bandwidth networks (video or telephone conference) appears

More information

Maximizing Revenue with Dynamic Cloud Pricing: The Infinite Horizon Case

Maximizing Revenue with Dynamic Cloud Pricing: The Infinite Horizon Case Maximizing Reenue with Dynamic Cloud Pricing: The Infinite Horizon Case Hong Xu, Baochun Li Department of Electrical and Computer Engineering Uniersity of Toronto Abstract We study the infinite horizon

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Fundamental Concepts for Workflow Automation in Practice

Fundamental Concepts for Workflow Automation in Practice Fundamental Concets for Workflow Automation in Practice Stef Joosten and Sjaak Brinkkemer Centre for Telematics and Information Technology, University of Twente, The Netherlands March 12, 1995 This aer

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE. Sergio Bittanti Antonio De Marco Marcello Farina Silvano Spelta

MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE. Sergio Bittanti Antonio De Marco Marcello Farina Silvano Spelta MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE Sergio Bittanti Antonio De Marco Marcello Farina Silvano Selta Diartimento di Elettronica e Informazione, Politecnico di Milano, Via Ponzio 34,

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information