On Achieving Optimal Throughput with Network Coding

Size: px
Start display at page:

Download "On Achieving Optimal Throughput with Network Coding"

Transcription

1 On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end throughput in dt networks hs een known s fundmentl ut computtionlly hrd prolem. In this pper, we seek efficient solutions to the prolem of chieving optiml throughput in dt networks, with single or multiple unicst, multicst nd rodcst sessions. Although previous pproches led to solving NP-complete prolems, we show the surprising result tht, fcilitted y the recent dvnces of network coding, computing the strtegies to chieve the optiml end-to-end throughput cn e performed in polynomil time. This result holds for one or more communiction sessions, s well s in the overly network model. Supported y empiricl studies, we present the surprising oservtion tht in most topologies, pplying network coding my not improve the chievle optiml throughput; rther, it fcilittes the design of significntly more efficient lgorithms to chieve such optimlity. Index terms: Grph theory, Informtion theory, Mthemticl progrmming/optimiztion, Simultions. I. INTRODUCTION In its most generl form, dt network consists of set of end hosts nd switches interconnected vi undirected (or duplex) communiction links. In dt networks with known topologies nd ndwidth cpcity ounds for ech undirected link, fundmentl prolem is to compute nd chieve the mximum end-to-end throughput for one or multiple ctive communiction sessions. Depending on the ojectives of pplictions, communiction session my e in the form of unicst (one-to-one), multicst (one-to-mny), rodcst (one-to-ll), or group communiction (mny-to-mny). The solutions to this prolem my led to fundmentl nd new insights with respect to optiml routing nd trffic engineering. For exmple, the recent prdigm of selfish routing [1] llows end hosts to choose routes themselves using source routing strtegies. Finding the optiml strtegy to disseminte dt to multiple destintions with mximum throughput is of nturl interests in such prdigm, especilly when we wish to optimlly exploit existing network cpcities to disseminte lrge volumes of dt. The focus on the undirected network model is supported y the following justifictions. First, s pst reserch in network flow theory [2] nd informtion theory [3] suggests, the undirected network model hs its own rhythm, nd results otined there my e drsticlly different from those otined in the directed network model. In fct, the undirected model is more generl nd fundmentl in tht, solution constructed for undirected networks cn usully e pplied to solve the sme prolem in directed networks, ut not vice vers. This is prticulrly true for our prolem nd solution in this pper. Second, undirected communiction links provide the complete flexiility in cpcity lloction, nd consequently leds to higher trnsmission rtes tht etter represent the optiml informtion flow rte. Finlly, in specil network scenrios such s wireless d hoc networks, communiction links re nturlly undirected, in the sense tht dt trnsmission long oth directions of the wireless link shre the ville spectrum. In this pper, we seek to ring fundmentlly new insights nd efficient solutions to the prolem of optimizing end-toend throughput in undirected dt networks. We first illustrte the power of network coding [4], [] with respect to chieving optiml throughput. In the prdigm of network coding, informtion flows in dt networks my not only e stored nd forwrded, ut lso e encoded nd decoded in ny nodes in the network. We show tht, lthough previous directions of computing optiml multicst throughput involve solving NP-complete prolems, the mximum multicst throughput nd the corresponding optiml multicst strtegy cn indeed e computed efficiently in polynomil time, with the unique encodle property of informtion flows considered. We then show tht this conclusion cn e extended to multiple concurrent sessions, s well s to other types of communiction, including unicst, rodcst nd group communiction. Even when the generl form of dt networks is modified to reflect relistic chrcteristics of overly networks (where only end hosts t the edge my e le to replicte, encode nd decode dt), the sme conclusion still holds. The solutions to the prolems include not only optiml routing strtegies to trnsmit dt in the network, ut lso how dt my e encoded nd decoded s they re relyed towrds the destintions. Though there exist previous results on network coded throughput in directed networks, to the est of our knowledge, this pper is the first work tht systemticlly studies the effects of network coding with respect to optimizing throughput in undirected dt networks. The vilility of efficient solutions mkes it finlly possile to study vrious spects of properties of the chievle throughput, in relisticlly sized networks. We present empiricl studies sed on simultion results over thousnds of test scenrios using our lgorithms. We compre the optiml multicst throughput with nd without network coding, nd show tht noticele throughput gins cn only e experienced in contrived network topologies; for rndom nd irregulr network topologies it is lmost lwys zero. This grees with out previous theoreticl results on the upper ound of the dvntge of network coding in undirected networks [3]: rther thn incresing throughput, the dvntge of network coding

2 is indeed to fcilitte significntly more efficient computtion of the strtegies to chieve optiml throughput of informtion flows. Our empiricl studies lso show tht overly multicst, which hs recently ttrcted extensive reserch efforts, my pproch optiml throughput quite well. The reminder of this pper is orgnized s follows. We first discuss relted work in Sec. II. In Sec. III, we present our min theorems nd lgorithm with respect to chieving optiml endto-end throughput with single multicst session. In Sec. IV, we extend our results to the cses of multiple sessions of unicst, multicst, rodcst, nd group communiction. We lso consider the model of overly networks, where only suset of nodes re cple of repliction nd coding. We then present empiricl studies in Sec. V, nd conclude the pper in Sec. VI. II. RELATED WORK The open prolem of chieving optiml end-to-end throughput with efficient lgorithms hs not een discussed in depth in existing literture. There exist, however, similr prolems tht hve een extensively studied. Towrds the direction of Qulity of Service (QoS) routing, the ojective is to find endto-end pths or multicst trees tht stisfy specific ndwidth or dely constrints, nd therefore providing the desired QoS gurntees [6]. With respect to end-to-end throughput, finding good topologies tht stisfy ndwidth requirements is oviously different from nd rguly esier thn finding optiml ones. There exists n extensive ody of reserch in the re of multicst routing in wide-re IP networks (e.g., [7]). The dvntge of IP-sed multicst is rought y dt pcket repliction on multicst-cple switches, improving ndwidth efficiency nd throughput compred to ll (nive) unicst etween the source nd the multicst receivers. However, since it is sed on the construction of single tree, the end-to-end throughput is not optiml compred to wht is chievle y topology eyond tree. As IP multicst is not redily deployed, lgorithms promoting ppliction-lyer overly multicst hve recently een proposed s remedil solutions, focusing on the issue of constructing nd mintining multicst tree using only end hosts [8], [9]. Though single multicst tree my not led to optimized throughput, recent studies (e.g., SplitStrem [1], CoopNet [11], Digitl Fountin [12] nd Bullet [13]) hve proposed to utilize either multiple multicst trees (forest) or topologicl mesh to deliver striped dt from the source, using either multiple description coding or source ersure codes to split content to e multicst. These proposls hve indeed improved end-to-end throughput eyond tht of single tree, ut there hve een no discussions on whether the optiml throughput my e chieved, or how close the proposed lgorithms pproch optimlity. In this pper, we study such chievle optimlity, while considering the most generl cse where the dt source trnsmits strem of ytes, nd is not ssumed to perform ny source or error correction coding. There hve een studies on chieving optimlity with respect to computing olivious routing strtegies in dt networks. The ojectives re to mximize throughput for source-destintion pir, nd to minimize congestion on the network. Most notly, using liner progrmming techniques, polynomil time lgorithms (with polynomil numer of vriles nd constrints in the LP formultion) cn e constructed to compute strtegies for optiml olivious routing for ny network, directed or undirected [14]. Though we lso employ liner optimiztion tools nd study undirected networks, our prolem domin is more generl: while optiml olivious routing focuses on origin-destintion pirs of unicst sessions (possily exploiting pth diversity), we focus on vriety of communiction sessions, including unicst, multicst, rodcst nd group communiction. We seek fundmentl insights on how optiml routing strtegy my ecome, nd wht is the mximum chievle throughput in communiction session. The theory of network flows studies the trnsmission of commodities of the sme type (unicommodity flows) through cpcitied network. The mximum flow rte etween the source nd the destintion which my e computed with vrious efficient comintoril lgorithms [2]. When commodities to e trnsmitted re of different types (multicommodity flows), computing the mximum flow rte cn e solved s liner optimiztion prolem. In oth unicommodity nd multicommodity flows, commodities my only e forwrded t intermedite nodes, comprle to ll unicst in dt networks. The concept of network coding extends the cpilities of network nodes in communiction session: from sic dt forwrding (s in ll unicst) nd dt repliction (s in IP or overly multicst), to coding in Glois fields. Fig. 1 illustrtes clssic exmple of how network coding ssists to improve end-to-end throughput. As R 1 receives oth nd + (encoded over GF(2)), it is le to decode nd retrieve oth nd. If the link cpcities re 1, the mximum chievle throughput with network coding is 2. Without coding, it cn e computed tht the optiml throughput is 1.87 [3]. If only one multicst tree is used (s in IP multicst), the chieved throughput is 1. S R1 R 2 () Mximum throughput with one multicst tree is 1(1.87 with multiple trees). + S + R1 R 2 () Mximum throughput with network coding is 2. Fig. 1. The dvntge of network coding with respect to improving the end-to-end multicst throughput from S to R 1 nd R 2. The recent rekthrough theorem in network coding shows tht, for multicst session in directed networks, if rte x cn e chieved from the sender to ech of the multicst receivers independently, it cn lso e chieved for the entire multicst session (refer to independent proofs of Ahlswede +

3 et l. [4] nd Koetter et l. []). In ddition, Li et l. [1] show tht liner codes suffice to chieve such property. All liner coding opertions re defined s liner comintions over Glois fields with fixed element lengths, thus the size of the dt does not increse fter eing encoded. III. ACHIEVING OPTIMAL THROUGHPUT IN UNDIRECTED DATA NETWORKS: THE SINGLE MULTICAST CASE We egin our study from the cse of single multicst session. We consider the most generl form of dt networks, represented y simple grph G = (V,E) with undirected edges etween network nodes. Ech edge represents communiction link, nd the edge cpcities re specified y function C : E Q + (where Q + denotes the set of positive rtionl numers), representing the ville ndwidth cpcities of communiction links. Throughout this pper, we focus on the frctionl model of dt routing, where the cpcity of ech link my e shred frctionlly in oth directions, nd informtion flows my e split nd merged t ritrrily fine scles. We use M = {m,m 1,...,m k } V to specify the set of nodes in the multicst group, with m eing the sender. In grphicl illustrtions throughout this pper, nodes in M re shown s lck, nd nodes in V M re shown s white. Links re leled with their cpcities, nd ll unleled links hve cpcity of 1. A. Steiner tree pcking nd Steiner strength To compute the optiml throughput of multicst sessions, Steiner tree pcking [16], [17] nd Steiner strength hve een the stte-of-the-rt. Unfortuntely, oth re NP-hrd solutions. Steiner tree pcking. Consider the cse of informtion flows in one multicst session from source to set of destintions. It cn e theoreticlly shown tht, if coding is not considered, chieving optiml throughput vi multiple multicst trees is equivlent to the prolem of Steiner tree pcking, which seeks to find the mximum numer of pirwise edge-disjoint Steiner trees, in ech of which the multicst group remins connected. An intuitive explntion to such equivlence is tht, ech unit throughput corresponds to unit informtion flow eing trnsmitted long tree tht connects every node in the group. The mximum numer of trees we cn find corresponds to the optiml throughput for the session. Fig. 2() shows such n exmple. In the figure, ech letter corresponds to distinct Steiner tree, nd nine such Steiner trees ( to i) exist in the shown pcking scheme, where the tree corresponding to is highlighted. Since ech link with unit cpcity needs to ccommodtes Steiner trees, the chievle throughput on ech tree is, therefore,.2. This leds to multicst throughput of 1.8, which is optiml without coding. Unfortuntely, Steiner tree pcking hs een shown to e NP-complete [17], [18], nd the est known polynomil time lgorithm hs n pproximtion rtio of round 1. [18]. With the sme exmple, we cn lso show tht the chievle optiml throughput with network coding is 2 (Fig. 2()), which is higher thn tht chieved without coding. Consequently, defh m 3 efgh defgh cegi m 1 cdi m fghi cdi cefgh () steiner tree pcking nd multicst without coding. cdi m 2 m3 m 1 + m + + m 2 () multicst with network coding. Fig. 2. The chievle optiml throughput is 1.8 without coding, nd 2 with coding. even if Steiner tree pcking is computtionlly fesile, it my not lwys yield the ctul optiml multicst throughput. Steiner strength. In n undirected cpcitied network N, we consider prtitions of the network where there exists t lest one source or receiver node in ech component of the prtition. Let P e the set of ll such prtitions. The Steiner strength of N is defined s min p P E c /( p 1), where E c is the totl inter-component link cpcity on the set of links E c eing cut, nd p is the numer of components in the prtition p. It is nturl extension of network strength [19] defined for rodcst network. It is known from our previous work tht network strength is equivlent to the chievle optiml throughput in rodcst sessions [3]. Therefore, it is nturl direction to compute optiml multicst throughput y computing the Steiner strength. Unfortuntely, the Steiner strength prolem turns out to e NP-complete s well. The fct tht computing Steiner strength is NP-complete lso rules out the possiility tht Steiner strength nd optiml multicst throughput re lwys equl. In fct, we find tht Steiner strength is either equl to or higher thn the chievle optiml throughput 1. B. Efficient solutions for throughput optimiztion: the cflow Liner Progrm Contrry to the previous pessimistic views, we present the surprising result tht efficient solutions do exist for computing optiml throughput in undirected networks. We first formulte the prolem s liner network optimiztion prolem, in which oth the numer of vriles nd the numer of constrints re ounded y O( M E ). We then show tht the result of such optimiztion exctly gives the mximum chievle throughput, s well s the corresponding routing strtegy. We lso discuss possile solutions to the liner progrm. We egin y presenting the orienttion constrints of the liner progrm tht computes optiml throughput. An orienttion of network N is strtegy to replce ech undirected link e = uv with two directed links 1 = uv nd 2 = vu, such tht C(e) = C( 1 ) + C( 2 ). After the orienttion, the 1 Oserving spce constrints, we exclude the proofs of this result nd the NP-completeness of Steiner strength. Interested reders re referred to our technicl report [], which lso includes more detiled explntions nd n exmple in which the Steiner strength is higher thn the optiml throughput.

4 set of undirected links E ecomes set of directed links A, with the numer of links in the set douled. We proceed to consider flows from the source to the multicst receivers. To tke dvntge of the power of network coding to resolve competition for link cpcities, we introduce the concept of conceptul flows (cflow). We define conceptul flows s network flows tht co-exist in the network without contending for link cpcities. Our liner progrm to compute the optiml throughput, shown in Tle I, is referred to s the cflow LP since it is sed on conceptul flows. In the LP, f 1...f k re the conceptul flows from sender m to ech of the receivers. Ech flow vector f i specifies flow rte f i () for ech directed link A. f i in (v) denotes the totl incoming fi flow rte t node v, similr for f i out(v). Finlly, the sclr χ is the trget flow rte of optimiztion. In ddition to the orienttion constrints, the cflow LP lso includes the network flow constrints for ech conceptul flow, nd the equl rte constrints. The network flow constrints re specified in compct form for ll conceptul flows, which requires (1) flow rtes must e upper ounded y link cpcities; (2) flow conservtion, i.e., the incoming flow rte in the conceptul flow f i equls to outgoing flow rte in f i t rely node for f i ; nd (3) the incoming flow rte t the source nd the outgoing flow rtes t the receiver re ll zero, for ech f i. The equl rte constrints require tht the flow rtes of conceptul flows re identicl, with χ eing the uniform flow rte. With these liner constrints, the trget flow rte χ is then mximized. TABLE I THE cflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Independent 8 network flow constrints for ech conceptul flow: f i () i [1..k], A >< f i () C() i [1..k], A fin(v) i = fout(v) i i [1..k], v V {m, m i} f >: in(m i ) = i [1..k] fout(m i i) = i [1..k] Equl rte constrints: χ = fin(m i i) i [1..k] We re now redy to present one of our min contriutions of this pper, y showing tht the cflow LP provides n efficient lgorithm to compute the chievle optiml throughput, s well s the routing strtegy. Theorem 1. For n undirected dt network with single multicst session, N = {G(V,E),C : E Q +,M = {m,m 1,...,m k } V }, the mximum end-to-end throughput χ(n) nd its corresponding optiml routing strtegy cn e computed in polynomil time using the cflow LP, in which oth the numer of vriles nd the numer of constrints re polynomil, nd on the order of O( M E ). The conceptul flows f 1...f k constitute the optiml routing strtegy. Proof: The orienttion constrints reflect complete flexiility in orienting the undirected network N, without eing too restrictive or too relxed. For ech fixed orienttion, conceptul flows re eing mximized with independent nd stndrd network flow constrints, s well s the extr constrint tht conceptul flow rtes re equl to ech other. Therefore, the result of the mximiztion is the mximum possile flow rte tht cn e independently chieved from the source to ll receivers, over ll possile orienttions of the network: χ = mx [ min (mximum m m i flow rte)], o O m i M {m } where O denotes ll possile orienttions of the network, nd M {m } is the set of multicst receivers. Recll the recent rekthrough in network coding [4], [] shows tht, for fixed orienttion of the network, rte x cn e chieved for the entire multicst session if nd only if it cn e chieved for ech multicst receiver independently. This implies tht, the mximum throughput in ech orienttion equls to the minimum of the mximum source to receiver flow rte. The cflow LP essentilly mximizes this min-mx flow over ll possile network orienttions, nd otins the mx-min-mx flow tht is precisely the mximum multicst throughput in the originl undirected network. Further, the source my trnsmit informtion to ech receiver m i ccording to the conceptul flow f i. Should more thn one conceptul flows utilize cpcity on the sme link, the conflict cn lwys e resolved, provided tht network coding is pplied ppropritely [4], []. The cflow LP contins 2 E orienttion vriles C(), 2 M E virtul flow vriles f i (), nd one trget flow rte vrile χ. Therefore, the totl numer of vriles is 2( M + 1) E + 1, which is on the order of O( M E ). In ddition, the cflow LP contins 3 E orienttion constrints, (4 E + V )( M 1) network flow constrints, s well s M 1 equl rte constrints. The totl numer of constrints is, therefore, (4 E + V + 1)( M 1) + 3 E, which is lso on the order of O( M E ). The optiml routing strtegy computed y cflow LP specifies the rte of dt strems eing trnsmitted long ech link. Bsed on the routing strtegy, we need to perform the dditionl step of code ssignment to compute the coding strtegy, efore dt strems my e trnsmitted. The coding strtegy includes one trnsformtion mtrix for ech node, which specifies how incoming dt strems re linerly coded into outgoing strems. Given the routing strtegy from the cflow LP, there exist polynomil time lgorithms to perform such code ssignments [21]. Therefore, we hve the following corollry of Theorem 1: Corollry 1. The complete solution tht chieves optiml throughput in undirected dt networks with single multicst session cn e computed in polynomil time, including oth the routing nd coding strtegies. In order to evlute the dvntge of network coding with

5 respect to improving chievle optiml throughput, we hve implemented oth the cflow LP nd rute-force lgorithm to compute the Steiner tree pcking numer. The Steiner tree pcking lgorithm enumertes ll steiner trees in the network, ssigns flow vrile to ech tree, nd then mximizes the summtion of ll tree flows, suject to the constrints tht the totl weight (throughput) of trees using ech link should not exceed its cpcity. We hve evluted oth the cflow LP nd Steiner tree pcking (denoted s π(n)) using our previous exmple in Fig. 1, s well s set of uniform iprtite networks, which re elieved to e good cndidtes to show the power of coding on improving throughput [21], [22]. A uniform iprtite network C(n,k) consists of the dt source nd two lyers: one with n rely nodes nd the other with ( n k) receivers. Ech rely node is connected to the sender, nd ech receiver is connected to different group of k rely nodes, nd ll links hve cpcity of 1. For instnce, the network in Fig. 2 is C(3,2), nd the clssic exmple of network coding in Fig. 1 is isomorphic to C(3,2). Tle II summrizes the results of our empiricl studies, from which we hve derived the following oservtions. First, the cflow LP is much more sclle nd efficient thn Steiner tree pcking, which fils to compute solution for network s smll s C(,3), with only 16 nodes nd 3 links, ut lmost million different Steiner trees. In seprte experiments, the cflow LP is le to compute the optiml throughput for networks hving thousnds of nodes. Second, optiml throughput with coding is lwys lower ounded y tht without coding; however, network coding only introduces slight dvntge, with the χ(n)/π(n) rtio no higher thn Third, coded trnsmission my led to more integrl flow rtes nd throughput thn uncoded trnsmission. TABLE II COMPUTING OPTIMAL THROUGHPUT: cflow LP VS. STEINER TREE PACKING χ(n) π(n) Network V M E χ(n) π(n) # of trees Fig C(3, 2) C(4, 3) ,113 C(4, 2) ,128 C(, 4) ,24 C(, 2) ,14 C(, 3) ,96,624 throughput. IV. ACHIEVING OPTIMAL THROUGHPUT IN UNDIRECTED DATA NETWORKS: MORE GENERAL CASES Our efficient solution, the cflow LP, cn e extended to solve the optiml throughput prolem in cses eyond single multicst session. We now present its extensions (1) to unicst, rodcst nd group communiction sessions, (2) to the cse of multiple communiction sessions, nd (3) to the model of overly networks. A. The cses of unicst, rodcst nd group communiction sessions Since unicst nd rodcst cn e viewed s specil cses of multicst, where two nodes nd ll nodes re in the multicst group, respectively, our solution in the single multicst cse cn e redily pplied to single unicst or rodcst session without modifictions. In the cse of unicst session, the cflow LP essentilly solves liner progrm for single network flow. In the cse of rodcst session, the cflow LP computes the optiml rodcst throughput, which hs een shown y our previous work to e the sme s oth the spnning tree pcking numer nd the network strength [3]. Trditionlly, these three equl quntities hve een computed from either the perspective of network strength or spnning tree pcking. Cunninghm [19] first gve comintoril lgorithm tht computes the network strength, which ws lter improved y Brhon [24]. Both lgorithms re sed on mtroid theory, nd re highly sophisticted. Though the spnning tree pcking prolem hs n LP formultion, the numer of vriles is exponentil. It is therefore necessry to work on its dul progrm, where the minimum spnning tree lgorithms cn serve s the seprtion orcle. In comprison, the cflow LP provides n efficient lterntive, with polynomil numer of constrints nd vriles, nd with oth generl LP solvers nd custom-tilored distriuted sugrdient solutions [23] ville. f1 S1 S f2 S 2 As finl note, we point out tht eyond pplying generl liner progrmming solutions such s the simplex method it is lso possile to design custom-tilored lgorithms for the cflow LP, to tke dvntge of its underlying network flow structure. In n ccompnying pper [23], we pply Lgrngin relxtion on the dul progrm of the cflow LP, nd design distriuted sugrdient solution. The lgorithm itertively refines n existing orienttion of the originl network, until n optiml one is reched. At this point, M mxflow computtions re invoked to find the optiml multicst Fig. 3. Trnsforming group communiction into multicst trnsmission. Group communiction refers to mny-to-mny communiction sessions where multiple sources multicst independent dt to the sme group of receivers, the set of senders nd the set of receivers my or my not overlp. Previous work [] hs shown tht mny-to-mny session cn e esily trnsformed into multicst session, y dding super source, which is trditionl technique in network flows. As illustrted in Fig. 3,

6 we cn dd n dditionl source S to the network, nd connect it to ech of the sources in the group communiction session, with links of unounded cpcity. We my then pply the cflow LP to mximize the multicst throughput from S to ll the receivers. Additionl constrints cn e pplied to flow rtes on the newly dded links etween the super source nd the originl sources in the session, governing firness mong the originl sources. The outcome from the cflow LP is the optiml throughput nd its corresponding routing strtegy for the originl group communiction session. B. The cse of multiple sessions In its most generl form, the optiml throughput prolem llows multiple communiction sessions of different types to co-exist in the sme network. Since multicst is representtive in tht unicst, rodcst nd group communiction cn ll e trnsformed into multicst it is sufficient to consider the optiml throughput prolem in the cse of multiple multicst sessions. To chieve optiml throughput with multiple sessions, we need to consider the prolem of inter-session firness. The definition of firness is usully ppliction dependent; however, s long s it cn e expressed using liner constrints, we cn esily include them in the LP formultion. With respect to network coding in multiple sessions, it is theoreticlly possile to pply network coding on multiple incoming strems of different sessions. However, we rgue ginst this possiility, nd use coding y superposition [4], i.e., network coding is pplied only to incoming strems of the sme session. This rgument is minly supported y the computtionl intrctility of the optiml throughput prolem if inter-session coding is llowed 2. In ddition, our empiricl experiences show tht llowing inter-session coding cn hrdly improve optiml throughput, nd it is not prcticl to code dt strems from different pplictions either. The mflow LP given in Tle III is designed to solve the optiml throughput prolem with multiple multicst sessions, where we use weighted proportionl firness s the firness model. It is the result of extending the cflow LP to its multicommodity vrint. We ssume there exist totl of s multicst sessions, numered s 1...s. Ech session i hs source m i, numer of receivers m i1...m iki, set of conceptul flows f i1...f i k i, s well s weight w i indicting the importnce of the session. The sclr χ i is the common rte for conceptul flows within session i, the sclr χ is the common weighted throughput for ll the multicst sessions, nd the trget of the mflow LP is to mximize χ. The mflow LP replces the stndrd network flow constrints in the cflow LP with set of multicommodity cflow constrints. Since flows of different sessions contend for link cpcity, the summtion of the per-session flow rtes should not exceed link cpcities. Since flows within the sme session do not compete for link cpcity, the effective flow rte within 2 It is known tht finding sufficient nd necessry conditions for the fesiility of multiple sessions in this cse is equivlent to finding point in n lgeric vriety, which is NP-hrd []. session i on link is f i () = mx j [1..ki] f ij (). The mx function is not liner, so this constrint is relxed to f i () f ij (), j [1...k i ]. TABLE III THE mflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Multicommodity 8 cflow constrints: f i j () i [1..s], j [1..k i], A f i j () f i () i [1..s], j [1..k i], >< P A s i=1 fi () C() A f i j in (v) = fi j out(v) i [1..s], j [1..k i] v V {m i, m ij } f >: j in (mi ) = i [1..s], j [1..k i] f i j out(m ij ) = i [1..s], j [1..k i] Equl rte constrints: χ i = f i j in (mi ) j Firness constrints: i [1..s], j [1..ki] χ = χ i /w i i [1..s] Theorem 2. In the cse of multiple multicst sessions with coding y superposition, the optiml end-to-end throughput nd its corresponding optiml routing strtegy in undirected dt networks cn e computed in polynomil time, y the mflow LP. Proof: The correctness of the mflow LP uilds upon the correctness of the cflow LP, which is proved in Theorem 1, plus the fct tht for coding y superposition, dt trnsmission from different sessions constitute totlly different commodities when competing for link cpcity. Furthermore, it is esy to check tht oth the numer of vriles nd the numer of constrints in the mflow LP re on the order of O(s M E ), where s is the numer of sessions. C. The cse of overly networks Since neither network coding nor dt repliction (for IP multicst) re widely supported in the current-genertion network elements in the core, we consider the cse of overly networks where only the end hosts hve the full cpilities to forwrd, replicte nd code dt strems, nd the core network elements (henceforth referred to s routers) my only forwrd dt pckets s is. We note tht the cse of overly networks is ctully more generl thn the clssicl model of undirected dt networks we hve used so fr, which hints tht the optiml throughput prolem my ecome hrder to solve. Let N = {G(V,E),C : Q +,M = {m,...,m k },H = M {m k+1,...m h } V } e n overly network with multicst session. The multicst group M is suset of the end hosts H. If M = H, i.e., ll end hosts re in the multicst group, Grg et l. [2] hs shown tht the optiml multicst throughput cn e efficiently computed in this cse,

7 y working on the dul progrm of nturl LP formultion. It hs lso een shown in [2] tht, in the generl cse the optiml throughput prolem without network coding is the overly Steiner tree pcking prolem, nd is still NP-complete. With the support of network coding, however, we re le to extend the cflow LP to its overly vrint, referred to s the oflow LP, to solve the optiml throughput prolem in the model of overly networks. The oflow LP tkes hierrchicl view of the multicst trnsmission, with n underly nd n overly level. The underly level corresponds to the physicl network topology, nd hs multicommodity flows g ij connecting ech pir of end hosts m i nd m j, vi only routers s intermedite nodes. The overly level is conceptul, nd contins end hosts fully connected s complete grph. The link ij from m i to m j hs cpcity equl to the underly flow rte g ij. We then pply the cflow LP in the overly level to mximize the end-to-end throughput, where ech node is cple of repliction nd coding. In the oflow LP shown in Tle IV, we include three groups of constrints. First, the orienttion constrints re identicl to those included in the cflow LP. Second, the stndrd multicommodity flow constrints re specified for the underly flows etween end hosts nd vi routers only. Third, we introduce the mpping constrints tht mp the underly g ij flow rte to the overly link cpcity (referred to s C ( ij )), nd then pply the originl constrints in the cflow LP t the overly level. The trget of the oflow LP is to mximize throughput in the overly level. TABLE IV THE oflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Underly 8 multicommodity flow constrints: P g ij () i, j [1..h], A >< g ij () C() i, j [1..h], A g ij in (v) = gij out(v) i, j [1..h], v V H g >: in (v) = i, j [1..h], v H {mj} gout(v) ij = i, j [1..h], v H {m i} Overly 8 cflow constrints: C ( ij) = gout(m ij i) i, j [1..h] f i ( ) i [1..k], >< A = { ij 1 i, j h} f i ( ) C ( ) A, i [1..k] fin(v) i = fout(v) i i [1..k], v H M fin(m i ) = i [1..k] f >: out(m i i) = i [1..k] χ = fin(m i i) i [1..k] Theorem 3. In the cse of single multicst session in the model of overly networks, the optiml end-to-end throughput nd its corresponding optiml routing strtegy cn e computed in polynomil time, using the oflow LP. Proof: Since rely nodes in the overly network cn not replicte or encode dt, dt strem tht is trnsmitted etween two end hosts without pssing third end host remins unchnged throughout the trnsmission nd upon rrivl. Therefore, it is vlid to model these direct trnsmissions etween end hosts s multicommodity flows. The vlidity of the cflow constrints in the overly lyer my e derived from the correctness of the cflow LP, which we hve proved in Theorem 1. Furthermore, inspection on the vriles nd constrints in the oflow LP revels tht, the numer of oth re on the order of O( H 2 E ). Similr to the extension from cflow to mflow, one my extend the oflow LP into its multicommodity vrint to ccommodte multiple sessions in overly networks. More specificlly, one needs to replce the overly cflow constrints with the overly mflow constrints in the third group of constrints of the oflow LP. The resulting liner progrm hs oth its numer of vriles nd numer of constrints ounded y O(( H 2 + s M ) E ). This is usully not worse thn those of the single-session oflow LP, since H 2 domintes s M in most cses. V. EMPIRICAL STUDIES Due to the lck of efficient lgorithms, previous studies on the prolem of improving session throughput re lrgely sed on experimentl or intuitive insights. We rgue tht the vilility of the cflow, mflow nd oflow LPs hs significntly chnged the lndscpe, nd hs mde it computtionlly fesile to study the exct enefits of vrious proposls to chieve higher throughput, including single multicst tree with dt repliction, multiple multicst trees, nd network coding. Our empiricl studies re sed on the implementtion of ll three LPs tht we hve proposed. In comprison studies, we hve lso implemented lgorithms to compute the optiml throughput with multiple multicst trees ut without coding, the optiml throughput with widest multicst tree, s well s the optiml throughput with ll unicst from the source to ll receivers. Topologies used in our simultions re generted y the BRITE topology genertor [26], with sizes rnging from 1 to nodes, oth with nd without power-lw properties, with hevy-tiled or constnt link cpcities. How dvntgeous is network coding with respect to improving optiml throughput? The rtio of chievle optiml throughput with coding over tht without coding is referred to s the coding dvntge. Recll tht we hve investigted the coding dvntge in Tle I, nd re unle to experimentlly find cses where network coding my improve optiml throughput y fctor higher thn We re nturlly led to the question: Wht is the upper ound of the coding dvntge? Previous work [21] shows tht in directed cyclic networks with integrl routing requirement, there exist multicst networks where the coding dvntge grows proportionlly s log( V ), nd is thus not finitely ounded. However, we found the sitution is drsticlly different in undirected networks. In

8 [3], we use undirected splitting nd grph orienttion to prove tht, for multicst trnsmissions in undirected networks, the coding dvntge is ounded y constnt fctor of 2. Given the ound 1.12 otined for contrived networks, nd the ound 2 proven in theory, we further studied the coding dvntge in over one thousnd rndomly generted topologies. Our oservtion is tht, for ll the rndom topologies we tested, the coding dvntge lwys remins 1., i.e., network coding does not introduce ny improvement in chievle throughput. This implies tht the fundmentl enefit of network coding is not higher optiml throughput, ut to fcilitte significntly more efficient computtion nd implementtion of strtegies to chieve such optiml throughput. How dvntgeous is stndrd multicst compred to unicst nd overly multicst? The cflow LP is instrumentl to precisely compute the chievle optiml throughput with one multicst communiction session, either with network coding or with multiple multicst trees, since the outcomes from the two re hrdly different. In either cse, dt repliction need to e supported on ll network nodes, including core network elements. It hs een common knowledge tht, when compred to unicst from the source to ll receivers, stndrd multicst rings etter ndwidth efficiency nd higher end-to-end session throughput. However, even in the cse of unicst, pth diversity needs to e exploited to chieve optiml throughput, equivlent to the mximum unicommodity flow prolem. It is not immeditely cler how dvntgeous stndrd multicst is. Overly multicst lnces the trdeoff etween the prcticlity of stndrd multicst nd unicst. It refers to the cse where only the memers of the multicst group my replicte or code dt, wheres ll other nodes my only forwrd dt. The optiml throughput chieved y overly multicst is efficiently computed y the oflow LP. We perform quntittive study tht compres the optiml throughput chieved with stndrd multicst, overly multicst nd unicst. The study is performed in rndom networks with up to nodes nd over 1 links. There re 3 nd 1 memers in the multicst group respectively, in two different sets of tests. Multicst nodes re rndomly selected, with different multicst groups eing s disjoint s possile. For ech network size, multiple tests re performed with different network topologies nd different choices of the multicst group, the results re then verged. As we my oserve from Fig. 4, there exists ovious differences etween stndrd multicst throughput nd ll unicst throughput, nd the differences re more significnt in Fig. 4(), where the scle of the multicst trnsmission is lrger. This is due to the fct tht with lrge numer of receivers, the numer of unicst flows increses in the ll unicst pproch, nd links incident to the sender ecome ottlenecks for the trnsmission. Surprisingly, the figure lso suggests tht, the optiml throughput chieved y overly multicst is lmost identicl to tht chieved y stndrd multicst, where ll network nodes re le to replicte or code Optiml throughput (Kps) Optiml throughput (Kps) () Size of multicst group = Numer of nodes in the network () Size of multicst group = 1 Stndrd multicst Overly multicst All unicst Numer of nodes in the network Fig. 4. Achievle optiml throughput using stndrd multicst, overly multicst, nd ll unicst from the sender to ll receivers. dt. On verge, the optiml throughput of overly multicst is over 9% of stndrd multicst. This oservtion shows tht, from the perspective of mximum chievle throughput, while there my exist contrived network topologies tht show more significnt dvntges of stndrd multicst over overly multicst, little difference remins once lrge scle prcticl network topologies re considered. In summry, the ll unicst pproch does not scle, while overly multicst my closely pproch optiml throughput without requiring core routers to e modified. How sensitive is optiml throughput to node joins? When new nodes join the multicst session, how my chievle optiml throughput e ffected? Intuitively, if rely node joins the multicst group nd ecomes new receiver, the chievle session throughput should decrese, due to the following two cuses: (1) lrger numer of receivers my led to more intense competition for ndwidth; nd (2) new node with low cpcity my ecome ottleneck nd limit the throughput for the entire session. Our simultion results show tht, the second cuse hs much more significnt impct thn the first one. Fig. () shows vritions of optiml throughput s the numer of nodes in the multicst group increses from three to V /2, nd then to V (effectively rodcst session), for vrious network sizes V. In this experiment, network topologies re generted with two edges per node without power-lw reltionships, with hevy-tiled ndwidth distriution etween 1 nd Kps on the links. As we cn oserve, when the size of the multicst group increses from three to V /2, the effects on chievle throughput is rther significnt. However, further expnding the multicst group to the entire network leds to much smller decrese. Both cuses tht we hve discussed contriute to the initil decrese

9 of throughput, while the second cuse (i.e., the effects of ottleneck node) plys less importnt role in the susequent decrese when the multicst group contins hlf of the nodes in the network, it is very likely for the group to hve lredy contined node with low cpcity. Optiml throughput (Kps) Optiml throughput (Kps) () Hevy tiled link cpcity Numer of nodes in the network () Constnt link cpcity M =3 M = V /2 M = V Numer of nodes in the network Fig.. Vritions of optiml throughput due to new nodes joining the multicst session. We further performed the sme tests on power-lw network topologies with 1 Kps constnt link ndwidth, nd the results re shown in Fig. (). In the power-lw topologies, most nodes hve smll degrees of two or three, while smll numer of nodes hve high degrees. Therefore, the initil multicst group usully contins node with smll degree lredy, which lso hs low cpcity, since the link ndwidth is constnt. In this cse, only inter-receiver ndwidth competition remins s mjor concern. However, s we cn oserve in the figure, in most cses the optiml multicst throughput remins roughly constnt, even fter ll the nodes hve joined the multicst session. This counterintuitive oservtion shows tht, new receivers my shre ndwidth with existing receivers well, nd do not significntly ffect the chievle throughput, s long s their cpcities re not too low. Spikes in Fig. () correspond to the occsionl cses where nodes in the initil multicst group ll hve reltively high cpcities. Both results in Fig. () nd () hve led to the sme oservtion tht, when new nodes join multicst session, the decresed optiml throughput is minly due to ottleneck receivers with lower cpcities. How sensitive is optiml throughput to the ddition of new sessions? When new sessions re dded to the network, how do they ffect chievle optiml throughput? The mflow LP, presented in Sec. IV, mkes it fesile to crry out our empiricl studies. Fig. 6 shows the vrition of optiml throughput s new communiction sessions re creted. Three types of throughput re shown: (1) previous optiml, which represents the optiml weighted session throughput efore the new session is dded; (2) incrementl, which is the weighted throughput for the new session using residul link cpcities only, or just the previous optiml throughput if the chievle throughput of the new session is higher; nd (3) re-optimized, which is the re-computed optiml session throughput fter the new session is dded. Four groups of simultions re performed, with two, three, four, nd five existing sessions, respectively, efore the new session is estlished. Ech multicst group hs size five, nd nodes in different multicst groups re chosen to e s disjoint s possile. Ech session is ssigned n equl weight. Optiml throughput (Kps) Numer of sessions = Numer of sessions = Fig Optiml throughput (Kps) Numer of sessions = Numer of sessions = Numer of nodes in the network prev optiml incrementl re optimized Throughput vritions s new session is creted. Results in Fig. 6 show tht, the ddition of n extr session does not drmticlly ffect the chievle optiml throughput, especilly when the network size is lrge in comprison to the numer of nodes involved in the trnsmissions. However, if the existing sessions remin trnsmitting ccording to the optiml trnsmission strtegy computed efore the new session joins, nd only residul cpcities cn e utilized to serve the new session (the incrementl throughput cse), then the resulting throughput is not stisfctory unless the numer of sessions is very smll (s = 2). In generl, this my led to very low, even zero, throughput for the new session. Therefore it is necessry to perform re-optimiztion efore new session strts to trnsmit. How sensitive is optiml throughput to firness constrints? In order to investigte how inter-session firness requirements ffect the optiml throughput, we estlish three oneto-two multicst sessions in networks of vrious sizes etween 1 nd 3, nd computed their totl optiml throughput with the following firness constrints, respectively: () no firness requirement, which leds to the mximum vlue possile for

10 the totl throughput; () solute firness, in which ech session is required to hve exctly the sme throughput; (c) weighted proportionl firness, where the throughput of ech session is proportionl to the ssocited weight of tht session; nd (d) mx-min firness, in which no session throughput cn e incresed without decresing nother lredy smller session throughput. As first smll-scle experiment to gin some insights, Fig. 7 shows the totl throughput of three sessions in network with twenty nodes, using the mflow LP. Multicst groups re chosen to e s disjoint s possile. The totl weight of three sessions w 1 + w 2 + w 3 = 1. As we cn see, the weight distriution hs significnt impct on the chievle totl throughput. When the three weights re hevily unlnced, the session with the smllest weight cn not relize its throughput potentil, nd consequently leds to smll vlue of totl throughput. The chievle throughput with solute firness t w 1 = w 2 = w 3 =.333 is 91.8 Kps. The glol optiml throughput 17. Kps is chieved t (w 1,w 2,w 3 ) = (.287,.47,.36), which turns out to e identicl to the throughput with mx-min firness in this cse. In order to find out whether chieving optiml throughput scrifices ndwidth efficiency, we hve conducted performnce comprisons etween optiml throughput multicst nd single tree multicst. In the ltter cse, we compute the widest Steiner tree, which hs the highest throughput from ll possile multicst trees. The throughput of tree is the lowest cpcity of its links. We choose the tree with the highest throughput rther thn the one tht is most ndwidth efficient, since the ltter is equivlent to the minimum Steiner tree prolem, which is hrd to compute or to pproximte. Even when we cn find such ndwidth efficient tree, it my hve n exceedingly low throughput, which is not prcticl for dt trnsmissions. Optiml throughput (Kps) Hevy tiled link cpcity Constnt link cpcity Bndwidth efficiency (%) Hevy tiled link cpcity Constnt link cpcity cflow Widest tree Totl throughput of 3 sessions (Kps) W W Numer of nodes in the network Fig. 8. Achievle throughput nd ndwidth efficiency: comprison etween the optiml throughput multicst (cflow LP) nd the widest Steiner tree. Fig. 7. Totl throughput of three multicst sessions, s inter-session firness requirements chnge. Further results in Tle V show tht the excellent performnce of mx-min firness in the ove exmple is not coincidence. As we my oserve, when the network size is reltively lrge ( nd ove in the tle), mx-min firness lwys leds to optiml throughput. When the network size is smll (1 nd in the tle), the inter-session competition for ndwidth ecomes more intense. The throughput with mxmin firness my e inferior to the optiml throughput in this cse, ut the difference is usully smll. TABLE V TOTAL ACHIEVABLE THROUGHPUT WITH MAX-MIN FAIRNESS VS. GLOBAL OPTIMAL THROUGHPUT network size mx-min (Kps) optiml (Kps) Does optiml throughput led to low ndwidth efficiency? In Fig. 8, we compre oth chievle throughput nd ndwidth efficiency etween the two pproches. Bndwidth efficiency is computed s the totl receiving rte t ll receivers divided y the totl ndwidth consumption. We tested two groups of networks, one with vrile link cpcity conforming to the hevy-tiled distriution, the other with constnt link cpcity. For the vrile link cpcity cse, optiml throughput is higher thn the widest Steiner tree throughput y fctor of over 2 on verge, showing the dvntge of using the optiml trnsmission strtegy computed with the cflow LP, eyond single multicst tree. Interestingly, the ndwidth efficiency of optiml throughput multicst lso outperforms tht of the widest Steiner tree multicst. The widest Steiner tree insists to use links with the highest ndwidth possile, nd therefore my result in rther long tree rnches, especilly when the network size is lrge. For the constnt link cpcity cse, the difference etween the optiml nd widest Steiner tree throughput ecomes even lrger. Every tree in this cse hs the sme throughput, therefore the widest selection criterion ecomes irrelevnt. However, the difference in ndwidth efficiency decreses, since it is no longer necessry to include long tree rnches to chieve the mximum tree throughput.

11 VI. CONCLUDING REMARKS The min prolem we hve studied in this pper is to compute nd chieve optiml throughput in dt networks, in the generl cse of undirected communiction links. We hve een plesntly surprised t how results from network coding re le to fcilitte the design of efficient solutions to this fundmentl prolem tht ws previously viewed s very hrd. We lso show the counter-intuitive conclusion tht, the most significnt enefit of network coding is not to chieve higher optiml throughput, ut to mke it fesile to chieve such optimlity in polynomil time. We show tht such efficient lgorithms my e designed for multiple communiction sessions of vriety of types, nd for the more relistic model of overly networks. Simultion studies lso suggest tht, overly multicst techniques my pproch optiml multicst throughput quite well. REFERENCES [18] G. Roins nd A. Zelikovsky, Improved Steiner Tree Approximtion in Grphs, in Proceedings of the 7th Annul ACM-SIAM Symposium on Discrete Algorithms (SODA),. [19] W. H. Cunninghm, Optiml Attck nd Reinforcement of Network, Journl of the ACM, vol. 32, pp , 198. [] Z. Li, B. Li, D. Jing, nd L. C. Lu, On Achieving Optiml End-toend Throughput in Dt Networks: Theoreticl nd Empiricl Studies, Tech. Rep., ECE, University of Toronto, 4. [21] P. Snders, S. Egner, nd L. Tolhuizen, Polynomil Time Algorithm for Network Informtion Flow, in Proceedings of the 1th ACM Symposium on Prllelism in Algorithms nd Architectures, 3. [22] C. Gröpl, S. Hougrdy, T. Nierhoff, nd H. J. Prömel, Steiner Trees in Uniformly Qusi-iprtite Grphs, Informtion Processing Letters, vol. 83, no. 4, pp. 19, 2. [23] Z. Li nd B. Li, Efficient Computtion of Mximum Multicst Rtes, in Proc. of IEEE INFOCOM,. [24] F. Brhon, Pcking Spnning Trees, Mthemtics of Opertions Reserch, vol., no. 1, pp , 199. [2] N. Grg, R. Khndekr, K. Kunl, nd V. Pndit, Bndwidth Mximiztion in Multicsting, in Proceedings of the 11th Europen Symposium on Algorithms (ESA), 3. [26] A. Medin, A. Lkhin, I. Mtt, nd J. Byers, BRITE: Boston University Representtive Internet Topology Genertor, [1] L. Qiu, Y. R. Yng, Y. Zhng, nd S. Shenker, On Selfish Routing in Internet-Like Environments, in Proc. of ACM SIGCOMM, 3. [2] R. K. Ahuj, T. L. Mgnnti, nd J. B. Orlin, Network Flows: Theory, Algorithms, nd Applictions, Prentice Hll, Upper Sddle River, New Jersey, [3] Z. Li nd B. Li, Network Coding in Undirected Networks, in Proc. of the 38th Annul Conference on Informtion Sciences nd Systems (CISS), 4. [4] R. Ahlswede, N. Ci, S. R. Li, nd R. W. Yeung, Network Informtion Flow, IEEE Trnsctions on Informtion Theory, vol. 46, no. 4, pp , July. [] R. Koetter nd M. Medrd, An Algeric Approch to Network Coding, IEEE/ACM Trnsctions on Networking, vol. 11, no., pp , Octoer 3. [6] Z. Wng nd J. Crowcroft, Qulity of Service Routing for Supporting Multimedi Applictions, IEEE Journl on Selected Ares in Communictions, vol. 14, no. 7, pp , Septemer [7] A. J. Bllrdie, P. F. Frncis, nd J. Crowcroft, Core Bsed Trees, August [8] Y. Chu, S. G. Ro, S. Seshn, nd H. Zhng, A Cse for End System Multicst, IEEE Journl on Selected Ares in Communictions, pp , Octoer 2. [9] S. Bnerjee, B. Bhttchrjee, nd C. Kommreddy, Sclle Appliction Lyer Multicst, in Proc. of ACM SIGCOMM, August 2. [1] M. Cstro, P. Druschel, A.-M. Kermrrec, A. Nndi, A. Rowstron, nd A. Singh, SplitStrem: High-Bndwidth Multicst in Coopertive Environments, in Proc. of the 19th ACM Symposium on Operting Systems Principles (SOSP), Octoer 3. [11] V. Pdmnhn, H. Wng, P. Chou, nd K. Sripnidkulchi, Distriuting Streming Medi Content Using Coopertive Networking, in Proc. of NOSSDAV 2, My 2. [12] J. Byers nd J. Considine, Informed Content Delivery Across Adptive Overly Networks, in Proc. of ACM SIGCOMM, August 2. [13] D. Kostic, A. Rodriguez, J. Alrecht, nd A. Vhdt, Bullet: High Bndwidth Dt Dissemintion Using n Overly Mesh, in Proc. of the 19th ACM Symposium on Operting Systems Principles (SOSP 3), 3. [14] D. Applegte nd E. Cohen, Mking Intr-Domin Routing Roust to Chnging nd Uncertin Trffic Demnds: Understnding Fundmentl Trdeoffs, in Proc. of ACM SIGCOMM, August 3, pp [1] S. Y. R. Li, R. W. Yeung, nd N. Ci, Liner Network Coding, IEEE Trnsctions on Informtion Theory, vol. 49, pp. 371, 3. [16] S. Chen, O. Günlük, nd B. Yener, The Multicst Pcking Prolem, IEEE/ACM Trnsctions on Networking, vol. 8, no. 3, pp ,. [17] K. Jin, M. Mhdin, nd M. R. Slvtipour, Pcking Steiner Trees, in Proceedings of the 1th Annul ACM-SIAM Symposium on Discrete Algorithms (SODA), 3.

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324 A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator AP Clculus Finl Review Sheet When you see the words. This is wht you think of doing. Find the zeros Find roots. Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor.

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Online Multicommodity Routing with Time Windows

Online Multicommodity Routing with Time Windows Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Simulation of operation modes of isochronous cyclotron by a new interative method

Simulation of operation modes of isochronous cyclotron by a new interative method NUKLEONIKA 27;52(1):29 34 ORIGINAL PAPER Simultion of opertion modes of isochronous cyclotron y new intertive method Ryszrd Trszkiewicz, Mrek Tlch, Jcek Sulikowski, Henryk Doruch, Tdeusz Norys, Artur Srok,

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n) BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Answer, Key Homework 10 David McIntyre 1

Answer, Key Homework 10 David McIntyre 1 Answer, Key Homework 10 Dvid McIntyre 1 This print-out should hve 22 questions, check tht it is complete. Multiple-choice questions my continue on the next column or pge: find ll choices efore mking your

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

Week 7 - Perfect Competition and Monopoly

Week 7 - Perfect Competition and Monopoly Week 7 - Perfect Competition nd Monopoly Our im here is to compre the industry-wide response to chnges in demnd nd costs by monopolized industry nd by perfectly competitive one. We distinguish between

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

1.2 The Integers and Rational Numbers

1.2 The Integers and Rational Numbers .2. THE INTEGERS AND RATIONAL NUMBERS.2 The Integers n Rtionl Numers The elements of the set of integers: consist of three types of numers: Z {..., 5, 4, 3, 2,, 0,, 2, 3, 4, 5,...} I. The (positive) nturl

More information

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs Journl of Grph Algorithms nd Applictions http://jg.info/ vol. 13, no. 3, pp. 319 347 (2009) DAGmps: Spce Filling Visuliztion of Directed Acyclic Grphs Vssilis Tsirs 1,2 Sofi Trintfilou 1,2 Ionnis G. Tollis

More information

A Study on Autonomous Cooperation between Things in Web of Things

A Study on Autonomous Cooperation between Things in Web of Things A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, 305-700,

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Learner-oriented distance education supporting service system model and applied research

Learner-oriented distance education supporting service system model and applied research SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

0.1 Basic Set Theory and Interval Notation

0.1 Basic Set Theory and Interval Notation 0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined

More information

1. In the Bohr model, compare the magnitudes of the electron s kinetic and potential energies in orbit. What does this imply?

1. In the Bohr model, compare the magnitudes of the electron s kinetic and potential energies in orbit. What does this imply? Assignment 3: Bohr s model nd lser fundmentls 1. In the Bohr model, compre the mgnitudes of the electron s kinetic nd potentil energies in orit. Wht does this imply? When n electron moves in n orit, the

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,

More information

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013 Utiliztion of Smoking Cesstion Benefits in Medicid Mnged Cre, 2009-2013 Office of Qulity nd Ptient Sfety New York Stte Deprtment of Helth Jnury 2015 Introduction According to the New York Stte Tocco Control

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014 Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Measuring Similarity between Graphs Based on the Levenshtein Distance

Measuring Similarity between Graphs Based on the Levenshtein Distance Appl. Mth. Inf. Sci. 7, No. 1L, 169-175 (01) 169 Applied Mthemtics & Informtion Sciences An Interntionl Journl Mesuring Similrity etween Grphs Bsed on the Levenshtein Distnce Bin Co, ing Li nd Jinwei in

More information

Linear Programming in Database

Linear Programming in Database 9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,

More information

Labor Productivity and Comparative Advantage: The Ricardian Model of International Trade

Labor Productivity and Comparative Advantage: The Ricardian Model of International Trade Lbor Productivity nd omrtive Advntge: The Ricrdin Model of Interntionl Trde Model of trde with simle (unrelistic) ssumtions. Among them: erfect cometition; one reresenttive consumer; no trnsction costs,

More information

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros

More information

piecewise Liner SLAs and Performance Timetagment

piecewise Liner SLAs and Performance Timetagment i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY

THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY GEOCHRONOMETRIA Vol. 2, pp 15-2, 21 Journl on Methods nd Applictions of Asolute Chronology THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY ALICJA CHRUŒCIÑSKA 1, HUBERT L. OCZKOWSKI

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information