QoS-based Virtual Private Network Design for an MPLS network

Size: px
Start display at page:

Download "QoS-based Virtual Private Network Design for an MPLS network"

Transcription

1 QoS-bae Virtua Private Networ Deign for an MPLS networ Anotai Sriitja an Davi Tier Det. of Information Science an Teecommunication Univerity of Pittburgh 5 N. Beefie Avenue, Pittburgh, PA 560 emai: anotai@i.itt.eu, tier@tee.itt.eu Abtract In thi aer, a VPN eign moe i rooe for the Next Generation Internet (NGI). With the ue of MutiProtoco Labe Switching (MPLS) in a bacbone networ, it i oibe to create mutie ogica in-tree (irecte mutioint-to-oint tree ening at one exit noe) carrying traffic of mutie VPN. Thi mae the VPN eign robem with MPLS ifferent from thoe of circuit-witche networ an connection-oriente acet networ uch a ATM. A big quetion i how to contruct a tree an how to incororate it in the networ eign moe. Here, the VPN eign i moee a a mixe integer rogramming (InP) otimization robem to minimize the cot of aying out a VPN uorting ifferent traffic tye an ervice cae on a given tooogy whie meeting QoS requirement. Reaizing a in-tree routing ath, the rooe moe aim to fin an otima VPN ayout uorting muti-ervice cae uring ifferent time erio (muti-hour erio) coniering that the traffic eman may vary uring the coure of the ay. Our numerica reut how that ue of in-tree aroach in VPN eign can greaty reuce the amount of banwith an the number of abe witche ath require. I. INTRODUCTION Virtua Private Networ (VPN) rovie a rivate an eicate environment over a hare rivate or ubic networ infratructure. With the avent of broaban technoogy, a eoyment of QoS-bae VPN uorting integrate ervice for voice, ata an vieo aication together over ubic ata networ aear to be economicay aeaing ince it aow a high-ee acce with erformance an Quaity of Service (QoS) guarantee. Major chaenge in eoying QoS-bae VPN over the Internet are eivering a erformance guarantee an ecurity aurance to a egree that i comarabe to a rea rivate networ. MutiProtoco Labe Switching (MPLS) technique rooe by IETF ue a abe-waing forwaring araigm to exeite a acet-forwaring roce [,]. MPLS rovie a connection-oriente, QoS-bae aroach to the NGI together with a traitiona, connectione beteffort aroach. Deoying MPLS over a IP networ mae it eaier for VPN ervice to rovie erformance at require eve. Since MPLS i eigne to have a traffic engineering caabiity, roviioning for traffic having ifferent QoS requirement in ifferent Cae of Service (CoS) i oibe []. In term of ecurity, another no-e imortant iue, the goa i to rotect VPN ata from maiciouy or accientay miconuct. IP Security Protoco (IPSec) [4] i aime to be ue for thi uroe. Uing MPLS, mutie VPN can be contructe on the ame networ through the ue of ifferent MPLS Forwar Equivaent Cae (FEC). FEC i ue to efine traffic that wi be forwar in the ame manner through a MPLS networ. Thu ifferent FEC wi be ue to caify traffic from ifferent VPN which may or may not ue the ame forwaring ath an may or may not hare a ortion of networ banwith. The ath through an MPLS networ can be a mutioint-to-oint ath or a in-tree ath ening at one exit noe. To guarantee erformance to VPN ervice a ervice rovier ha to be concerne with caacity roviioning an routing coexiting VPN having ifferent ervice cae an tooogie over the ame networ infratructure. In aition, in eigning a VPN, one mut be concerne with caabiity iue in orer to uort a arge number of cutomer. In another wor a we-eigne VPN mut be eay to manage an attain banwith efficiency. Over a MPLS networ, thi mean that the number of abe witche ath (LSP) an require abe mut be et ma. In term of caacity efficiency, ifferent eve of traffic aggregation may be coniere, for exame, aggregation of traffic from ifferent VPN beonging to the ame CoS, aggregation of traffic from ame VPN exiting at the ame egre noe, etc. From a eign erective, the concet of a virtua networ in genera can be aie to VPN. The notion of virtua networ ha ong been ue to refer to a ogica networ ayout over a networ architecture. VPN over a circuitwitche or an ATM networ, are often viewe a a ogica meh networ with oint-to-oint eman between noe air. A ogica fu-meh i a tooogy where each oint-tooint eman air i ineenenty given a ogica in that may be route over mutie witche-oint. The ue of in-tree ath in MPLS mae VPN eign robem iffer from thoe in traitiona connection-oriente networ reviouy mentione. Traffic of ifferent VPN with the ame QoS requirement may/may not be carrie on the ame routing tree an may/may not hare networ banwith. A big quetion i how to contruct a tree an how to incororate it in the networ eign moe. Ony recenty ha wor aeare on otimization moe to ove traffic engineering robem in genera over MPLS networ. In [5], author rovie integer rogramming formuation for fow aignment robem given a et of

2 oint-to-oint LSP an it can be extene to ove a caacity anning robem. However, evera trivia aumtion are mae incuing : (i) one-to-one reationhi between traffic trun an LSP (ii) no aggregation, e-aggregation an merging of LSP. (iii) the moe i vai ony if one or more feaibe oution exit. [6] rooe the ue of mutioint-tooint LSP in fow aignment robem. A et of re-eecte LSP i force to incue at eat two route which o not hare any inge noe to each ingre/egre noe. The otimization moe aim to minimize the maximum in oa without coniering cot of in caacity. Reaizing a in-tree routing ath, thi aer rooe mathematica formuation for the robem of VPN eign in orer to imutaneouy fin otima VPN ogica tooogie an their imenion over a ervice rovier IP infratructure uorting MPLS to carry muti-ervice, muti-hour VPN traffic from variou cutomer. Here we exoit re-comute in-tree ath (mutioint-to-oint ath) over which VPN traffic i route in a MPLS core networ. In the moe, ifferent eve of banwith aggregation/mutiexing occur acro ifferent ervice cae an route within one VPN, but not acro ifferent VPN. It i ceary hown that uch robem formuation yie a NP-har comexity. Therefore, reiminary wor i conucte for ime cae where ony inge-ervice, inge-hour VPN traffic i coniere. Obtaining the oution to thi robem rovie a benchmar meaure an a guiance to oution feaibiity. II. SINK-TREE LSP PATH A reviouy mentione, a abe witche ath (LSP) in MPLS can be a mutioint-to oint ath referre in here a a in-tree ath. A cear benefit i it caabiity ince fewer LSP mut be create comare to uing a oint-to-oint ath between each eman air. The number of abe require i ao maer. Thu management i imer. For exame, aying a fu-meh eign where there i a oint-to-oint ath between a noe-air to a N -noe networ, the tota number of LSP require i N ( N ). However, thi number can be reuce to N ath uing a in-tree eign. Figure iay a fu-meh veru in-tree eign for a -noe VPN over an 8-noe MPLS networ. Aume that there i a irectiona eman of one unit between -noe air in VPN networ an each in in the MPLS networ ha one unit cot. A fu-meh eign require 6 LSP comare to LSP in in-tree eign. Both eign ue the ame in in MPLS networ. However, the firt yie 4 unit cot whie, in the atter, the cot i reuce to. The cot aving reut from the caacity efficiency gain attaine, when traffic i merge in a in-tree eign. III. VPN DESIGN METHODOLOGY The eign of VPN i execte to be a art of the traffic engineering roceure that can be one offine to obtain the VPN routing an an virtua networ in (VNL) imenion. Thi i hown in Figure. During an oerationa 4 (a) Overay VPN Networ Service Provier MPLS Networ 5 Fu-Meh Deign Service Provier MPLS Networ (b) Sin-tree Deign Figure : Fu-meh veru in-tree eign erio, networ management wi monitor the change in traffic attern networ tooogy or in cot metric. When it notice any change that wi invaiate the current etting it wi tart a goba otimization roceure to o an offine recomutation. Note that, the otimization roceure can be one earatey for each VPN or jointy for a VPN to achieve a true otima oution. For QoS-bae VPN over MPLS, the rooe networ eign roce aim to fin the otima ogica in-tree() an it imenion o a to minimize the tota networ cot whie atifying QoS contraint. Three main ta are invove in the eign roce: (i) Tree generation/eection, (ii) Dimenioning an (iii) Routing Otimization. The firt ta i concerne with generating a caniate et of ogica tree for a given ource an a et of etination. The econ ta i to fin a banwith that wi be aocate to each in in a tree whoe banwith may/may not be hare by ifferent VPN traffic. The at ta aim to fin an otima route aignment for a given traffic eman. In genera, thee three main ta can be ove ineenenty or jointy. The networ tooogy an noe ocation (e.g. ocation of MPLS ege router an core router) wi be ue to generate mutioint-to-oint tree ath which are eecte bae on traffic QoS contraint. For intance, a boun on maximum eay can be tranate into a maximum ho imitation. A recomute ath et i ue in the otimization moe over which the otima route an caacity requirement are etermine. The banwith aocation/imenion of the virtua networ hou rovie ufficient Grae-of-Service (GoS) (e.g., connection bocing robabiity) an fairne to ifferent ervice whie atifying evera erformance 6

3 - Networ tooogy an noe ocation - QoS contriant (Maximum eay requirement) Path Seection Proceure Caniate Tree Generation Feaibe Tree Seection Off-ine Goba Otimization Proceure n - GoS - Pacet o robabiity Effective Banwith Cacuation Virtua Networ Dimenioning Virtua Lin Dimenioning VPN n VPN - Traffic eman matrix - Qo Deth = Deth = n- Networ Route Otimization - Lin cot matrix 4 n (a) Sin-tree with -ho eth (b) Sin-tree with (n-)-ho eth Change in networ tooogy VPN otima routing an an Virtua in imenion On-ine Traffic Otimization an Monitoring Change in in cot Figure : VPN traffic engineering roceure Change in traffic eman contraint at the traffic ayer uch a acet o rate an eay. In aition, coniering the effect of tatitica mutiexing among ifferent connection (when oibe), banwith aocation can be reuce. Here, we ue the concet of effective banwith to rereent ervice rate require by each traffic connection beonging to ifferent ervice cae. Effective banwith cacuation wi encauate the QoS requirement in term of acet o rate an eay. Thu by uing the concet of effective banwith, traffic fow with ifferent characteritic an QoS requirement can be rereente a being teay with a eterminitic banwith requirement. Thi imifie our otimization moe. Laty, the routing otimization wi otimay aign a route to a traffic eman, given a et of caniate route an in caacitie. Other than minimizing cot of aying out a given traffic, a route aignment may ao aim to baance the oa acro the networ uch that the number of over-utiize in an uner-utiize in i reuce. IV. TREE SELECTION The choice of a tree i imortant a it affect the goone of the oution obtaine an the comutation time. To reuce the robem ize (an thu comutation time) for a arge networ, a recomute caniate et of tree wi be ue in the moe over which the otima route an caacity requirement are etermine. A ath et wi be generate for each ource an it etination given the hyica networ tooogy. Thi et wi be imite by a maximum ho-count aowe between each ource-etination air uch that the maximum en-to-en eay i boune. The choice of a routing tree ao affect the caacity require an if banwith of traffic fow i aggregate an mutiexe Figure : Sin-tree routing ath for n noe when they are merge at one noe. For connection within the ame ca of ervice, in which a tatitica mutiexing can be achieve, a certain art of aocate banwith can be hare among them. Hence, in tree eection, there i a trae off, between minimizing an en-to-en eay requirement veru minimizing cot of in caacity. Shown in Figure are two ifferent choice of a in-tree for n noe. The eth of a tree i efine a the itance between the root noe an a eave noe. Figure (a) how a in-tree of -ho ath with a maximum eth of. Thi choice of a tree yie a minimum eay between eman noe-air but, ince -ho ath merge at the root noe, no banwith aggregation i oibe. Ooitey, the tree in Figure (b) with a eth of (n-) yie a maximum banwith gain ue to tatitica mutiexing at a in after the merge oint. Different tye of tree incuing anning tree hortet (itance) ath tree an Steiner tree (minimum-cot tree) are among otentia choice. V. MPLS-VPN DESIGN FORMULATIONS Given a networ tooogy, noe ocation an in caacity, an otimization moe i formuate for VPN eign. A hyica networ i rereente by a grah G ( N, L, C) where N, L, C i a et of noe in an in caacitie of the networ reectivey. M ( M N ) i a et of ege noe (ege router) where there i a eman traffic entering or exiting. Thu N M rereent a et of core noe (core router). The comete notation of the formuation i given beow. For each in L, utiization factor α imit the roortion of the in caacity C to be aocate for VPN traffic. Thi utiization factor may be ue to rotect certain in from being overy ubcribe or ubjecte to otentia congetion. For exame, a maer vaue of α may be aigne to in connecting to core-router than one connecting to ege-router. Thi factor i aume to be nown.

4 A. Notation α Maximum utiization factor of in L K Deman et inex, M P ν, Set of feaibe in-tree ening at noe N anning a noe m M of ervice ca S of VPN D, Set of oint-to-oint eman air in eman et B, h, Y K K of ervice ca S of VPN ν V Banwith requirement of eman air ν D ν, of ervice ca S of VPN uring hour-erio h H Sizing (tooogy) variabe caacity aigne to VPN traffic on in L ψ Cot of a caacity on in L U ν, Caacity at in L aocate to VPN uring h X hour-erio h H Deman-ath routing eciion variabe = if ath P i ue for eman et K of ervice ca S of VPN uring hour erio h H = 0 otherwie γ, Lin ath incience matrix = if eman air D ν, of et K that ue ath P i irecte uing in L =0 otherwie EB Etimate BW requirement of a eman tye K on in L of ervice ca S of VPN uring hour-erio h H ( B, T Q ) Equivaent banwith cacuation function for traffic in ervice ca S with requirement of banwith amount B ( with traffic ecritor T an quaity of ervice requirement Q ) Eqv, B. Traffic Deman The comete matrix of VPN traffic eman i aume to be given. It can be erive from a SLA (Service Leve Agreement), between cutomer an ervice rovier. SLA tyicay ecify variou cae of ervice an how much traffic in each ervice ca a uer i aowe to en. In more etai, for each ource-etination (ingre-egre) noe-air, the matrix of each VPN ecifie the require banwith an it QoS arameter (i.e., en-to-en eay requirement, eay jitter). Traffic eman D, wi be aigne a route bae on it egre noe where K M, cae the eman et inex. K, C. Seection of Caniate Path Feaibe in-tree or mutioint-to-oint ath are ue in the otimization moe where a traffic eman may be aigne. The feaibe ath et P ν, can be re-comute for VPN ν an ervice ca having ifferent QoS requirement (i.e., maximum en-to-en eay requirement). A ath P i eecte from caniate in-tree ath which are anning tree roote at egre noe K an anning over a the ege noe m M or a ubet of the ege noe. Set of caniate ath can be generate by enumerating a itinctive anning tree. Agorithm to etermine thee tree can be foun in reviou wor incuing [7]. The maximum en-to-en eay requirement i tranate in to the ho-count imitation contraint. Thi contraint wi imit the ath et where ony feaibe ath are eecte from a caniate ath. D. Banwith Cacuation The banwith requirement at each in wi be etimate bae on an effective banwith cacuation [8] where the traffic arameter uch a connection ea rate an it burtine are taen into account. Two cae of ervice in a ifferentiate ervice moe are coniere incuing remium/guarantee ervice an aure ervice. ( i ) Premium Service In the remium ervice ca acet o eay an eay jitter mut be boune. The traffic of thi ca require an aboute banwith guarantee. Thu each traffic connection in thi ca i aocate a banwith equa to a ource ea rate R ea. Auming that η connection are mutiexe within one in, tota aocate banwith ( Eqv ) Eqv = η R () ea where η i erive from an invere Erang formuation uch that a grae of ervice contraint (GoS) of a connection (i.e., connection bocing robabiity - P ) i met. b η = InvErang( a, P ) () b where a i the ource utiization or an offere oa of a connection. ( ii ) Aure Service In the aure ervice ca aication are execte to have the abiity to toerate a certain amount of eay an o. For thi traffic ca a mean banwith guarantee i ony neee aong with a tatitica eay boun. In banwith cacuation, ource traffic in the aure ervice ca i aume to be characterize by it ource ea rate - R, ea utiization factor - ρ, an mean burt erio - b. In thi cae, the aocate banwith ( Eqv ) i e than η R. Eqv { m + α σ, cˆ } = min η i ea η ()

5 where α = n( ε ) n( π ) given m a mean bit rate, σ a variance bit rate, an ε buffer overfow robabiity. Equivaent caacity etimation for each ource ĉ i a + ( a ) + 4ρ a = R (4) cˆ i ea a where a = b B ( ρ) nε aume that B buffer ize an ε acet o ratio are nown. The number of connection η mutiexe can be foun a before from an invere Erang formuation. E. Genera Cae without Banwith Aggregation Uing a in-tree routing ath, traffic eman can be merge within the networ, thu the require banwith after the merge oint can be aocate earatey for each eman-air or mutiexe together within the ame ervice ca. The atter yie a reuction in banwith requirement eeciay for traffic in the aure ervice ca ue to a tatitica mutiexing gain. The baic formuation are given beow. The moe aume that the foowing are given: (i) in utiization factor α an the in caacity C, (ii) et of traffic eman air ν an banwith requirement B D,,, (iii) a recomute in-tree ath et correoning in ath incience matrix formuation ee to fin VPN in caacity aocation an it route X, h, i P ν, γ, U ν, h ν for a VPN in each hour erio. an a. The Formuation-I how the cae where there i no banwith aggregation. The objective of the formuation i to minimize the tota caacity cot in roviing ervice to a VPN. For each VPN, ervice ca an hour erio, contraint (5) eect ony one ath from a re-comute et of feaibe in-tree ath ening at egre noe P for each eman et. Contraint (6) (9) imoe that caacity aigne at each in mut not be greater than a utiization imit of in caacity ( α C ). Note that, in contraint (6), the caacity cacuation i one earatey for each traffic eman-air. Contraint (0) an () require that routing variabe an caacity aignment variabe mut be oitive. Thi formuation yie ifferent route aignment an caacity aocation at ifferent hour-erio. Formuation-I Minimize ψ Y X P L =, H h, S, K (5) EB ν, h, = Eqv B,T,Q γ X ν, h,, ν, h, D ν, P ν,, h H, S, K, L EB U ν, h S K, h H, L U Y ; : ν, h (6) (7) h H, L (8) Y α C L (9) X ν { 0, }, h,, h H, S, K, P Y 0 L (0) () F. Genera Cae with Banwith Aggregation. Here, we introuce a cae where banwith of variou traffic eman i aggregate at in where oibe. The aggregation ony occur within a eman et etine to the ame egre noe of a VPN. In thi cae, the objective function an contraint are imiar to reviou cae excet for contraint (6) i reace by (). The tota traffic eman route on one in i aggregate an banwith aocation i one together. Formuation-II Minimize ψ Y L (5), (7), (8), (9), (0), (), an EB = Eqv B γ X, T, Q, D P ν, :, H h, S, K, L VI. PRELIMINARY NUMERICAL STUDY () The mixe-integer formuation for the VPN eign robem, hown reviouy, have a NP-har comexity. A imifie verion of thee formuation can be erive when we ony conier traffic eman of VPN having one ervice ca an hour-erio. Thu the formuation-i can be reuce to: Formuation-III Minimize ψ Y L X = K () P

6 ( B T Q) X Y,, γ, Eqv K D P Y α C ; : { 0, } L (4) L (5) X K, P Y 0 (6) L (7) In the ame manner, the formuation-ii can be reuce to : Formuation-IV Minimize ψ Y L (), (5), (6), (7), an Eqv B X T Q γ,,, K D P Y L (8) Obtaining a oution to robem tate in formuation-iii an IV i eaier than one in formuation-i an II. A iot tuy wa conucte by tranating formuation-iii an IV uing the AMPL moe ecrition anguage an oution i obtaine uing CPLEX 6.6 otimization over imementing a branch an boun oution technique. The networ tuie were ma networ with 8 an 0 noe with equa caacity in-cot, hown in Figure 4. The caacity of each in C wa et to C L = 000 ;, o that caacity wa not a imiting factor. Different cae are hown in Tabe. For cae-i, aymmetric oa of fixe eman wa tuie that i there wa one unit of eman from each noe to every other noe. For cae-ii, a ymmetric oa of eman wa coniere with the eman generate from a Uniform(,5) itribution. For cae-iii, an aymmetric oa of eman wa tuie with nonzero eman ony from a ubet of networ noe. The noe with nonzero eman were ranomy eecte with a ranom oa rawn from a Uniform(,5) itribution. From Tabe, one can ee that the otima oution obtaine from a in-tree eign with no banwith aggregation are not ifferent from one obtaine from a fumeh eign. It i oberve that a ath ue in a in-tree eign (with no banwith aggregation) i imy a hortetath tree. Thi i imiar to a fu-meh eign where a eman i route aong a hortet ath. In term of cot, when banwith aggregation i coniere in a in-tree eign, a cot reuction i reaize aroximatey by 0-40 ercent in a cae. Thi i becaue traffic eman may be route uing a in-tree ath that i ifferent from a hortet ath tree. Note that there i a huge ifference in the number of LSP ue between the in-tree an fu-meh eign aroache. In orer to obtain a oution to genera cae robem, where muti-ervice an muti-hour erio are coniere, an where mutie VPN ayout are imutaneouy (a) 8-noe networ (b) 0-noe networ Figure 4 : Networ uner tuy otimize, one ee to fin more efficient oution metho ue to the robem comexity. Reut from the iot tuy ugget that a heuritic metho may tart out it earch from a o-cae near-otima oution obtaine by routing eman traffic uing hortet-ath tree then ee out a better oution a it move aong a rojecte irection within a feaibe earch ace. One may ay variou heuritic technique exore in the iterature, uch a greey agorithm, imuate anneaing, or genetic agorithm, to ove thi robem. VII. CONCLUSION In thi aer we have formuate the MPLS bae mutihour VPN eign robem with an without banwith aggregation. We moee a VPN a mutie ogica in tree which reuce the number of abe witch ath an aow the oibiity of banwith aving. Same numerica reut for ifferent tuie cae how that a in-tree eign with no banwith aggregation yie the ame oution a a fu-meh eign where eman wa route aong a hortet-ath. However, when banwith aggregation i coniere in a in-tree eign, eman wa route aong a tree that i ifferent from a hortet-ath tree uch that a in caacity aignment can be maer an the tota caacity cot reuction i reaize. REFERENCES [] E. Roen, A. Viwanathan, an R. Caon, "Mutirotoco Labe Switching Architecture," RFC 0, January, 00. [] B. Davie an Y. Rehter, MPLS : technoogy an aication San Francico: Morgan Kaufmann Pubiher 000. [] D. Awuche, et a., "Requirement for Traffic Engineering Over MPLS," RFC 70, Setember, 999. [4] S. Kent an R. Atinon, "Security architecture for the Internet Protoco," RFC 40, November, 998. [5] K. M. Girih, B. Zhou, an J.-Q. Hu, "Formuation of the Traffic Engineering Probem in MPLS bae IP Networ" Proceeing ISCC 000. Fifth IEEE Symoium on Comuter an Communication., Lo Aamito CA, USA,. 4-9, 000.

7 [6] H. Saito, Y. Miyao, an M. Yohia, "Traffic Engineering uing Mutie mutioint-to-oint LSP" IEEE INFOCOM 000, , March, 000. [7] N. Chritofie Grah Theory an Agorithmic Aroach, Lonon: Acaemic Pre Inc., 986. [8] R. Guerin, H. Ahmai, an M. Naghhineh, "Equivaent Caacity an It Aication to Banwith Aocationin High-See Networ" 7th ITC Seminar, Morritown, NJ, October, 990. Tooogy Otima Cot Fu-Meh Deign Simex Iteration No. of LSP Sin-Tree() Deign (w/o BW aggregation) Simex Iteration Otima Cot No. of LSP Sin-Tree() Deign (with BW aggregation) Simex Iteration Otima Cot No. of LSP Cae I : Symmetric fixe-oa 8-noe noe Cae II : Symmetric variabe-oa 8-noe , noe ,9 0 Cae III : Aymmetric variabe-oa 8-noe noe Tabe : Comarion for ifferent eign cae

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT

More information

Supply Chain Coordination for Strong Retailer with Extended Warranty under Network Externality

Supply Chain Coordination for Strong Retailer with Extended Warranty under Network Externality Journal of Service Science an Management, 015, 8, 393-409 Publihe Online June 015 in SciRe. htt://www.cir.org/journal/jm htt://x.oi.org/10.436/jm.015.83041 Suly hain oorination for Strong Retailer with

More information

ACTION: Breaking the Privacy Barrier for RFID Systems

ACTION: Breaking the Privacy Barrier for RFID Systems ACTION: Breaking the Privacy Barrier for RFID Sytem Li Lu, Jinong Han, Renyi Xiao, and Yunhao Liu Deartment of Comuter Science & Engineering, Hong Kong Univerity of Science & Technoogy, Hong Kong, China

More information

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,

More information

ILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters

ILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters ILP Formuation and K-Shortest Path Heuristic for the RWA Probem with Aocation of Waveength Converters Karcius D.R. Assis 1, A. C. B. Soares, Wiiam F. Giozza and Heio Wadman 1 UEFS- State University of

More information

How To Write A Powerline

How To Write A Powerline The Stragegy for Fat I/O in Degrae Moe of RAID-5 *DONG-JAE, KANG *CHANG-SOO, KIM **BUM-JOO,SHIN *Comuter & Sytem Lab. ETRI 161 Gajeong-Dong, Yueong-Gu, Deajeon, 35-35 KOERA **125-1 Naei-Dong Miryang Gyeongnam

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an

More information

The main objective is to maximize the throughput of the traffic.

The main objective is to maximize the throughput of the traffic. Chater 7 Flow Problem 7. Introduction and definition Problem related to tranort have been invetigated ince the early fiftie. The roblem i to route ome good, called commoditie, from roduction ite to conumtion

More information

Management Science Letters

Management Science Letters Management Science Letter 3 (2013) 1077 1088 Content it avaiabe at GrowingScience Management Science Letter homepage: www.growingscience.com/m A muti-objective mode for ocating ditribution center in a

More information

Using Overlay Networks to Resist Denial-of-Service Attacks

Using Overlay Networks to Resist Denial-of-Service Attacks Uing Overlay Network to Reit Denial-of-Service Attack Ju Wang an Anrew A. Chien Deartment of Comuter Science an Engineering Univerity of California, San Diego {jwang,achien}@c.uc.eu Abtract Proy-network

More information

A new definition of the fractional Laplacian

A new definition of the fractional Laplacian A new efinition of the fractional Laplacian W. Chen imula Reearch Laboratory, P. O. Box. 34, NO-325 Lyaker, Norway (9 eptember 2002) Keywor: fractional Laplacian, fractional erivative, Riez potential,

More information

Regulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing

Regulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing Proceeding of the 44th IEEE Conference on Deciion and Control, and the Euroean Control Conference 005 Seville, Sain, December 1-15, 005 WeB14.5 Regulated Maximal Matching: A Ditributed Scheduling Algorithm

More information

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,

More information

On General Laws of Complex Networks

On General Laws of Complex Networks On Genera Laws of Compex etwors Wenjun Xiao, Limin Peng, an ehrooz Parhami 3 Schoo of Software Engineering, South China University of Technoogy, Guangzhou 5064, P.R. China wjxiao@scut.eu.cn Department

More information

Latitude dependence of the maximum duration of a total solar eclipse

Latitude dependence of the maximum duration of a total solar eclipse Latitue epenence of the axiu uration of a total olar eclipe Author: Jen Buu, with aitance fro Jean Meeu Contact: 6 Baker Street, Gayton, Northant, NN7 3EZ, UK jbuu@btinternet.co Introuction It i well known

More information

SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE

SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE Selin Özçıra Nur Bekiroğlu Engin Ayçiçek e-mail: ozcira@yiliz.eu.tr e-mail: nbekir@yiliz.eu.tr e-mail: eaycicek@yiliz.eu.tr

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment.

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment. ManuafortheInternaQuaityAuranceforHigherEducationIntitution : Commiion on Higher Education, Minitry of Education : Bangkok, Thaiand 2008 PREFACE 44 p. The Higher Education Interna Quaity Aurance Committee

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Tripping Current and Short Circuit Current of High Voltage Tester

Tripping Current and Short Circuit Current of High Voltage Tester Tripping Current an Short Circuit Current of igh oltage Teter Xu hezhun Wang Keqin Abtract: Tripping current an hort circuit current are iportant technical pecification of high voltage teter, an frequently

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS

FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS A. Gonzáez, F. M. Echavarren, L. Rouco, T. Gómez Intituto de Invetigación Tecnoógica Univeridad Pontiicia Comia Madrid,

More information

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected. 12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy

More information

DoSAM Domain-Specific Software Architecture Comparison Model *

DoSAM Domain-Specific Software Architecture Comparison Model * DoSAM Domain-Specific Software Architecture Comparion Moel * Klau Bergner 1, Anrea Rauch 2, Marc Sihling 1, Thoma Ternité 2 1 4Soft GmbH Mitterertraße 3 D-80336 Munich, Germany {bergner ihling}@4oft.e

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or

More information

Bob York. Simple FET DC Bias Circuits

Bob York. Simple FET DC Bias Circuits Bob York Simple FET DC Bia Circuit Loa-Line an Q-point Conier the effect of a rain reitor in the comnon-ource configuration: Smaller + g D out KL: Thi i the equation of a line that can be uperimpoe on

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

8 TWO-WAY SLABS. Figure 1: Two way slabs

8 TWO-WAY SLABS. Figure 1: Two way slabs 1 8 TWO-WAY SLABS To-ay Sab: When the ratio (L/ S) i e than 2.0, it i caed to-ay ab, hon in Figure 1. Bending i take pace in the to direction in a dih-ike form. Accordingy, main reinforcement i required

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Numerical Simulation and Experimental Verification of Air Flow through a Heated Pipe

Numerical Simulation and Experimental Verification of Air Flow through a Heated Pipe International Journal of Mechanical & Mechatronic Engineering IJMME-IJENS Vol:0 No:02 7 Numerical Simulation and Exerimental Verification of Air Flow through a Heated Pie Qaier Abba, M. Mahabat Khan, Rizwan

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Salesforce Compensation: An Analytical and Empirical Examination of the Agency Theoretic Approach

Salesforce Compensation: An Analytical and Empirical Examination of the Agency Theoretic Approach Saleforce Compenation: An Analytical an Empirical Examination of the Agency Theoretic Approach Sanjog Mira, Anne Coughlan an Charavarthi Naraimhan 1 Forthcoming in Quantitative an Mareting Economic 1 Sanjog

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Weighing Risk and Uncertainty

Weighing Risk and Uncertainty Pychological Review 1995, Vol. 12, No. 2,269-283 Copyright 1995 by the American Pychological Aociation, Inc. OOM-295X/95/S3. Weighing Rik an Uncertainty Amo Tverky an Craig R. Fox Stanfor Univerity Deciion

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA From: FLAIRS-02 Proceeding. Copyright 2002, AAAI (www.aaai.org). A right reerved. Sytem Refinement in Practice Uing a Forma Method to Modify Rea Life Knowedge Rainer Knauf and Ika Phiippow Imenau Technica

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE www.brother.eu INTRODUCING THE NEW COMPACT MONO LASER RANGE BUSINESS QUALITY PRINTING FOR YOUR OFFICE Brother undertand that your office run on information.

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Reearch an Application 8 (009) 16 7 Content lit available at ScienceDirect Electronic Commerce Reearch an Application journal homepage www.elevier.com/locate/ecra Pricing iplay a an

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Detecting App-DDoS Attacks Based on Marking Access and d-svdd

Detecting App-DDoS Attacks Based on Marking Access and d-svdd Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 Detecting App-DDoS Attack Baed on Marking Acce and d-svdd LI Jin-ing, WANG Bin-qiang Nationa Digita

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Online Budgeted Matching in Random Input Models with applications to Adwords

Online Budgeted Matching in Random Input Models with applications to Adwords Online Budgeted Matching in Random Inut Model with alication to Adword Gagan Goel Aranyak Mehta Abtract We tudy an online aignment roblem, motivated by Adword Allocation, in which querie are to be aigned

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Pipe Flow Calculations

Pipe Flow Calculations Pipe Flow Calculation R. Shankar Subramanian epartment o Chemical and Biomolecular Engineering Clarkon Univerity We begin with ome reult that we hall ue when making riction lo calculation or teady, ully

More information

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique 21 11th. Int. Conf. Contro, Automation, Robotic and Viion Singapore, 5-8th December 21 Active Sway Contro of a Singe Penduum Gantry Crane Sytem uing Output-Deayed Feedback Contro echnique Rajeeb Dey, Nihant

More information

McAfee Total Protection

McAfee Total Protection McAfee Total Protection Reduce the comlexity and cot of managing ecurity Protect what you value. 06 0 o t 4-- N #4 O VERSI 8 07020 McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054 888.847.8766 www.mcafee.com

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

Independent Samples T- test

Independent Samples T- test Independent Sample T- tet With previou tet, we were intereted in comparing a ingle ample with a population With mot reearch, you do not have knowledge about the population -- you don t know the population

More information

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure IJCSI International Journal of Computer Science Iue, Vol. 9, Iue, No, January 0 ISSN (Online): 694-084 www.ijcsi.org 3 Hole Detection for Increaing Coverage in Wirele Senor Network Uing Triangular Structure

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE A GUIDE TO LUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE Content Pae No. Summary Interretin School Value Added Score 2 What i Value Added? 3 Calculatin Puil Value

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Content Multi-homing: an Alternative Approach

Content Multi-homing: an Alternative Approach Content Muti-homing: an Aternative Aroach Technica Reort HKUST-CS14-01 Jason Min Wang 1, Jun Zhang 2, Brahim Bensaou 1 1 Deartment of Comuter Science and Engineering, The Hong Kong Universit of Science

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2013 SCHOOL PERFORMANCE TABLES & RAISEonline

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2013 SCHOOL PERFORMANCE TABLES & RAISEonline A GUIDE TO LUE ADDED KEY STAGE 2 TO 4 IN 2013 SCHOOL PERFORMANCE TABLES & RAISEonline Content Summary Interretin School and Puil Grou Value Added Score Pae No. What i Value Added? 3 Calculatin Puil Value

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Rereentative Allocation for Dilay Advertiing Arita Ghoh Preton McAfee Kihore Paineni Sergei Vailvitkii Abtract Dilay advertiing ha traditionally been old via guaranteed contract a guaranteed

More information

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315

More information

Solved Problems Chapter 3: Mechanical Systems

Solved Problems Chapter 3: Mechanical Systems ME 43: Sytem Dynamic and Contro Probem A-3-8- Soved Probem Chapter 3: Mechanica Sytem In Figure 3-3, the impe penduum hown conit of a phere of ma m upended by a tring of negigibe ma. Negecting the eongation

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Journal of Urban Economics

Journal of Urban Economics Journa of Urban Economics 67 (2010) 206 218 Contents ists avaiabe at ScienceDirect Journa of Urban Economics www.esevier.com/ocate/jue Marriage an the city: Search frictions an sorting of singes Pieter

More information

INSIDE REPUTATION BULLETIN

INSIDE REPUTATION BULLETIN email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses Proceeding of the Internationa uticonference of Engineer and Computer Scientit 25 Vo II, IECS 25, arch 8-2, 25, Hong Kong Deign of Channe Fiter baed on Aymmetric One-Dimeniona Defective Photonic Cryta

More information

Congestion and price competition in the cloud

Congestion and price competition in the cloud Congetion and rice cometition in the cloud Jonatha Anelmi, Danilo Ardagna, Adam Wierman 3 BCAM, Politecnico di Milano, 3 California Intitute of Technolog Abtract Thi aer rooe a model to tud the interaction

More information

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,

More information