AnArchitectureforConsumer-OrientedOnlineDatabaseServices. chargesonaverage$0.08perdatamessagetoorfrom. thesizeofthemessage),anddatabroadcastingcorp.
|
|
- Carmella Moody
- 8 years ago
- Views:
Transcription
1 AnArchitectureforConsumer-OrientedOnlineDatabaseServices PrasadSistlay,OuriWolfsony,SonDaoz,KailashNarayanany,RamyaRajy Abstract Inthispaperweintroduceanarchitectureforonline databaseservicesorientedtowardsconsumers.we identifytwotypesofcosts accesscostandcommunicationcost.wedemonstratethatdynamicallocation ofdatacanminimizethesecosts.wedosobypresentingecientalgorithmsbasedondynamicallocation; thesealgorithmsoptimizeaccessandcommunication costsforvariouscostmodels,accesspatterns,andretrievalprotocols. 1Introduction Wearewitnessingtheemergenceofanewformofcomputing/communicationenvironment,calledconsumer (asopposedtobusiness)computing.insuchanenvironment,tensofmillionsofconsumerswillcarry portablecomputersequippedwithwirelessdatacommunicatorsthatenableaccesstoalargenumberof databases,digitallibraries,andotheronlineservices. Thepotentialmarketforthisactivityisestimatedto bebillionsofdollarsannually.forexample,passengerswillaccessairlineandothercarriersschedules, aswellasweatherinformation.investorswillaccess pricesofnancialinstruments,salespeoplewillaccess priceandinventorydata,routeplanningcomputersin carswillaccesstracinformation,andcallerswillaccesslocationdependentdata(e.g.whereisthenearest doctor[1]). Therewillbetwotypesofchargesincurredinthis information-at-your-ngertipsenvironment,namely accessandcommunicationcharges.accesscharges willbepaidtotheinformationprovider,andcommunicationchargeswillbepaidtothenetworkprovider. thisresearchwassupportedinpartbynsfgrantnumbersiri andiri ,andafosrgrantnumber F yelectricalengineeringandcomputersciencedepartment, UniversityofIllinois,Chicago,Illinois60607 zhughesresearchlaboratories,informationscienceslaboratory,malibu,ca Forexample,currentlyRAMMobileDataCorp. chargesonaverage$0.08perdatamessagetoorfrom themobilecomputer(theactualchargedependson thesizeofthemessage),anddatabroadcastingcorp. chargesforprovidingthepricesofnancialinstruments.similarly,thesetwotypesofchargesareincurredtodayinvoicecommunication,whencalling900 numbers. Webelievethatthesechargeswillbethedriving forcethatdeterminestheoverallsystemarchitecture, andtheavailableaccessmodesandprotocols.both typesofchargescanbeoptimizedbythedynamicallocationprinciple.thisprinciplestatesthatwhena customerreadsadata-itemmorefrequentlythanthe dataitemisupdated,thentheamountofdatatransfersisminimizedifthecustomerhasasubscriptionto receiveallthechangestothedataitem;andviceversa, whenacustomerreadsadata-itemlessfrequently thanthedataitemisupdated,thentheamountof datatransfersisminimizedifthecustomerdemands thedataitemfromtheonlineserverateachaccess. Inotherwords,acopyofthedataitemshouldbedynamicallyallocatedanddeallocatedatthecustomer's computer,dependingonthefrequencyofcustomerreadscomparedtothefrequencyofdata-item-writes. Thewayinwhichthisprinciplecanbeapplieddependsontheaccessandcommunicationcoststructures,thetypeofknowledgeabouttheaccesspattern totheonlineservice,andtheretrievalprotocolsthat areused.forexample,ifadatatransferon-demandis twiceasexpensiveasadatatransferbysubscription, thencostisoptimizedifasecondcopyofthedataitem iscreatedwhenthenumberofreadsismorethanhalf thenumberofwrites. Inthispaperwedemonstratetheapplicationofthe dynamicallocationprincipleforcostoptimization.we dosoinanarchitecturewepropose,andforseveral typesofaccesspatterns,costmodels,andretrieval protocols.althoughthearchitectureandthecost modelsseemreasonabletous,werealizethatcurrently
2 theindustryisinitsinfancy,andthewaythesefactorswillevolvedependsoncompetitivemarketforces andtechnologicaladvancesthatarehardtopredict atthispointintime.however,webelievethatthe principlecanbeappliedinmanyotherscenariosthat willemerge. Weconsiderthefollowingretrievalprotocols.Assumethatacustomeraccessesthepricesofaportfolio ofstocks.theaccesscanusethesubscriptionprotocol,inwhichthecustomerreceiveseveryupdatetoa portfolio-stockprice,ortheon-demandprotocol,in whichthecustomerrequeststheportfoliopriceswhen needed.theon-demandprotocolmayhaveacache- Invalidationoption,inwhich,followingatransferof thedata-itemtothecustomer,theserverinformsthe customerwhentherstupdatetothedata-itemoccurs,withoutprovidingthenewvalue.thesubscriptionprotocolmaybeparameterizedfordivergence,allowingselectivetransmissionofupdates;forexample, thecustomermayrequestarefreshonlywhenhis/her copydivergesfromthemostup-to-datecopyby3updates,or3%,or3minutes(see[2,3,4]). Weenvisionthatthecustomerwilluseoneofthese retrievalprotocols,andtheonethatoptimizesthe accesscostdependsontwofactors:theaccesscost model,andtheaccesspatterntype.furthermore,the usermaybeabletochangetheretrievalprotocolas theaccesspatternchanges.forexample,theusermay retrievebysubscriptionbetween9amand10am,and on-demandbetween10amand11am. Foroptimizingthecommunicationcost,theretrievalprotocolmayalsobeabletomakeuseof thebroadcastoption.specically,theinformation providermaybeabletochoosewhethertobroadcast aparticularupdateitreceives,ortotransmititina point-to-pointfashiontooneormorecustomers.obviously,whenbroadcastinginformationthatinvolves anaccesscost,thedatawillhavetobeencrypted,so thatonlytheownersofadecryptionkeywillbeable todecipherit. Thecostmodelmaybetime-basedorrequestbased,andthecustomermayhaveachoicebetween thetwo.inatime-basedmodel,thereisaatfeeper timeperiod,e.g.amonth.thisenablesthecustomer toreceiveallthepriceupdatestohisstockportfolio. Inarequest-basedmodelthecustomerischargedper transferofinformation,wherethetransfermaybea resultofsubscriptionordemand. Theoptimalretrievalprotocolalsodependsonthe access-pattern.theaccesspatterntoadatabaseview (e.g.thestockportfolio)isthepatternofreads(by thecustomer)andupdates(bythedatabaseserver) oftheview.thetypesofaccesspatternsthatwe consideraredeterministic,partiallydeterministic,and probabilistic.inadeterministicaccess-pattern,the customer/information-providerknowthetimeofeach readandeachupdate(e.g.thecustomermayknow thats/hereadsthevalueofthedatabaseviewevery dayat5pm,andtheviewisupdatedatmidnight). Inapartiallydeterministicaccesspattern,foreach timeslot(e.g.between9amand10am)thenumber ofreadsandwritesisknown,althoughtheexacttime ofeachaccessisnotknown.inaprobabilisticaccess pattern,expectednumberofreadsandandtheexpectednumberofwritesineachtimeslotareknown. Thecustomerand/ortheinformation-providerdene theaccesspattern,andinputittoanalgorithmthat selectstheoptimalretrievalprotocolforeachslot. Currently,wearebuildingasystemcalledWireless- View,tobeinstalledinmobilecomputersthataccess onlineservices.itreceivesasparameterstheexpected accesspatternandthecostmodel,andselectsaretrievalprotocolthatoptimizestheoverallcost.inthis paperwedescribehowthesystemmakesthisselection forthecostmodels,accesspatterns,andretrievalprotocolsdiscussedabove.somecombinationsof(costmodel,access-pattern-model,retrieval-protocol)have astraight-forwardformulaforcomputingthetotal cost,othersaremorechallenging.forexample,the (linear-time)allocationalgorithmforpartiallydeterministicpatternsinthetimebasedaccess-costmodel wasdiculttodevise,particularlyifthepatternis periodicand/orestimated(i.e.thenumberofreads (writes)inthenexttime-slotisestimatedastheaverageofthenumberofreads(writes)inthelastj slots).thingsarefurthercomplicatedbythefactthat notallprotocolsforcommunication-costoptimization arecompatiblewithprotocolsforaccess-costoptimization. Insummary,themaincontributionsofthispaper areasfollows. Wedemonstratetheapplicationofthedynamic allocationprincipleforcostoptimizationinaccessingonlineservices. Weintroduceanarchitectureforonlinedatabase
3 servicesinaconsumer-orientedenvironment. Weoutlineseveralcostmodelsandfactorsaectingthesecosts. Wepresentecientalgorithmsforoptimizing thesecostsforvariousaccesspatternsandretrievalprotocols. Nowwediscussrelevantwork.Inapreviouspaper ([7]),wehavealsodiscussedoptimalretrievalprotocols,butthatworkwasrestrictedtoaparticularscenariopresentedhere,namelyoptimizationofcommunicationcostforprobabilisticaccesspatternsinthe requestbasedcostmodel.theworkin[8,9]isalso relevanttothispaperbutthatworkconcentrateson broadcasting,whichisnotacentralthemeofourpaper.thewireless-viewsystemdiscussedabovewas conceivedin[6]. Therestofthepaperisorganizedasfollows.Section2discussesthearchitectureofatypicalconsumerorientedonline-servicesenvironment.InSections3 and4wediscussalgorithmsforaccesscostoptimization.section3concentratesonthetimebasedcost model,andsection4concentratesontherequest basedcostmodel.section5,discussescommunicationcostoptimizationbetweentheserveragentand theserver. 2Architecture Theenvironmentconsistsofthreeindependentfunctionalentities,thedatabasepublisher,thenetwork provider,andthecustomers.thedatabasepublisher providesservicestowidegeographicareas,e.g.,the wholeus.thecustomersusemobile/portablecomputers,thusthesystemconsistsofasetmcofactive mobilecomputersandaserverstationarycomputer SCthatstorestheonlinedatabase.Weassumethat eachmobilecomputerinthesetmcisconnectedto SC,i.e.,itcansendandreceivemessagesfromtheSC. TheMCsetvariesovertimesincemobilecomputers candisconnect,turn-onando.althoughwereferto thecomputersinthesetmcasmobilecomputers, someofthemmaybeinaxedlocation,connected bywirelinestothexednetwork.whatmattersfor thepurposeofthispaperisthatthecomputersinthe setmcaccessonlinedatabasesanddigitallibraries usingthearchitectureoutlinedinthissection. Eachcustomerpaysaccesschargestothedatabase publisher,andthedatabasepublisherpaysthenetworkproviderforthecommunication.alternatively, thecustomermaypaycommunicationchargesdirectly tothenetworkprovider.insomecasestheaccess chargeiszero.forexample,iftheuserisasalesperson thataccessestheinventoryinformationinthecorporatedatabase,accesschargewillprobablybezero. Weconsiderretrievalandupdateofadatabase view,x.herexisdenedbyapredicate,anditmay containoneormoredataitems,oritmayconstitute thewholedatabase.forexample,xmaybetheibm stockprice,orthepriceofsomecollectionofstocks, oritmaybethesetofrecordsofaaightsoutof Chicagoon12/12/93,ormailboxoftheuserinthe servercomputer.inthelattercase,awriteistheadditionofamessagetoth box,andareadretrieves theunreadmessages. Weareconcernedwithreadsthatareissuedatthe mobilecomputersandwritesthatareissuedatthe servercomputer.thesearetherelevantrequests. TheuserretrievesinformationfromtheviewxeitherbySubscription,oron-Demand.ASubscription requeststhatallupdatestoxbetransmittedtothe user'smobilecomputer.wealsodiscussthecaseof selectivesubscriptions,wheretheupdateistransmittedonlywhensomethresholdisexceeded(e.g.the priceofthestockexceeds15,ortheviewinthemobilecomputerismorethan10minutesold). Inordertoaccessthedatabaseauserhastoinstall inhis/hermobilecomputerasoftwaremoduleprovidedbythedatabasepublisher.thissoftwaremoduleiscalledtheserveragent(sa);itprocessesthe requestsoftheclientagent(ca),i.e.theuseror his/hersoftware.thecareceivesdatabaseinformationfromthesa,andinturn,thesareceivesinformationfromtheserver. ThisarchitectureillustratedinFigure1. TheSAprovidestotheCAthefollowingservices foreachviewx. subscribe:unsolicitedly,transfertothecaeach updateofx,or,inthecaseofdivergencecaching, selectiveupdates.thetransferisreceivedand processedbythecawhiletheusermaybeusinghis/herconsumercomputerforvariousother purposes. cancelsubscription:thecaindicatestothesa
4 The Architecture Mobile Computer Mobile Computer Client Agent Figure1:Architecture Server Agent Server invalidate:thesaindicatestothecathatthere read:transfertothecathecurrentcontentsof withperformingotherfunctions. thattheclientdoesnotwaitforx,butproceeds x.thisrequestmaybeasynchronousinthesense theviewx. thatthecaisnottoreceivefurtherupdatesto Mobile Computer Mobile Computer els.therst,denotedacm1,isrequest-basedinthe accesscost.wewillconsidertwoaccess-costmod- AccessCost TheinteractionbetweentheSAandtheCAincurs wasanupdateofthex,withoutprovidingthenew followingsense.iftheuserhasasubscriptiontoreceivealltheupdatestox,then,foreachtransferofzero.thisisthecostmodelfortelephone(unlimited numberoflocalcalls)orcabletvservice.inthiscost contents. ablestheusertoreceiveallwritestotheviewforaat feepertimeunit(sayaday).inotherwords,the time-basedinthefollowingsense.asubscriptionen- costpertimeunitisxed,regardlessofthenumber isthecostmodelofnewspapersandmagazines,where thecostpercopyishigheratthenews-standthanfor subscription-delivery. ofwritespropagatedtotheuser.thereisalsoasubscriptioninitiationfee,if,whichisgreaterorequalto Thesecondaccesscostmodel,denotedACM2,is informationfromthedatabasetotheuser,theuser subscriptionrequestsdonotincuranaccesscost.this aquerytoreceivethecurrentcopyofx,thenthe notedsac.ontheotherhand,iftheusersubmits dacsac.weassumethattheinvalidateandcancel- costoftheserviceisdac(demand-access-cost),where ischargedasubscription-access-cost.thiscostisde-modeltheusercanalsosubmitaquerytoreceivethe currentcopyofx,ifs/hedoesnothaveasubscription. Thenthecostoftheserviceisdac.Inthiscostmodel theinvalidaterequestisnotbeingused,andthecancelsubscriptionrequestcarriesazeroaccess-cost. broadcastfacilitymaybeusedfortransmittinginval- CommunicationCost theserverandamobilecomputer.forexample,the point-to-pointandbroadcastcommunicationbetween Weassumethatthenetworkproviderenablesboth,
5 idationmessages,andthepoint-to-pointfacilitymay beusedfordata(thisistheschemeusedin[5]). ThecommunicationbetweentheSAandtheServer incurscommunicationcostasfollows.apointto-pointtransmissionofapage(orless)fromthe ServertotheClientcostscc(chargedbythenetwork provider),andthecostofarequest(toread)sentfrom theclienttotheserveris!.notethat!maybe higherthanccsinceuplinkcommunicationmaybe moreexpensivethandownlinkcommunication.the broadcastofapagefromtheservertoanarbitrary numberofclientscostsb. RetrievalProtocols Wewillconsiderthecostoftwobasicretrievalprotocolsforreadingdatafromtheviewx.Eachone oftheseprotocolscanbeusedforca'sinterfaceto retrievex-datafromthesa,andforsa'sinterfaceto retrievex-datafromtheserver.theobjectiveofeach interfaceistooptimizecost. ThearchitectureinvolvingaccessandcommunicationcostsisdepictedinFigure2. TheRetrievalProtocolsthatweconsiderareDemand,denotedD,andSubscription,denotedS.If thecaretrievesx-datafromthesausingdemand, itmeansthatthecarequeststhecurrentvalueofx foreachreadissuedbytheuser.inotherwords,the CAdoesnotkeepanup-to-datecopyofx.Similarly, ifthesaretrievesx-datafromtheserverusingdemand,itmeansthatthesarequeststhecurrentvalue ofxwheneverneeded. AsafeatureoftheDemandprotocoltheCA(SA) mayrequestcacheinvalidation.thismeansthatthe SA(server)sendsanindicationtotheCA(SA)whenevertheviewxisupdated.Sincethisindicationis cost-free,thefeatureenablestheclienttopayonly forreadsthatareimmediatelyprecededbyawrite. AnotherwaytoimplementCacheinvalidationisto chargetheuseronlyforreadsthatarepresentedwhen thevalueoftheviewxisdierentfromtheonethat existedwhentheimmediatelyprecedingreadwaspresented.thecacheinvalidationfeaturemayormay notbeavailable. IftheCAretrievesx-datafromtheSAusingSubscription,itmeansthattheCArequeststoautomaticallyreceivealltheupdatestotheviewx.Inother words,thecakeepsanup-to-datecopyofx.similarly,ifthesaretrievesx-datafromtheserverusing Subscription,itmeansthattheSArequeststoautomaticallyreceivealltheupdatestotheviewx.The Subscriptionaccessprotocolmaybeparameterizedfor divergence(see[3,4]).specically,thesubscription protocolreceivesaparameterthatenablesaselective transmissionofupdates.forexample,thecamay receiveoneinevery3updatestotheviewx.thiswill beelaborateduponinsection6. AccessPatterns ForagivenRetrievalProtocol,theaccessandcommunicationcostsdependonthecostmodel,which wediscussedabove,andonthetypeofaccesspattern,whichwediscussnext.theusercanprovide access-patterninformationinoneofseveraltypes. Oneisdeterministic,inwhichtheuserspeciesaset oftimestampedrelevantrequests.forexample,the userspeciesthatthereisawriteofxeveryhour onthehour,andreadsat4:05pm,4:30pm,4:50pm and6:05pm.clearly,foreachoneofthecostmodels andforeachprotocolthecostofagivenpatterncan becomputedinastraight-forwardmanner.unfortunately,accesspatterninformationisrarelyavailable inthisform. Asecondtypeofaccesspatternispartiallydeterministic,inwhichtheuserspeciesthenumberofrequestsforeachtimeunit.Forexampletheuserspeciesthatbetween9and10thereare3readsand4 writes,between10and11thereare2readsand5 writes,etc.determinacyisonlypartial,becausethe exacttimeofeachrequestisnotknown. Aspecialcaseofpartialdeterminismiswhenthe numberofrequestsineachtimeunit,insteadofbeing explicitisestimatedasafunctionofthepreviousn timeunits.forexample,thenumberofreadsinany particularhourisisestimatedtobetheaverageofthe numberofreadsineachofthelastvehours. Athirdtypeofaccesspatternisprobabilistic,in whichtheuserspeciestheexpectednumberofrequestsforeachtimeunit.weassumethatthenumbersofreadsandwritesineachtimeunitarerandom variables;weassumethatanypairoftheserandom variablesareindependent.thus,thismodelissimilar tothepartiallydeterministicone,exceptthattheparametersareexpectedintheprobabilisticsense,rather thanexactones.
6 Optimization Structure speciedforaperiodsuchasaday,aweek,oramonth. Figure2:OptimizationStructure Server Agent communication toeachconsumer(user)inorderfortheconsumerto access cost cost optimization optimization beabletooptimizetheaccesscost,andtheconsumer Client Agent providesthereadpatterntothedatabasepublisher,so Eachoneoftheaboveaccesspatterntypescanbe thatthelattercanoptimizethecommunicationcost. ItcanbespeciedthattheAccessPatternisrepeated eachperiod. Thedatabasepublisherprovidesthewritepatterntouse.Inthesecondsubsection,weconsideresti- matedpartiallydeterministicpatternandprovidean algorithmforaccesscostoptimization.inthethird subsection,weconsiderperiodicpartiallydeterministicpatterns.inthefourthsubsection,weconsiderthe RetrievalProtocolDemandwithCacheinvalidation. foreachslotinthepatternwhichofthetwoprotocols Thus,boththeClientandtheServerknowapriorithe Server Computer Mobile Computer typeofaccesspattern,anditsparameters.obviously, weassumethatthereadandwriteaccesspatternsare compatible,i.e.iftheconsumerprovidesaprobablisticreadpattern,thenthedatabasepublisheralso providesthewritepatterninaprobablisticformat,so thatboth,theconsumerandthedatabasepublisher, 3.1PartiallyDeterministicPattern, canarriveatacommonprobablisticaccesspattern. 3AccessCostOptimizationin WeconsidertheissueofaccesscostoptimizationbetweentheClientAgentandtheServerAgentinthe mobilecomputer.wehavetwocostmodels,three RetrievalprotocolsandavarietyofAccessPatterns. Thuswehaveanumberofpossiblecongurations.In thissectionweconsiderthetimebasedcostmodel thetime-basedcostmodelpredenedtimes,e.g.midnight.thus,wecandivide TimeBasedCostModel theentirepatternintoanumbernoftimeslots. Opt,forselectingtheoptimalretrievalprotocolsfora givenpartiallydeterministicaccesspattern.theobjectiveistooptimizeaccesscostinthetimebasedcost model.itisassumedthatwecansubscribeonlyat Inthissubsectionwepresentanalgorithm,called tiveoftheoptalgorithmistoproduceanallocation patterni.e.assignsubscriptionordemandtoeach Givenapartiallydeterministicpattern,theobjec- anddescribealgorithmsforaccesscostoptimization. timeslotinthepattern.thisdeterminestheretrieval Intherstsubsection,weconsidertheSubscriptionProtocolusedfortheslot.Wewillshowthatforthe anddemandretrievalprotocols,i.e.wedeterminegivenpattern,theallocationpatterngivesthemini- mumtotalaccesscost. inguntilitexaminessucientnumberoffutureslots. Thus,atanypointintheexecutionofthealgorithm, iteitherimmediatelydecidesaretrievalprotocolfor theslot,oritkeepsthedecisionfortheslotpend- theslotsoneafteranother.afterexaminingeachslot, ThealgorithmOptoperatesasfollows.Itexamines
7 SDDS DecidedSlotscs z} {?++ UndecidedSlots2r3wj5r6wj {z } UnexaminedSlots Figure3:ClassicationOfSlots thesequenceoftimeslotscanbedividedintothree types,(1)thesequenceofdecidedslotswhichoccur inthebeginning,followedby(2)thesequenceofundecidedslots,i.e.slotsthathavebeenexaminedbut forwhichadecisionispending,followedby(3)the sequenceofunexaminedslots.thedecidedslotsare theslotsforwhichsubscriptionordemandprotocol hasbeenassigned.thealgorithmusestwovariables statusandfus(rstundecidedslot).atanytimethe statusvariabledenotestheretrievalprotocolassigned tothelastdecidedslot,whilefusgivestheindex oftherstundecidedslot.thealgorithmalsouses aprecomputedvaluedfiforeachsloti.here,dfiis thedemandfeefortheithslotandiscomputedasthe productofthenumberofreadsintheithslotandthe demandaccesscostforasinglereadrequest.after theterminationofthealgorithm,thearrayvariable decisioncontainsthedecisionsthathavebeentaken foreachoftheslots.figure3showstheclassication ofthedierentslots. Initially,thestatusvariableisassignedDemand. ThealgorithmOptscanstheslotsonebyone,startingfromtherst.Foreachtimesloti,itcomputes (dfi?ff),wheredfiisthedemandfeeoftheithslot asdescribedabove,andffistheatfeepertime unit.assumethatthevalueofthestatusvariable isdemand.ifthedemandfee(dfi)islessthanor equaltoatfee(ff),i.e.(dfi?ff)0,thealgorithmoptallocatesdemandtothecurrent(ith) slot.ifthedemandfeeisgreaterthantheatfee,i.e. (dfi?ff)>0,itmeansthatsubscriptionischeaper thandemand.however,wecannotassignsubscriptionwheneverthisconditionissatised,becausesubscriptionalsoinvolvesthepaymentoftheinitiation fee(if).so,wecheckwhetherthedemandfee(dfi)is greaterthantheatfee(ff)byif,i.e.dfi?ffif. However,iftheconditionisnotsatisedforasingle slot,wecannotassigndemandtothatslot.thisis becausethecumulativesum(cs)of(dfi?ff)forasequenceofconsecutiveslotsmaysatisfythecondition, i.e.p(dfi?ff)if,althoughforeachindividual slotithedierence(dfi?ff)maybepositiveornegative.so,algorithmoptproceedstothenextslotand computesthecumulativesum(cs),p(dfi?ff). Insummary,whenthevalueofthestatusvariable isdemand(i.e.theretrievalprotocolassignedtothe lastdecidedslotisdemand),thedemandprotocol isassignedtoalltheundecidedslots,i.e.fromthe FirstUndecidedSlottothecurrent(ith)slot,whenevercs0.Ifcsif,thenSubscriptionisassigned toalltheundecidedslotsandthestatusvariablebecomessubscription.ifneitheroftheaboveconditions issatised,thealgorithmproceedstothenextslotand computesthecumulativesumandrepeatstheabove operations. IfthestatusisSubscription,itmeansthattheinitiationfeehasbeenpaid,andwecanallocateSubscriptiontoalltheUndecidedslotswheneverthecumulativesum(cs),Pdfi?ff0.Ifthecs<0,itmeans thatdemandischeaperfortheundecidedslots.however,wecannotchoosedemandifjcsj<if,because ifwehavesubscriptioninanunexaminedslot,we wouldbepayingmoreinswitchingbacktosubscription.thusthealgorithmoptchecksifjcsjif, i.e.itchecksifinitiationfeeisrecoverable.ifso,the algorithmchoosesdemandfortheundecidedslots. Insummary,whenthestatusisSubscription,the SubscriptionprotocolisallocatedtoalltheUndecided slotswhenevercs0.ifcs<0andjcsjif,then DemandisassignedtoalltheUndecidedslotsand thestatusbecomesdemand.ifneitheroftheabove conditionsissatised,thealgorithmoptproceedsto thenextslotandcomputesthecsandrepeatsthe aboveoperations. Ifweareunabletoarriveatadecisionbasedonthe cumulativesumandwereachtheendofthepattern, therearetwopossiblecases,cs<0and0<cs<if. Ineithercase,thealgorithmOptchoosesDemandfor alltheundecidedslots.thisisjustiedbecause,if cs<0,demandischeaperandif0<cs<if,it meansthattheinitiationfeeisnotrecoverable. Aformalpresentationofthealgorithmisgivenin theappendix.
8 3.2EstimatedPartiallyDeterministic Pattern Thissubsectionconsidersestimatedpartiallydeterministicpatternsinwhichthenumberofreads (writes)inthenexttimeslotisestimatedtobethe ooraverageofthenumbersofreads(writes)inthe lastjtimeslots.theallocationalgorithmison-line andatthebeginningofeachtimeslot,itcomputes theestimatedvalueofthenumberofreadsforthe nextoneormoretimeslots,andusestheseestimated valuesforselectingdemandorsubscriptionforthe nexttimeslot. TheOptalgorithmforthepartiallydeterministic patternsgivenintheprevioussectioncanbeadapted totheabovesettingbycombiningitwiththecomputationoftheestimatedvalues,asfollows.atruntime, attheendofeachtimeslot,theestimatednumberof readsforthenexttimeslotiscomputed.then,algorithmoptisusedtocheckifadecisioncanbereached; ifso,weusethecorrespondingselection.otherwise, i.e.iftheslotisundecided,wecomputetheestimated valuesforthetimeslotafterthenext,andrepeatthe aboveprocedureuntiladecisionaboutthenexttime slot(whichisthefirstundecidedslot)canbemade. Itcanbeshownthattheestimatedvalueswilleventuallyconverge,andafterthisthecumulativesum(i.e. thevalueofthevariablecs)ofthealgorithmopt(see section3.1)willmonotonicallyincreaseordecrease; atthattime,wechoosesubscriptionforthenexttime slotifthecumulativesummonotonicallyincreases, otherwisewechoosedemandforthenexttimeslot. Itcanbeshownthattheestimatedvaluesconverge withinciterationswherecisafunctionofjandthe maximumnumberofreadsinanyofthelastjtime slots. Wehaveasimplerandmoreecientmethodfor thecasej=2,butweomitthisdiscussionforspace considerations. 3.3PeriodicPartiallyDeterministic Pattern Anotherspecialcaseofpartialdeterminismisthe casewhentheaccesspatternisperiodic.here,the numbersofreadsandwritesareknownforeachslot inoneperiodofthepattern.thesamepatternrepeats periodically,innitely. DDSSDD 2kDD 1SD Figure4:Non-trivialCase DDD+?k?+?+? {z } UndecidedSlotsk + DDDSSkSSSSSkS Figure5:FUSinthe1stperiod Theallocationpatternobtainedfortherstperiod cannotbedirectlyassignedtoalltheotherperiodsfor thefollowingreason.whenweconsidertwoadjacent periodswemayhavethecaseillustratedinfigure4. There,thesegments1and2areinbetweentwo Subscriptionslots.Itispossiblethatthecumulative sumofallslotsin1and2isgreaterthan?if.ifthis isthecase,thenallslotsin1and2shouldbeallocated Subscription.Forthisreasonwemodifythealgorithm asfollowsandapplytothersttwoperiods.theopt algorithmismodiedsothatifeitheroftheinner Repeatloopsterminatebecausetheendofthesecond periodisreached,thenforalltheundecidedslotsfrom FirstUndecidedSlottotheendofthesecondperiod, theallocationpatternischosenasfollows.ifthefirst UndecidedSlotisintherstperiod,thenwechoose SubscriptionforalloftheUndecidedslots.Thisis illustratedinfigure5.otherwise,i.e.,ifthefirst UndecidedSlotisinthesecondperiod,thenforeach ithslot(ifus)inthesecondperiod,wechoose theallocationpatternofthecorrespondingslotsin therstperiod.thisisillustratedinfigure6. Forallotherperiods,followingthesecondperiod, werepeattheallocationpatternofthesecondperiod. Theaboveallocationmethodcanbeshowntoproduceanoptimalallocationpattern.Theproofofcorrectnessofthismethodisomittedduetolackofspace.
9 SSDDS j1s kkssddundecidedslots z} { + 2j1+ 2k + SSDSDSSkSSDDSS Figure6:FUSinthe2ndperiod 3.4DemandwithCacheinvalidation InthissubsectionweconsidertheRetrievalProtocols SubscriptionandDemandwithCacheinvalidation. Weassumethatthepatternispartiallydeterministic. Theobjectiveistooptimizeaccesscostinthetime basedcostmodel.intheretrievalprotocoldemandwith-cache-invalidation,theclienthastopayonlyfor thereadsthatareimmediatelyprecededbyawrite, i.e.thecriticalreads.theexpectednumberofcriticalreadsnc,assumingthattherearenrreadsand nwwritesinatimeslotandassumingthattheyare uniformlydistributed,isgivenasfollows. nc=nrnw nr+nw Thentheexpecteddemandfeeforaslotisncdac. Withthisreviseddemandfee,thealgorithmOptcan beappliedverbatimforaccesscostoptimization. Thealgorithmsthatoptimizeaccesscostforthe estimatedandperiodicpatternscanalsobeapplied verbatimusingthesoreviseddemandfee. 4AccessCostOptimization intherequest-basedcost Model Inthissection,weconsiderthecombinations(AccessPattern,RetrievalProtocol)intherequestbased costmodel,andwedevelopalgorithmsforaccesscost optimization. Intherequestbasedcostmodel,whenevertheuser submitsaquerytoreceivethecurrentcopyoftheview x,thenthecostoftheserviceisdemand-access-cost (dac).iftheuserhasasubscriptiontoreceiveall theupdatestox,thenforeachtransferofinformationfromtheservertotheuser,theuserischargeda subscription-access-cost(sac). Firstweconsiderthecaseinwhichthepossible choicesofretrievalprotocolsaresubscriptionanddemand,i.e.thecache-invalidationoptionisunavailable.asbefore,therearethreetypesofaccesspatterns,i.e.deterministic,partiallydeterministicand probabilistic. Foreachtypeofaccesspattern,thealgorithmfor accesscostoptimizationistrivial.foreachtimeslot iweneedtocomparethesubscriptionfeesi=nw sacandthedemandfeedi=nrdac,andassignthe protocolthatincursalowercost. Now,whatexactlyarenrandnwintheaboveformula?Iftheaccesspatternisdeterministic,theClient needstopayonlyforthosereadsthatfollowawrite. Thusnristhenumberofreadsthatimmediatelyfollowawrite,andnwisthetotalnumberofwritesin theslot. Iftheaccesspatternispartiallydeterministic,we aregiventhenumberofreads(nr)andwrites(nw)in everytimeslot. Iftheaccesspatternisprobabilistic,nristheexpectednumberofreadsintimeunit,andnwisthe expectednumberofwritesinunittime.obviously, intheprobabilisticcase,thecostoptimizedistheexpectedcostratherthantheexactone. Nowassumethatthecacheinvalidationoptionis available.asbefore,foreachtypeofaccesspattern wecomparethesubscriptioncost,si=nwsacwith thedemandcost,di=ncdac,andchoosetheprotocolthatgivestheminimalcostforthatslot.theonly dierenceisthatweusenc(ratherthannr).thisis thenumberofcriticalreads,i.e.readsthatimmediatelyfollowawriteintheslot. 5CommunicationCostOptimization InthissectionweconsidertheissueofcommunicationcostoptimizationbetweentheServerandthe ServerAgentinthemobilecomputer.Again,there arethreeretrievalprotocolsthatcouldbeusedbythe ServerAgent,i.e.Subscription(S),Demand(D),and DemandwithCacheinvalidation(DCI). WeassumethattheRetrievalProtocolbetweenthe ClientAgentandtheServerAgent(calledtheAccess Protocol)hasbeenxed.Thereasonisthatthecon-
10 sumercan,independentlyofthedatabasepublisher, selectaretrievalprotocolforaccesscostoptimization. Thisimposesaconstraintonthepossiblechoicesof RetrievalProtocolsbetweentheServerAgentandthe Server(calledtheCommunicationProtocol).Inorder toseethisconsiderthefollowingcase.lettheretrieval protocolbetweentheserveragentandtheclientbe Subscription.ThenalltheupdateshavetobepropagatedbytheServerAgenttotheClient.Itisclearly evidentthatdemandcannotbeusedastheretrieval ProtocolbetweentheServerAgentandtheServer. Thusinthiscase,theonlyavailableretrievalprotocol betweentheserveragentandtheserverissubscription.thetablebelowgivesthepossiblechoicesof RetrievalProtocolsbetweentheServerAgentandthe Server,foragivenprotocolbetweentheClientAgent andtheserveragent. AccessProtocolCommunicationProtocol Subscription Subscription Demand Subscription Demand Demand Demand DCI DCI DCI DCI Subscription Fortherestofthissectionweassumethataccess patternispartiallydeterministic,butourapproach canbeappliedtoothertypesofaccess-patterns.now weselectforeverymobilecomputerandforeverytime slottheretrievalprotocolthatminimizesthepoint-topoint(ptp)transmissioncost,fromtheavailableprotocolchoices.ifthebroadcastmodeisunavailablethen ourprotocolselectionprocessendshere.thus,assume fortherestofthissectionthatbroadcastisavailable. Wewilldeterminewhetherornotthebroadcastmode canfurtherreducethecostoftheoptimalptpprotocol.asmentionedinsection2,thebroadcast-costof asinglewrite/pageisb,andatthiscostthepagecan besenttoalltheactivemobilecomputers. Assumethatthenumberofmobilecomputersthat areactive,i.e.turnedon,atanypointintimeis knownapriori,andtheaccesspatternofeachoneof themisalsoknown.thisisthecase,forexample, inacompanythathasaxednumberofsalespersons accessingtheinventorydatabase.thenwecompute thefollowinginequalityforeachtimeslot. Bnwk1nwcc+k2 Xi=1nri(cc+!)+k3 Xi=1nci(2cc+!) Intheaboveformulak1isthenumberofmobile computerswithsubscriptionastheoptimalptpretrievalprotocol,andnwisthenumberofwritesin thetimeslot.observethatnwisidenticalintheaccesspatternsofallmobilecomputers,sinceitisthe numberofwritesattheserver,andisindependent ofaparticularmobilecomputer.k2isthenumber ofmobilecomputerswithdemandastheoptimalptp protocol;nriisthenumberofreadsoftheithsuchmobilecomputer.k3isthenumberofmobilecomputers withdemand-with-cache-invalidationastheoptimal ptpprotocol;nciisthenumberofcriticalreads(forthe methodofcomputingthenumberofcriticalreads,see subsection3.4)oftheithsuchmobilecomputer. Iftheaboveinequalityissatised,thenthecostof broadcastingeachwriteislessexpensivethanthetotalcostofusingtheoptimalptpcommunicationprotocolforeachmobilecomputer.theneachsawill usethesubscriptioncommunicationprotocol(which, ascanbeseenfromtheprevioustable,iscompatiblewitheveryaccessprotocol),andthedatawillbe broadcastedduringthistimeslot.otherwise,i.e.if theinequalityisnotsatised,eachmobilecomputer willuseintheslottheoptimalptpprotocolselected intherststage. Now,whetherornotthenumberofactivemobile computersisknownapriori,consideratimeslotin whichsubscription-with-broadcastisnottheoptimal protocol.atruntime,thebroadcastmodecanstillbe usedtoreducecommunicationcost,asfollows.when awriteisreceivedattheserver,thedatabaseserver computesk,thethenumberofmobilecomputersthat haveasubscriptiontoreceivethewriteinaptpmode, or,havetoreceiveaninvalidationptpmessageasaresultofthewrite.thentheserverdetermineswhether thefollowinginequalityissatised. Bkcc ccisthecostofptptransmissionofasinglepage.ifthe aboveinequalityholds,thewriteisbroadcasted.otherwisethewriteand`invalidate'messagesaretransmittedpoint-to-point.
11 References [1]TomaszImielinskiandB.R.Badrinath.Mobile WirelessComputing:ChallengesinDataManagement.CommunicationsoftheACM,37:(10), Oct.1994 [2]R.Alonso,D.Barbara,andH.Garcia-Molina. Quasi-copies:Ecientdatasharingforinformationretrievalsystems.InProc.ofEDBT'88, LNCS303.SpringerVerlag,1988. [3]R.Alonso,D.Barbara,andH.Garcia-Molina. Datacachingissuesinaninformationretrieval system.acmtrans.databasesyst.,15(3):359{ 384,1990. [4]Y.Huang,R.Sloan,O.Wolfson.Divergence CachinginClient-ServerArchitectures.ProceedingsofthethirdInternationalConference onparallelanddistributedinformationsystems (PDIS),Austin,TX,Sept.1994,pp [5]DanielBarbara,TomaszImielinski.Sleepersand Workaholics:CachingStrategiesinMobileEnvironments.ACMSigmod,1994. [6]O.Wolfson.DataAllocationinMobileComputing:AProjectDescription.Proceedingsofthe IEEEWorkshoponAdvancesinParallelandDistributedSystems,Princeton,NJ,Oct.1993,pp [7]Y.Huang,P.Sistla,O.Wolfson.DataReplicationforMobileComputers.Proceedingsofthe ACM-SIGMOD1994,InternationalConference onmanagementofdata,minneapolis,mn,may 1994,pp [8]Tzi-ckerChiueh.SchedulingforBroadcast-based FileSystems.MobidataWorkshop,Nov [9]S.Acharya,R.Alonso,M.Franklin,S.Zdonik. BroadcastDisks:DataManagementForAsymmetricCommunicationEnvironments.ProceedingsoftheACM-SIGMOD1995,International ConferenceonManagementofData. TheAlgorithmOpt fi:=1 last:=n status:=demand whileilast fcs:=0 FUS:=i Ifstatus=Demand frepeat cs:=cs+(dfi?ff) i:=i+1 until((cs0)w(csif)w(i>last)) if(csif) status:=subscription g elsefrepeat cs:=cs+(dfi?ff) i:=i+1 until((cs0)w(cs?if)w(i>last)) if((cs?if)w(i>last)) status:=demand g forj=fusuptoi?1 decision[j]=status g g
''Get to know the ECOWAS''
''Get to know the ECOWAS'' Fostering peace, security and democracy in West Africa is one of the main objectives of the Economic Community of West African States (ECOWAS). In 12 essays, young West African
More informationNSD ERP - Integrated Solutions NSD ERP SYSTEM. Flow chart. Copyright 2009 NSD, All rights reserved
Integrated Applications System Flow chart is an Integrated Applications System We prepared this document, asanoverview, in order to give you a bi briefidea about the Flowchart ( integration ti ) of the
More informationWho needs an ERP system anyway? Nitin Kale kale@usc.edu Information Technology Program, VSoE Spring 2013
Who needs an ERP system anyway? Nitin Kale kale@usc.edu Information Technology Program, VSoE Spring 2013 Outline Why ERP? SAP Background SAP Architecture Integrated Business Process Sales About ITP/SAP
More informationAirWatch Education Pricing. Effective January 1 st, 2012 Expires March 31 st, 2012
AirWatch Education Pricing Effective January 1 st, 2012 Expires March 31 st, 2012 Deployment Options Software as a Service (SaaS) On-premise Appliance Multiple redundant data centers Best of class hardware
More informationHOW TO... Use Lump Sum Billing Items
Date: 17 October 2011 Document Version: 1.0 Prepared by: Earliest available version of COINS: Richard Werner COINS Ti These notes are published as guidelines only. This How to Guide may contain recommendations
More informationSpringpath Data Platform with Cisco UCS Servers
Springpath Data Platform with Cisco UCS Servers Reference Architecture March 2015 SPRINGPATH DATA PLATFORM WITH CISCO UCS SERVERS Reference Architecture 1.0 Introduction to Springpath Data Platform 1 2.0
More informationSAP ONLINE COURSES ARGUMENTS
SAP ONLINE COURSES ARGUMENTS SAP Overview Introduction to SAP; The functional architecture of SAP; The professionals in the SAP world; The organizational structure of SAP; How to access the application:
More informationMANAGING AN ERP IMPLEMENTATION PROJECT USING BASIC SOFTWARE TOOLS AND WEB BASED SCHEDULING CONTROL
MANAGING AN ERP IMPLEMENTATION PROJECT USING BASIC SOFTWARE TOOLS AND WEB BASED SCHEDULING CONTROL Accepted for publication at III European Project Management Conference Jerusalem Israel 2000 PMI Global
More informationStateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT)
Stateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT) Mališa Vučinić v, Bernard Tourancheau v, Franck Rousseau v, Andrzej Duda v, Laurent
More informationOrange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich
Orange County Convention Center Orlando, Florida June 3-5, 2014 Architecturing the cloud for your SAP landscape Florian Stilkerich LEARNING POINTS What are the different types of Cloud Enterprise Architecture
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationImplementing and Maintaining Microsoft SQL Server 2005 Reporting Services COURSE OVERVIEW AUDIENCE OUTLINE OBJECTIVES PREREQUISITES
COURSE OVERVIEW This three-day instructor-led course teaches students how to implement a ing Services solution in their organizations. The course discusses how to use the ing Services development tools
More informationFIS InfoHub. K.S. Bhaskar. 2014 Fidelity National Information Services, Inc. and its subsidiaries.
FIS InfoHub K.S. Bhaskar 2014 Fidelity National Information Services, Inc. and its subsidiaries. What is FIS InfoHub? Operational monitoring of GT.M environments via SNMP 2 Design Considerations Challenges
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationComputers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA
Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used
More informationCormant-CS System Requirements
Cormant-CS System Requirements For Cormant-CS 8: Hardware Requirements Cormant-CS Server: 2 GHz or higher quad-core processor 8GB RAM 80 GB free hard disk space (including program and database space) Cormant-CS
More information2016 TRAINING CALENDAR
2016 TRAINING CALENDAR Country Course Description Month Date # of Days Course fee (USD) Nigeria Software Testing Boot Camp Course ISTQB Foundation Level Certification (Mon Feb 1-5 5 1, Nigeria Software
More informationPreparing Your Business for Magento 2.0
Preparing Your Business for Magento 2.0 William Harvey Director of Business Operations Magento Commerce How is Magento 2.0 different than 1.x? How is Magento 2.0 different than 1.x? New architecture Out-of-the-box
More informationCisco SmartPlay Select. Cisco Global Data Center Promotional Program
Cisco SmartPlay Select Cisco Global Data Center Promotional Program SmartPlay Select Program Program Goals and Benefits UCS Promotional offers to accelerate new UCS customers acquisition by showcase Cisco
More informationInformation Models and Master Data Management in Business Process Management
Information Models and Master Data Management in Business Process Management Timo Itälä SoberIT, TKK Outline Example of a business process and business services Need for common master data in SOA Discovering
More informationThe Path to the Cloud
The Path to the Cloud Andy Ingram VP Juniper Networks - Center of Excellence EIS 2015 Path to the Cloud 1 Consolidation Lower Cost 2 Optimization Greater Agility & Availability Network Topology, Automation
More informationHadoop Optimizations for BigData Analytics
Hadoop Optimizations for BigData Analytics Weikuan Yu Auburn University Outline WBDB, Oct 2012 S-2 Background Network Levitated Merge JVM-Bypass Shuffling Fast Completion Scheduler WBDB, Oct 2012 S-3 Emerging
More informationImplementing and Maintaining Microsoft SQL Server 2008 Reporting Services
Course 6236A: Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length: 3 Days Published: December 05, 2008 Language(s): English Audience(s): IT Professionals Level: 200 Technology:
More informationEnterprise-Wide Information Systems in the Modern Organization
Enterprise-Wide Information Systems in the Modern Organization Module SAP 1 1 ERP in Modern Business: Topics Historical Perspective of IS in Business Levels of IT in Organization Examine ERP s and SAP
More informationOn Demand SAP Support Services Overview
Committed to Your Success On Demand SAP Support Services Overview November 2005 Table of Contents About Us The Outsourcing Marketplace and SAP On Demand Support Services for SAP - Overview Atrinity Value
More informationA Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
More informationVision & Mission PURPOSE VISION MISSION
www.nathealth.net Vision & Mission PURPOSE We serve the insurance companies and the corporate self insured funds by providing creative expertise to help them audit, adjudicate, process their medical healthcare
More information2016 SUBSCRIPTION. The NFWI Board of Trustees has set the 2016 subscription rate at 37.50 2016 WI 18.00. Federation 8.40 NFWI 11.10. Total 37.
2016 SUBSCRIPTION The NF Board of Trustees has set the 2016 subscription rate at 37.50 2016 18.00 8.40 NF 11.10 37.50 Payment is due from members in January 2016 Dual members will pay 18.00 to their second
More informationบทท 1 บทน า ๑. หล กการและเหต ผล ๒. ว ตถ ประสงค
บทท 1 บทน า ๑. หล กการและเหต ผล การจ ดก จกรรมการเร ยนการสอนตามหล กส ตรการศ กษาตามพระราชบ ญญ ต การศ กษา แหงชาต พ.ศ. 2542 แก#ไขเพ มเต มฉบ บท 2 พ.ศ. 2545 ก าหนด ให#ม การเร ยนการสอนในกล ม สาระก จกรรมพ ฒนาผ
More informationData Cached in Client 1 Data in Broadcast Program Database in Server. Hot. Cold. e broadcast program a a Queries in Client 1: i, a, c, e, d, g, i, j
DynamicDataDeliveryinWireless QinglongHu1,DikLunLee1,andWang-ChienLee2 CommunicationEnvironments 2GTELaboratoriesIncorporated,40SylvanRoad,Waltham,MA02254, 1UniversityofScienceandTechnology,ClearWaterBay,HongKong,
More informationSystems for Personal Data Storage Services
NTT DoCoMo Technical Journal Vol. 8 No.2 Systems for Personal Data Storage Services Makoto Hamatsu, Tetsuo Sato and Eiji Yano As part of DoCoMo s efforts toward secure and safe mobile terminals, we developed
More informationAn IT executive with over 25 years in the field A few companies I have worked for:
Jerry Gitlitz An IT executive with over 25 years in the field A few companies I have worked for: Chase Manhattan Bank IBM Goldman Sachs Bank of America I am ITIL, Six Sigma and CMM certified. Currently
More informationE-Appointment Scheduling (EAS)
E-Appointment Scheduling (EAS) Noraziah Ahmad, Roslina Mohd Sidek, and Mohd Affendy Omardin Abstract E-Appointment Scheduling (EAS) has been developed to handle appointment for UMP students, lecturers
More informationBDS / B. V. Sc & AH degree recognized by DCI / VCI with 5 years R&D / teaching experience in the relevant subject after BDS / B. V. Sc degree.
RESEARCH SCIENTIST II (MEDICAL) Post Graduate degree (MD/MS/DNB) with one year R&D / teaching experience or Post graduate diploma in medical subjects with two years R&D / teaching experience in the required
More informationBusiness Administration Prof. Dr. J. Nonhoff. Content. Business Administration Prof. Dr. J. Nonhoff. Introduction ERP Vendors/ Architecture SAP
Content. / ERP. ERP-Vendors /.. with. Learning goals. Definition. Characteristics ERP Systems Grenoble 0 : Learning goals (for the whole module) : Application area At the end of the course you will be
More informationUCS Network Utilization Monitoring: Configuration and Best Practice
UCS Network Utilization Monitoring: Configuration and Best Practice Steve McQuerry Technical Marketing Engineer Unified Computing Systems Cisco Systems, Inc. Document Version 1.0 1 Copyright 2013 Cisco
More informationISOM4740 Enterprise Resource Management Winter 2012
ISOM4740 Enterprise Resource Management Winter 2012 Department of Information Systems, Business Statistics, and Operations Management COURSE: ISOM4740 Enterprise Resource Management (3-0-0:3) This course
More informationProceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute Hong Kong, June 14-18, 2006, pp. 178-182.
Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute Hong Kong, June 14-18, 2006, pp. 178-182. AN INNOVATIVE POSTGRADUATE PROGRAM ON ENTERPRISE RESOURCE PLANNING MASTER
More informationAmericas' SAP Users' Group
Americas' SAP Users' Group Big Bang for the Bucks! Improving Finance Processes with Excel, an SME Controller's Perspective Bob Oldrati, Controller & IT Director, Powell Electronics (retired) Tim Curtin,
More informationPublic, Private and Hybrid. Not Quite That Simple
The Cloud Landscape of Choices When making information technology decisions, executives begin by choosing between internal (in the data center) and external (with a cloud provider). Although it sounds
More informationSD Elements: A Tool for Secure Application Development Management
SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,
More informationIoT Analytics for smart Health and Care
IoT Analytics for smart Health and Care IoT Week 2015 Professor Dr. Ch. Thuemmler Technische Universität München, Edinburgh Napier University christoph.thuemmler@tum.de IoT relevant Statistics Gartner
More informationOracle Linux Support and Oracle VM Support Global Price List
Oracle Linux Support and Oracle VM Support Global List December 1, 2014 For educational purposes only. Subject to change without notice. 1 of 8 Oracle Linux Support s in USA (Dollar) License Support Licensing
More informationSection 1: Pre-requisites (This is a mandatory Section. Do not proceed without completing it)
Training and Career Mentoring SAP Installation & Hamachi VPN Client Set Up Instructions 6030 Unity Dr Suite #B Norcross GA 30071 http://www.targetittraining.com 1 This document has all the necessary information
More informationLarge-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
More information802.3ah Operations Management: Requirements From A Diverse Services Provider
802.3ah Operations Management: Requirements From A Diverse Services Provider Roy Bynum Global Access Technology Development WorldCom 1 Data Transmission Service Provider OAM Need to support wide diversity
More informationMicrosoft 20533 - Implementing Microsoft Azure Infrastructure Solutions
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals
More informationNSD Business Controlling System NSD BCS 4.01
2009 NSD Business Controlling System NSD BCS 4.01 Alert Messages Center Exchange System Copyright 2009, NSD all rights reserved info@mynsd.info Table of Contents NSD Business Controlling System (NSD BCS)...
More informationOpenNCP MRO Service Design and Engineering details
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of Patient Summary and Electronic Prescription Design APPENDIX E D 3.B.2 WORK PACKAGE WP3.B DOCUMENT NAME
More informationto performance evaluation, in contrast to demand
ITC 11, inoru Aldyama (Editor) E~sevier Science Publishers B. V. (North-Holland) lac, 1985 PERFORANCE ANALYSIS OF INTEGRATED COUNICATION SYSTE WITH HETEROQENEOUS TRAFFIC Shun-ichi IISAKU and Yoshiyori
More informationHandshake & endpoints
WebSockets Handshake & endpoints GET /path/to/websocket/endpoint HTTP/1.1 Host: localhost Upgrade: websocket ConnecAon: Upgrade Sec- WebSocket- Key: xqbt3imnzjbyqrinxeflkg== Origin: hsp://localhost Sec-
More informationComputing Service Provision in P2P Clouds
Computing Service Provision in P2P Clouds Ghislain FOUODJI TASSE Supervisor: DR. Karen BRADSHAW Department of Computer Science Rhodes University Research Statement Leverage advantages of cloud computing
More informationIBM: Using Queue Replication
coursemonster.com/uk IBM: Using Queue Replication View training dates» Overview Gain knowledge on InfoSphere Replication Server and how it is used to perform both queue-based homogeneous data replication
More informationTroubleshooting for Yamaha router
Troubleshooting for Yamaha router How to troubleshoot This document describes how to troubleshoot for Yamaha router. - Some points which should be considered before the trouble - What you should do when
More informationIntegrating ERP Project System into IS Project Management Curriculum
Integrating ERP Project System into IS Project Management Curriculum Ming Wang ming.wang@calstatela.edu Department of Information Systems California State University, Los Angeles Los Angeles, CA 90032,
More informationOptimization Alternatives of Information Systems for Risk Management
28 Optimization Alternatives of Information Systems for Risk Management Iulia APOSTOL-MAURER SAP Germany The focus of this article lies on synthesizing the requirements a risk management information system
More informationERP Implementation failure at HP. Presented by: DINESH SHRISHRIMAL
ERP Implementation failure at HP Presented by: DINESH SHRISHRIMAL BACKGROUND OF HP Started in 1938 by 2 Stanford Engineers BILL HEWLETT and DAVID PACKARD as an electronic instrument company. Its first
More informationCTERA Cloud Care. Support Services. Mar 2015. Version 2.0. 2015, CTERA Networks. All rights reserved.
CTERA Cloud Care Support Services Mar 2015 Version 2.0 2015, CTERA Networks. All rights reserved. Contents CTERA Support Services -------------------------------------------------------------------------------
More informationCLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS
CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS April 2014 Cloud Conceptual Reference Model The ease of use a Cloud Consumer experiences results from a complex, behind-the-scenes, orchestration of interchangeable,
More informationThis course will also teach how to create various kinds of dashboards using Reporting Services.
Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length : 3 Days (24 Hours) Language(s) : English Audience(s) : IT Professionals Level : 200 Technology : Microsoft SQL Server 2008
More informationCSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction
CSE 544 Principles of Database Management Systems Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction Outline Introductions Class overview What is the point of a database? Course Staff
More informationHOW TO SETUP YOUR OWN CLOUD SERVER PDF
HOW TO SETUP YOUR OWN CLOUD SERVER PDF ==> Download: HOW TO SETUP YOUR OWN CLOUD SERVER PDF HOW TO SETUP YOUR OWN CLOUD SERVER PDF - Are you searching for How To Setup Your Own Cloud Server Books? Now,
More informationProduct Roadmap Session 16 Nov 2011, Blijdorp Zoo Rotterdam
Product Roadmap Session 16 Nov 2011, Blijdorp Zoo Rotterdam Bart van Dongen, CTO Ferry van Genderen, Head of development Mike Hoksbergen, Software Development Partner EA HR Hans Veltman, Product Manager
More informationIBM Archiving Solutions for SAP
IBM Software Group IBM Why do SAP Customers Archive? 1. Continuous growth of SAP DB Growing investments into hard disk, servers, racks, backup devices... Performance of SAP servers degrade SAP system response
More informationPROJECT Domeny.tv Domeny.tv
C A S E STUDY PROJECT Domeny.tv is the largest project run inside MSERWIS. The website was launched in 2003 and since then has been developed and improved practically on a daily basis. The enormity of
More informationCA Data Center Infrastructure Management r4.3: Administration Bundle
CA EDUCATION COURSE DESCRIPTION CA Data Center Infrastructure Management r4.3: Administration Bundle Course Overview CA Datacenter Infrastructure Management (CA DCIM) captures detailed real-time information
More informationMDM and SOA Timo Itälä T-86.5161
MDM and SOA Timo Itälä T-86.5161 Outline Need for SOA Options for SOA Need for common master data in SOA Discovering master data Managing master data Managing external master data SOA and MDM 2 Recap:
More informationM.P. Shah Government Medical College Jamnagar Walk - In Interview for I.C.M.R. Project On 10 / 04 / 2015
M.P. Shah Government Medical College Jamnagar Walk - In Interview for I.C.M.R. Project On 10 / 04 / 2015 Applications are invited for following posts on temporary basis on contract of one year, performance
More informationHow To Deploy Office 2016 With Office 2016 Deployment Tool
How to deploy Office 2016 using SCCM 2012 R2 In this article we will see how to deploy Office 2016 using SCCM 2012 R2. Along with Office 2016, Microsoft has released office 2016 deployment tool. The Office
More informationThe International Arab Journal of Information Technology, Vol. 4, No. 2, April 2007 103 : Scalable Distributed Database System Soror Sahri CERIA, Université Paris Dauphine, France Abstract: We present,
More informationARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
More informationDynamic Thread Pool based Service Tracking Manager
Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,
More informationERP Systems. Generic ERP system. Categories of ERP systems. December 4, 2014
ERP Systems December 4, 2014 Generic ERP system 2 Categories of ERP systems By size and complexity Enterprise grade packages Midmarket solutions Small business packages By specialization Generic packages
More informationBUS319: Introduction to Enterprise Resource Planning
University of Wisconsin Oshkosh College of Business Administration BUS319: Introduction to Enterprise Resource Planning Fall 2013 Syllabus Instructor: Class Meeting: Office Hours: John M. Muraski MS, MBA,
More informationunified communications sourcing Making the right choice between on-premise, managed service, cloud and hybrid
unified communications sourcing Making the right choice between on-premise, managed service, cloud and hybrid On-premise, managed service, cloud or hybrid? We take a look at the reasons for choosing each
More informationPatient Satisfaction Survey Results 2011
Patient Satisfaction Survey Results 2011 Summary Our 2011 Patient Satisfaction survey was sent to 40 patients with 11 responses received, a response rate of 28%. As last year, the overwhelming response
More informationCitrix XenApp-7.6 Administration Training. Course
Citrix XenApp-7.6 Administration Training Course Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1: Citrix
More information8/25/2008. Chapter Objectives PART 3. Concepts in Enterprise Resource Planning 2 nd Edition
Concepts in Enterprise Resource Planning 2 nd Edition Chapter 2 The Development of Enterprise Resource Planning Systems Chapter Objectives Identify the factors that led to the development of Enterprise
More informationTuition Reimbursement Program. Handbook
EMPLOY EE Tuition Reimbursement Program Handbook For Employees... Ed u c a t i o n m a d e a f f o r d a b l e! A t t h e E r n e s t O r l a n d o L a w r e n c e B e r k e l e y N a t i o n a l L a b
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationinforouter V8.0 Distributed versus the Simple Model
inforouter V8.0 Distributed versus the Simple Model A guide to choosing the right model 1. T his guide will walk you through the two different installation options of inforouter and help you decide which
More informationSOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD
International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE
More informationAn Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
More informationDeploying and Managing Windows 10 Using Enterprise Services
Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services Course details Course Outline Module 1: Managing Desktops and Devices in an Enterprise Environment This module explains the most
More informationHow to Setup SQL Server Replication
Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication
More informationScope. Cognescent SBI Semantic Business Intelligence
Cognescent SBI Semantic Business Intelligence Scope...1 Conceptual Diagram...2 Datasources...3 Core Concepts...3 Resources...3 Occurrence (SPO)...4 Links...4 Statements...4 Rules...4 Types...4 Mappings...5
More information88-28-6. Fees. Fees for certificates of approval, registration of representatives, and
. Fees. Fees for certificates of approval, registration of representatives, and certain transcripts shall be collected by the state board in accordance with this regulation. (a) For institutions domiciled
More informationA networking framework for spontaneous interactions in MANETs
A networking framework for spontaneous interactions in MANETs BACKGROUND AND MOTIVATIONS Promoting interactions Socializing Group wise Transforming places Ephemeral Ad hoc Minimal Application driven User
More informationCloud & Datacenter Monitoring with System Center Operations Manager
Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect
More informationSAP Standard Application Benchmark Publication Process. Version 2.2
SAP Standard Application Benchmark Publication Process Version 2.2 September 10, 2002 Copyright statement No part of this document may be reproduced or transmitted in any form or for any purpose without
More informationDo You See What I See (DYSWIS)
Do You See What I See (DYSWIS) Introduction: DYSWIS is a system that leverages distributed network nodes to gather network management information for fault isolation and diagnosis. This project extends
More informationMSC Malaysia MyProCert SRI 2015 List of Certifications
MSC Malaysia SRI 2015 List of Certifications Reduced Fee by Technology Area Skillset Certification Financial Accounting (FI) RM22,250.00 RM7,000.00 Enterprise Resource Planning Data Science/ Big Data Security
More informationComputer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
More informationANDROID DEVELOPER RESUME USA
Android Developer resume usa 1 of 5 1/12/2015 2:28 PM ANDROID DEVELOPER RESUME USA.NET Developers/Architects Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide
More informationAutomated Performance Testing and Analysis. Armin Pruessner GAMS Development Corporation
Automated Performance Testing and Analysis Armin Pruessner GAMS Development Corporation INFORMS Annual Meeting, San Jose Oct 17-20, 2002 Agenda 1. Performance World! Brief overview 2. Main Focus: Performance
More informationOSIRIS Middleware & ISIS Application
OSIRIS Middleware & ISIS Application DELOS All Tasks Meeting Heiko Schuldt University of Basel, Switzerland UMIT, Austria What is OSIRIS? OSIRIS: Open Service Infrastructure for Reliable and Integrated
More informationDBTech Pro Workshop. Knowledge Discovery from Databases (KDD) Including Data Warehousing and Data Mining. Georgios Evangelidis
DBTechNet DBTech Pro Workshop Knowledge Discovery from Databases (KDD) Including Data Warehousing and Data Mining Dimitris A. Dervos dad@it.teithe.gr http://aetos.it.teithe.gr/~dad Georgios Evangelidis
More informationDigital Mobile Radio Demystified. By Don Trynor, VA3XFT November 27, 2014
Digital Mobile Radio Demystified By Don Trynor, VA3XFT November 27, 2014 Agenda Digital Mobile Radio Overview Ham Radio Usage of DMR How to Get Started With DMR 2 What is Digital Mobile Radio? Commonly
More information