On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

Size: px
Start display at page:

Download "On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1"

Transcription

1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort Collins, CO 80523, USA 1 Agilent echnologies, Inc., 900 S. aft Av., Loveland CO 80537, USA 2 Deutsche elekom Laboratories, Ernst-Reuter-Platz 7, D Berlin, Germany Abstract he network link seeds increase at a higher rate comared to rocessing seeds. his couled with the increase in size of router tables demand higher levels of arallelism within router hardware. However, such arallelism introduces unintended consequences that otentially may negate some of the erformance gains rovided by the imroved technology. he growth trends of comuting seeds, link seeds, and routing table sizes are used to evaluate one such consequence, acket reordering within routers. Results resented show the trends related to the degree of hardware arallelism and acket reordering I. INRODUCION As the seed of hysical links and networks increase beyond gigabit er second, and the end-to-end latency to acket transmission time ratio increases by orders of magnitude, certain henomena that were insignificant and safely ignored assume substantial imortance. In fact some of these second order effects, unless countered, can negate to a significant degree the gains rovided by faster hysical links and routing/switching hardware, and will have an adverse imact on the end-to-end erformance seen by the alications. hese unavoidable henomena include, among others, delay jitter and acket reordering. Jitter has received attention only with resect to real-time alications such as VoIP, and effects of reordering were safely ignored. According to Moore s law, the CPU comuting seed aroximately doubles every 18 months [1, 2], while recent trends indicate that network link seed aroximately doubles every nine months [3, 4]. hus, the network link seeds increase at a faster rate than the comuting seed. he Internet itself is growing in size, resulting in the increase of routing tables sizes in backbone routers [5]. Consequently, the amount of rocessing to be erformed by the routers will increase at a faster rate than the rate of increase in the comuting ower. Routers will rely on architectures that use an increasing number of rocessors working in arallel to counter the additional comutation requirements. However, rocessing ackets from the same stream in arallel rocessors deteriorates the roblem of reordering. he two obvious solutions, avoiding arallel rocessing of ackets of the stream by sending all of them (or at least those that have the otential for reordering) to the same rocessor, and buffering ackets and forcing them to leave in-order, ose challenges that require additional resources. In this aer, we analyze the imact of the increasing linkseed vs. CPU erformance ga and the growth of router table sizes on arallelism required within routers, and the resulting effect on reordering. By scaling the CPU seed, link seed, routing table size and the number of flows, we show that the arallelism in routers has to increase significantly, an unintended and inevitable result of which is reordering. While the resent generation of high-erformance routers comensate for internal reordering within routers using inut tracking and outut buffering techniques, such techniques do not scale well with the increasing erformance ga, and result in higher router latency. his aer, while not resenting solutions to this dilemma, attemts to quantify the arallelism and make a case for dealing with such secondary effects roactively in hardware architectures and rotocols as seeds continue to evolve. Section II reviews the router functionality and architecture, and addresses the imacts of acket reordering. he rates of change of CPU seeds, link seeds and routing table sizes are related to arallelism within routers in Section III. Section IV resents simulation-based trends for acket reordering for different levels of arallelism. Conclusions are in Section V. II. BACKGROUND ON ROUERS AND REORDERING A. Routers A router erforms two basic tasks, route rocessing and acket forwarding. Routers share information about network conditions, routing information base (RIB), with eers using rotocols such as OSPF, RIP, and BGP. Using this information, each router builds and maintains a routing table, which is then used to decide the aroriate outgoing interface for forwarding each incoming acket. he basic functional comonents of a router are shown in Fig. 1. Switching fabric is the hardware that transfers the ackets between the line cards. Line cards are the hysical link media whose design deends on the network link technology being 1 his research was suorted in art by NSF IR Grant No and by Agilent echnologies. Proceedings of the th IEEE Worksho on Local and Metroolitan Area Networks /07/$ IEEE 145

2 Routing Software Routing able Processing - Network Processors Switching Fabric Buffer Sace Fig. 1. Essential elements inside a router and the ath a acket follows used, e.g., OC-3. Forwarding of a acket involves a number of subtasks such as extracting the acket header, identifying destination address, finding outgoing interface from the routing table with refix matching, adding link layer header to the acket for the outgoing link, lacing the ackets in the corresonding queues and making decisions about droing ackets. Network rocessor units (NPUs), secialized CPUs such as Intel IXP2400, are used to erform these oerations. A high-erformance router tyically has several network rocessors, and deending on the architecture it may have a searate NPU er line interface or a ool of NPUs for ackets arriving at several interfaces [6,7,8,9]. A single NPU unit may also contain multile rocessing engines. As a acket enters the line inut interface of a router, its header is removed and assed through the switch fabric to the acket rocessor. Using the routing table, this rocessor determines how to forward the acket and sends back the header after udating it. he line card integrates the new header with the acket and sends the entire acket to the outbound line card [10,11]. All the cells are then sent to the shared memory ool for temorary storage while the IP address is being looked u and the outgoing interface gets ready for sending. his is the store art of a store-andforward router. he buffer manager creates a query based uon the information extracted from the acket to determine the outgoing interface of the acket. Query is assigned to an NPU that carries out a longest-refix match over the routing table. he decision is conveyed to the buffer manager, which sends a notification to the I/O manager of the corresonding outgoing interface. he notification is queued at the outgoing interface. When the notification reaches the head of the queue, the I/O manager reads all the corresonding cells from the shared memory. he checksum and the link layer header are added and the acket is sent over the link. he oerations including query formation, routing table looku, queuing and then sending the acket form the forward art of the storeand-forward router. Switch fabric with distributed buffer memory and forwarding [11] is a router architecture in which each line card is equied with its own forwarding engine to transmit data via a switch fabric to any other line card as needed. his reduces the load on each forwarding engine to that of the corresonding incoming line. However, as the link seeds continue to outstri rocessing seeds, arallelism will have to be introduced within the line cards, at which time effects such as reordering introduced by shared memory architectures will aear in routers with this architecture as well. A comlex device such as a backbone router may fail to kee the order of a flow of ackets assing through it. s in a flow may take different aths. If a acket suffers excessive delay, then it may reach the destination after its successor. his arallelism in rocessing ackets is the rimary reason for reordering. Reasons for acket reordering in high-seed routers include following: Routers utilize multile arallel NPUs for meeting erformance requirements. A single NPU may even have within itself multile rocessing engines, which work on several queries at the same time. Simultaneous rocessing of ackets from the same stream establishes a race condition that may cause the rocessing of a acket after its successor. Severity of this effect is high when the inter-acket ga among the ackets in a stream is low. Per-acket load balancing distributes ackets towards same destination over multile outgoing interfaces for even link utilization [7]. A router may be designed using multile shared-memory systems or small-sized routers to construct a largecaacity router. Difficulty of coordination among these units causes the order of ackets to change [11]. With head-of-line (HOL) blocking, the outgoing interface of a acket stream may not wait for a blocked acket in the same stream, to sustain interface throughut goals, thereby, causing reordering [11]. Due to route flaing, the ackets in the same stream may be erroneously sent over different aths resulting in out-of-orderliness [12]. In Junier M160, with four arallel rocessors, each with a caacity of 2.5 Gbs to serve a single 10Gbs interface, reordering was a concern [13,14]. Corrective action was taken in the design of the subsequent generations of high-end Junier routers, e.g., 640, to avoid this roblem. Other notable instances of reordering include that in BD6808/6816 [14]. he recent high-end routers attemt to reduce or avoid reordering by either a) inut buffering, i.e., tracking the ackets at the inut to identify the individual streams, and forwarding the ackets of the same stream to the same queue, thus reventing reordering, or b) outut buffering, i.e., buffering ackets at the outut of the router to ensure that the ackets belonging to the same stream are released in the order of their entry into the node [15]. NPUs from vendors such as IBM, Motorola, Vitesse, I and Intel have built-in hardware to track individual flows [16]. Rearrangement of ackets, using inut tracking or outut buffering, requires identifying each flow, recording the incoming sequence of ackets in each flow, and establishing the correct order at the outgoing interface using the recorded sequence. It is also ossible to add a time stam as ackets come into the router and buffer and release them without causing reordering. However, as link seed to rocessing seed increases further, these solutions aear to be non-scalable. Furthermore, buffering ackets in the router for taking corrective action adds to the end-to-end acket latency. As the networks move from bandwidth-limited regime to latency-limited regime [17], increasing the latency is not an attractive otion. In fact, increase in latency itself may contribute to reduced throughut for many alications, thus negating some of the 146

3 benefits of increased link seeds. B. Imact of Reordering Recovery from reordering is the resonsibility of the endnodes according to the end-to-end design argument for the Internet as well as the best-effort delivery model. End-oint recovery from reordering has worked well in the ast with CP or alication-level buffering in case of UDP. When out-of-order ackets are received, CP erceives it as loss of ackets, resulting in deterioration of erformance due to following [18]: he number of unnecessary retransmissions increases resulting in dro in throughut. he congestion window becomes very small due to multile fast retransmissions, causing roblems in raising the window size, resulting in decreased bandwidth utilization. Due to multile retransmissions the round tri time (R) is not samled frequently, thus degrading the estimate of R. Performance of receiver also suffers, because whenever the receiver receives out-of-order ackets, it has to buffer all the out-of-order ackets and they need to be sorted as well. Detection of loss of ackets is delayed because of outof-order delivery, due to which retransmission request for a lost acket is sent only when CP times out. Due to reverse ath reordering, i.e. reordering of acknowledgements, CP loses its self-clocking roerty, i.e., roerty of CP that it only sends ackets when another acket is acknowledged, doesn t remain valid resulting in bursty transmissions and ossible congestion. reordering can severely degrade the end-to-end erformance [19]. For certain alications based on UDP, e.g. VoIP, an out-of-order acket arriving after its layback time has elased is treated as lost, decreasing the erceived quality of voice on receiver side, but still consuming NIC and rocessing resources. Corrective action is ossible with buffering at the receiver as long as delay is not excessive, but the amount of resources for recovery will increase with the degree and extent of reordering, and with the bit rate of alication (e.g., video over IP will require significantly higher bit rates comared to VoIP). III. RENDS IN COMPUING AND LINK SPEEDS he rocessor level arallelism within routers is dictated by the growth rates in link seeds, rocessing seeds and routing table sizes. In this section, we consider these growth trends and evaluate the arallelism required for future higherformance routers. A. Increase in Network Link Seed Let α be the factor by which the network link seed for a high-end router increases during time eriod (months elased from some initial 0 ), i.e., if s is the initial link seed, the link seed will be (s * α) after the eriod. As the link seed almost doubles every 9 months, α = 2 /9 (1) B. Increase in Comuting Seed Let β be the factor of increase in the comuting seed during time eriod. Alying the Moore s law to the network rocessors: β = 2 /18 (2) C. Increase in BGP able Size Increasing number of subnets in the Internet, and usage of CIDR (Classless Inter-Domain Routing), load balancing, etc., have caused the number of refixes in the routing table of a generic backbone router to increase almost exonentially between the year 1998 and 2000 [20], and almost quadratically after that [21]. he data obtained from AS1221 [5] is used to estimate the trend corresonding to the size of BGP table. he quadratic equation fitted to data from is given by: S = 7.804e-013 * 2 u * u e+004 (3) S is the tyical number of BGP entries er router, at the time instance U, which is in the form of UNIX timestam. Although long-term observations indicate that a higher-order fit may be better, we use the quadratic relationshi. he result would be, if anything, an underestimate of the comlexity of routing tables. We use γ to reresent the factor by which the size of BGP table increases during the time eriod. D. Increase in the Number of NPUs Next we derive a simle aroximation for the number of NPUs required (n), after the time duration, given that the router at the initial time required m NPUs. Assuming that network usage increases roortionately to network caacity, i.e., the link utilization remains constant, and that the acket lengths remain the same, the number of ackets er second arriving over the link also increases by the same factor, α. he amount of work for rocessing these ackets thus increases by the same roortion. he amount of comutations required for rocessing each acket (looking u router entry, etc.) is considered to increase logarithmically with the BGP table size. hus, the overall amount of comutations that the router has to erform increases by a factor ω = α * log2( γ ) (4) Considering β as the factor of increase in the comuting seed during the time eriod, the following relationshi can be formulated for m and n: n = ω*m/β (5) Combining the imacts of scaling on these arameters, we see that the increase in arallelism in routers is inevitable. E. Mean Processing ime he amount of time taken by an NPU for rocessing a acket is comuted using the results of the exeriments resented in [22], which were carried out to measure the single-ho delay of a acket through an oerational router in a backbone IP network. he router transit time of a acket is observed to be roortional to the length of the acket. his time includes the time sent in the address looku rocess, transfer of the acket from the inut to the aroriate outgoing interface, and the time sent in the queue at the 147

4 outgoing interface. he first two of these three oerations are mandatory for rocessing every acket and take a minimum rocessing time for each acket, as the queuing oeration may not be required for each acket. Relationshi between the length of a acket and the mean rocessing time in [22] is: d (L) = (0.0213*L+25) (6) where L is the length of the acket in bytes. hus, d (L)reresents the router transit time (in µs) of a acket of length L bytes, minus the time sent by the acket in the queue at the outgoing interface. During the time eriod, as the comuting seed and the rocessing work increase by factors β, and log 2 (γ) resectively, the mean rocessing time d (L) taken by a router for a acket of length L bytes is given in µs by: d (L) = (0.0213*L+25)* log 2 (γ)/β (7) IV. SIMULAION BASED PREDICIONS A simulator deicting the functionality of a simle router scaled to handle future generations based on discussions in Section III has been imlemented [23]. he goal of the exeriments was to study the reordering induced in acket sequences, due to arallel rocessing of the ackets by multile rocessors, in future generation routers. Fig. 2 reresents the high level functionality of the simulated router. Multile acket streams arrive at different line interfaces and are disatched to an NPU by the disatcher. Each acket had a sequence number and a stream identifier. One of the randomly selected streams was designated as the stream of interest, which is used for measuring the amount of reordering. hus, the remaining traffic emulates background traffic, irresective of the line interface that it entered through. he rimary configurable traffic arameters in the simulator were: (a) number of acket streams, (b) nature of the traffic or statistical traffic distribution, (c) acket size distribution, (d) size of ackets in the main stream alone, (e) total link bandwidth, and (f) utilization of the link by the aggregate traffic. Studies have shown that the Internet traffic is self-similar in nature [24]. hus, the simulator was configured to generate self-similar traffic [25]. size density over the Internet is trimodal with higher frequencies for acket sizes 40-44, and 1500 bytes [26,27]. Assuming no jumbo frames, the acket size density follows the trimodal characteristic. he acket size in a given stream was held constant, but acket sizes of different streams were chosen using the trimodal acket size distribution. he mean number of ackets generated er unit time er stream was aroximately the same. A line-card inut carries a large number of streams, and all the results resented are for a randomly selected stream with acket size 1500B. he router had a designated number of simulated NPUs, as raffic Generator Disatcher Queues NPU Controller NPU NPU NPU NPU Main Collector Aggregate raffic Processed raffic s Fig. 2. Functionality of the simulated router based on scaled arameters er Eq. (5), to rocess the ackets arriving at line interfaces. Each NPU was rovided with an inut queue whose size was limited by the delay-bandwidth roduct. A acket disatcher unit distributes the incoming ackets to the inut queues of the NPUs, using either round-robin scheme or shortest-queue first. As an NPU finished rocessing a acket, it icks u the next acket in its queue, or waits for a acket to arrive, if the queue is emty. Meanwhile, the rocessed acket exits the router. Following the comutations of α and β based on, the values of the factor increase in BGP table size γ, the number of NPUs n using Eq. (5) and the mean rocessing time d (L) using Eq. (7) were comuted. able I summarizes the arameter values used for the simulation. he link utilization, unless otherwise stated, was ket at 0.5 during the simulations. In this aer, we resent results only for the round-robin scheme for acket disatcher, which is the more otimistic case as the amount of reordering in this case is lower comared to shortest-queue-first case. he reordering of the outgoing ackets was measured using two metrics, Reorder Density (RD) and Reorder Bufferoccuancy Density (RBD) [28,29,30]. RD is the distribution of the dislacements of ackets from their original ositions, normalized with resect to the number of ackets. An early acket corresonds to a negative dislacement and a late acket to a ositive dislacement. RBD is the normalized histogram of the occuancy of a hyothetical buffer that would allow the recovery from out-of-order delivery of ackets. If an arriving acket is early, it is added to a hyothetical buffer until it can be released in order. he occuancy of this buffer after each arrival is used as the measure of reordering. A threshold, used to declare a acket as lost, kees the comlexity of comutation within bounds. RD and RBD are able to cature reordering more comrehensively comared to existing metrics [31]. 148

5 Link change OC-3 to α β γ ω n Mean Processing time OC * L OC * L OC * L OC * L OC * L OC * L OC * L RBD 1 Link Utilization 10% 30% 50% 70% 90% ABLE I. PARAMEERS USED IN SIMULAIONS FOR DIFFEREN LINK SPEEDS 1 OC-12 OC-24 OC-48 OC-96 OC-384 OC Buffer-Occuancy Fig. 4. RBD of reordering through the simulated router for different link utilizations (for OC768, acket size 1500 bytes) RD Size in bytes Earliness/Lateness RBD RBD Buffer-Occuancy OC-12 OC-24 OC-48 OC-96 OC-384 OC-768 Fig. 3. RD and RBD variation for different incoming link seeds (at 50% utilization) With increasing link seeds and routing table sizes, it is observed that the acket reordering will increase significantly, in the backbone routers. Fig. 3 deicts RBD and RD of the acket sequences in a stream. he RBD indicates that the reorder buffer is occuied by at least one acket 10% of the time for OC-384, and 17% of the time for OC-768. RD indicates that only 84% of the ackets arrive at the exected 1E Buffer-Occuancy Fig. 5. RBD variation with acket size (with stream of interest occuying 10Mbs on a 50% utilized OC768) osition for OC-384 and only 74% for OC-768. he amount of reordering is much higher than that observed in a tyical multi-ho link today desite the fact that reordering due to er-acket scheduling on multile outgoing links [32] is still not accounted for. Ref [28] shows the RD in a cascade of two subnets to be the convolution of RDs of individual subnets, thus, the overall dislacement of a acket from its original osition will be significantly higher, when we have multile routers in the ath of a acket stream. Figures 4 and 5 indicate the variation of reordering, in terms of RBD, of a flow in an OC-768 link with the link utilization and the acket size resectively. Larger ackets occuy the link longer, thus heling reduce the amount of reordering. More link utilization aggravates the roblem of reordering. From RBD, it is observed that using a buffer for de-ordering, whether attemted at the end-oint or within the router with outut buffering, will result in significant buffer utilizations as the link seed to rocessing seed ga increases. he values in able 1 should only be considered as indicative of trends in arallelism as oosed to absolute values for each generation of technology. Factors such as ossible imrovement in router table look u (e.g., hardware 149

6 imlementations), otical switching, etc., could certainly alter the rate of change associated with these trends. Other ossible remedies for reducing reordering include increasing the acket length, or even switching bursts of ackets instead of individual ackets. V. CONCLUSIONS he increasing ga between link and rocessing seeds and the shrinking acket transmission time with resect to end-toend latencies will result in second order effects in networks that have been ignored from rotocol and erformance oints of view. We considered acket reordering introduced within routers to show the increasing trends in such second order effects. Countering such effects within routers as well as endnodes will require increasing resources. Schemes such as load balancing and DiffServ will only increase these effects, which in turn will negatively imact the very same goals these techniques are geared towards, better erformance, efficiency and QOS. For examle, a load-balancing scheme aimed at reducing overall congestion may result in more reordering, resulting in more retransmissions, thus contributing toward congestion. he need for develoing an understanding of these secondary henomena and their imact on end-to-end erformance (as oosed to just the rimary effects such as throughut, loss and delay) thus cannot be overemhasized. his toic has received attention only recently, and this is understandable given their negligible imact at sub Gbs rates. here is a lack of understanding of these effects, and no theoretical foundation exists for modeling them let alone redicting them. here is also a need to identify roer metrics for measuring and characterizing these henomena. Proer understanding of such henomena can lead to modifications to rotocols and architectures that can counter their effects. For examle, the acknowledgement transmission olicy of CP may be changed based on measured or estimated values for reordering to overcome deterioration of erformance. radeoffs involved in recovery from these effects have to be considered as well. Reordering may be dealt at the end nodes with additional buffers, modifications to CP, etc., at the cost of increase comlexity at the end nodes. Alternatively, roactive measures can be taken within routers, such as ensuring in-order release, but these solutions will come at the cost of increased latency. Hardware at the end-node only has to deal with its own flows, while solutions at the router needs to accommodate all the arallel flows assing through each link. REFERENCES [1] G. Moore, Cramming more comonents onto integrated circuits, Electronics, vol. 38, no. 8, Ar [2] Moore s Law, htt:// [3] V. Subbiah and P. Pandit, he unbreakable aroach for deloying Oracle9i Real Alication Clusters, NetA ech Library, R 3218, Oct. 2002, htt:// [4] J. Latta, NGN - he future of networking, WAVE Reort, issue 2054, Nov. 2000, htt:// [5] BGP Reorts, htt://bg.otaroo.net/as1221/bg-active.html. [6] M. Kohler, Network rocessor overview - Intel, Lucent, Sitera, C- Port, CMP Media, Inc., 2000, htt:// [7] Cisco, Load balancing with Cisco exress forwarding, htt:// loadb_an.df. [8] L. Kencl and J.-Y. Le Boudec, Adative load sharing for network rocessors, Proc. of INFOCOM 2002, June 2002, : [9] Switch Architectures, Light Reading, htt:// /document.as?site=lightreading&doc_id=25989&age_number=3. [10] C. Partridge, P. Carvey, et al., "A fifty gigabit er second IP router", IEEE/ACM ransactions on Networking, 6(3), 1998, [11] Cisco white aer, he evolution of high-end router architectures: Basic scalability and erformance considerations for evaluating largescale router designs, htt:// hw/routers/s167/roducts_ white_aer09186a fdf.shtml. [12] D. Howe, Flaing router, htt://burks.brighton.ac.uk/burks/foldoc/18/43.htm. [13] Internet Core Router est, htt:// document.as?doc_id=4009&age_number=8. [14] M. Przybylski, B. Belter, and A. Binczewski, Shall we worry about acket reordering, Comutational Methods in Science and echnology, 11(2), , [15] H. Liu, A trace driven study of acket level arallelism, Proc. of International Conference on Communications (ICC 02), New York, NY, 2002, [16] end2end-interest mailing list, Reordering in Routers, htt:// August/ html. [17] L. Kleinrock, he latency/bandwidth tradeoff in Gigabit networks, IEEE Communications, Aril 1992, [18] M. Laor and L. Gendel, he effect of acket reordering in a backbone link on alication throughut, IEEE Network, Set./Oct. 2002, [19] C. Semeria, Internet Processor II ASIC: Rate limiting and traffic olicing features, White aer, Junier Networks, htt:// [20] G. Huston, Analyzing the Internet BGP routing table, Cisco Systems, htt:// [21]. Bu, L. Gao and D. owsley, On characterizing BGP routing table growth, Comuter Networks, 45(1), 45-54, May [22] K. Paagiannaki, S. Moon, C. Fraleigh, P. hiran, F. obagi, and C. Diot, Analysis of measured single-ho delay from an oerational backbone network, Proc. of IEEE INFOCOM, June 2002, : [23] A. A. Bare, Measurement and analysis of acket reordering, Masters hesis, Deartment of Comuter Science, Colorado State University, [24] A. Feldmann, A. C. Gilbert, W. Willinger, and. G. Kurtz, he changing nature of network traffic: Scaling henomena, ACM Comuter Communication Review, vol. 28, no. 2, Ar. 1998, : [25] G. Kramer, Generator of self-similar network traffic, htt://wwwcsif.cs.ucdavis.edu/~kramer/code/trf_gen2.html. [26] K. Claffy, Greg Miller, and Kevin homson, the nature of the beast: recent traffic measurements from an Internet backbone, CAIDA, htt:// [27] Caida, Size and Sequencing, htt:// [28] N. M. Piratla, A. P. Jayasumana and A. A. Bare, RD: A formal, comrehensive metric for acket reordering, Proc. Networking 2005, Lecture Notes in Comuter Science 3462, , May [29] A. P. Jayasumana, N. M. Piratla, A. A. Bare,. Banka, R. Whitner and J. McCollom, Reorder Density and Reorder Buffer-occuancy Density - Metrics for Reordering Measurements, IEF draft, Revised Aril 2007, htt:// draft-jayasumana-reorder-density-07.txt. [30] N. M. Piratla, A. P. Jayasumana, A. A. Bare and. Banka, "Reorder Buffer-Occuancy Density and its Alication for Evaluation of Reordering," Comuter Communications (2007). [31] N. M. Piratla and A. P. Jayasumana, "Metrics for Reordering - A Comarative Analysis," International Journal of Communication Systems (IJCS), o aear. [32] N.M. Piratla and A. P. Jayasumana, "Reordering of s due to Multiath Forwarding - An Analysis," Proc. IEEE Int. Conf. on Communications (ICC 2006), Istanbul, June

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina

More information

17609: Continuous Data Protection Transforms the Game

17609: Continuous Data Protection Transforms the Game 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Jun (Jim) Xu jun.xu@huawei.com Principal Engineer, Futurewei Technologies, Inc.

Jun (Jim) Xu jun.xu@huawei.com Principal Engineer, Futurewei Technologies, Inc. Jun (Jim) Xu jun.xu@huawei.com Princial Engineer, Futurewei Technologies, Inc. Linux K/QEMU Switch/Router NFV Linux IP stack in Kernel ll lications will communicate via socket Limited raw socket alications

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

Response-Time Control of a Processor-Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders

Response-Time Control of a Processor-Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders Resonse-ime Control of a -Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders Published in: Proc. of the 7th IFAC World Congress Published: 8--

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

Buffer Sizing in 802.11 Wireless Mesh Networks

Buffer Sizing in 802.11 Wireless Mesh Networks Buffer Sizing in 80. Wireless Mesh Networks Kamran Jamshaid, Basem Shihada,LiXia, and Phili Levis MCSE Division, KAUST, Saudi Arabia. {kamran.jamshaid, basem.shihada, li.xia}@kaust.edu.sa Deartment of

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network Saturation Throughut in a Heterogeneous Multi-channel Cognitive Radio Network Vicent Pla, Stijn De Vuyst, Koen De Turck, Elena Bernal-Mor, Jorge Martinez-Bauset and Sabine Wittevrongel ITACA research institute,

More information

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Factoring Variations in Natural Images with Deep Gaussian Mixture Models Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,

More information

Traffic Analysis for Voice in Wireless IP Networks

Traffic Analysis for Voice in Wireless IP Networks Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje

More information

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology!

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology! SDN/OenFlow Performance U!, Winterschool, Zurich www.oenflow.org Kurt Baumann kurt.baumann@switch.ch Zurich, 08. March 2013 Outline SDN to OenFlow OenFlow a valid technology! Basic Concet How it works

More information

Receiver Buffer Requirement for Video Streaming over TCP

Receiver Buffer Requirement for Video Streaming over TCP Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: taehyun.kim@freescale.com

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters

More information

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives 10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Measuring relative phase between two waveforms using an oscilloscope

Measuring relative phase between two waveforms using an oscilloscope Measuring relative hase between two waveforms using an oscilloscoe Overview There are a number of ways to measure the hase difference between two voltage waveforms using an oscilloscoe. This document covers

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Passive Compensation For High Performance Inter-Chip Communication

Passive Compensation For High Performance Inter-Chip Communication Passive Comenion For High Performance Inter-Chi Communication Chun-Chen Liu, Haikun Zhu and Chung-Kuan Cheng Deartment of Comuter Science and Engineering University of California, San Diego E-mail: ch1084@ucsd.edu,{hazhu,ckcheng}@cse.ucsd.edu

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA F. Mojžíš, J. Švihlík Detartment of Comuting and Control Engineering, ICT Prague Abstract This aer is devoted to statistical analysis of Nikon D40 digital

More information

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters Proceedings of the th World Congress in Mechanism and Machine Science ril ~4, 4, ianin, China China Machinery Press, edited by ian Huang. 86-8 Stability Imrovements of Robot Control by Periodic Variation

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Alpha Channel Estimation in High Resolution Images and Image Sequences

Alpha Channel Estimation in High Resolution Images and Image Sequences In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image

More information

Switch Fabric Implementation Using Shared Memory

Switch Fabric Implementation Using Shared Memory Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information