Performance Analysis of Smart Optical Burst Switching Networks for Different Signaling Protocols

Size: px
Start display at page:

Download "Performance Analysis of Smart Optical Burst Switching Networks for Different Signaling Protocols"

Transcription

1 Sart Coputing Review, vol. 5, no. 5, October Sart Coputing Review Perforance Analysis of Sart Optical Burst Switching Networks for Different Signaling Protocols Mykhailo Klyash, Mykola Kaidan, and Stepan Duych Lviv Polytechnic National University /Lviv 79013, Ukraine / {kliash@lp.edu.ua, kaidan_k@ail.ru, stiv.duych@gail.co, taras.aksyyuk.ua@ieee.org} *Corresponding Author: Mykhailo Klyash Received July 15, 2015; Revised Septeber 20, 2015; Accepted Septeber 16, 2015; Published October 31, 2015 Abstract: A future optical transport network needs an extreely high capacity to satisfy the rapid increase in traffic. Many technologies have been developed to increase throughput and energy efficiency and siplify the deployent of optical transport networks. Internet Protocol traffic transission precedes optical transport networks in requiring new approaches for network nodes. Although optical fiber has a treendous capacity, switching nodes liit the perforance of optical networks. An optical burst switched network concept has been introduced as a proising solution to overcoe this proble. Optical burst switched technology effectively utilizes the advantages of both circuit switching and packet switching networks, and also eliinates their drawbacks. Two iportant issues in achieving the best perforance in optical burst switched networks are scheduling bursts and signaling protocols. In this paper, we provide a coprehensive analysis of optical burst switched signaling protocols. We study three protocols for signaling in optical burst switched networks that are used for various traffic types. The Tell-and-Wait and Just Enough Tie protocols are used in extree cases of loss-sensitive and delay-sensitive traffic, respectively. The third signaling protocol, called Interediate Note Initiation, is a proising solution with an ability to adjust paraeters depending upon traffic requireents. We analyze the blocking probability of core nodes with respect to the nuber of buffers and wavelengths for each signaling protocol. The siulation results show that when the nuber of optical buffers are five or higher, blocking probability tends to be zero, regardless of the nuber of wavelengths. Therefore, this tends to decrease loss due to a burst, and iproves the overall perforance of optical burst switched networks. The burst outstripping proble in optical fiber has been solved by deterining a proper buffering policy for each burst, after considering the burst priorities and tie delays between consistent bursts. DOI: /sartcr

2 Sart Coputing Review, vol. 5, no. 5, October Keywords: blocking probability, buffering, Interediate Node Initiation, Just Enough Tie, Sart Optical Burst Switching, Tell-and-Wait. Introduction T oday we are facing a rapid growth in inforation services, which are ubiquitously available to end users regardless of the device (sartphone, laptop, tablet, etc.) they use. Modern inforation systes ust provide instant data transission between end users, enterprises, and global cloud systes to satisfy ever-increasing requireents. To integrate distant separated systes into one ubiquitous inforation syste, optical networks are widely deployed around the globe by connecting continents and countries through undersea and terrestrial links. Optical networks have been constantly developed during the past decades to support these growing requireents. Nowadays, an extreely huge nuber of Internet-connected devices (around 30 billion) has given rise to exponential traffic growth (ore than 2 zettabytes per year). In the near future, we expect an even ore rapid increase in Internet Protocol (IP) traffic that will be triggered by upcoing 5G obile networks, the Internet of Things (IoT), Mobile Cloud and Fog Coputing systes [1,2]. Consequently, traffic volue in optical transport networks needs to increase. At present, optical networks have attained treendous capacity due to the ipleentation of Dense Wavelength Division Multiplexing (DWDM). However, bottlenecks in switching nodes liit overall network perforance [3]. Rapidly-variable IP traffic has led to low perforance in wavelength-switching technologies [4]. Techniques based on a new concept called IP over DWDM (IPoDWDM) [5] for packet switching have been developed to increase the flexibility of optical networks. The packet switching techniques are able to handle high traffic variability. However, the high overhead produced by signaling data decreases the bandwidth utilization factor. A proising IPoDWDM-based ipleentation is sart optical burst switching (OBS) technology [6]. OBS cobines the advantages of both circuit switching and packet switching technologies. This allows the developent of an elastic optical transport network with flexible traffic anageent [7]. OBS networks transit IP packets that are associated with logical bursts. Bursts logically cobine IP packets that share the sae destination and have siilar service requireents. Packets associated with different bursts are separated according to the destination address and throughput requireents [8]. Each burst is affiliated with a Burst Header Packet (BHP), which contains inforation about the destination address, Quality of Service (QoS) requireents and additional inforation to support scheduling and switching [9-11]. OBS networks are based on two types of nodes: edge nodes and core nodes [12]. The functions of an edge node includes the aggregation of data flows fro access networks, assebling IP packets into bursts, and generating BHPs. In reverse, edge node analyses BHPs, disassebles bursts into IP packets, and distributes data flows between access networks. The function of the core node is the routing and switching of bursts according to BHP inforation. The ain feature of a core node is all-optical switching and transparent transission. In this case, two edge nodes are able to transit large volues of data through virtual channels with high throughputs and low latency [13]. To attain a high perforance fro an optical network, BHPs are transitted ahead of corresponding bursts. This allows us to create virtual channels in the ost effective way, when a channel is established right before a burst transission. However, odern IP networks are ulti-service and featured under various traffic types. This significantly coplicates routing, switching, and scheduling in both edge nodes and core nodes due to differing throughput, latency, and packet loss requireents for each traffic type. Therefore, different signaling protocols such as Just Enough Tie (JET), Tell-and-Wait (TAW), and Interediate Node Initiation (INI) [14] were developed for OBS networks. In this paper, we analyze the perforance of existing signaling protocols for OBS networks in ters of blocking probability in core nodes and end-to-end delay. We start by analyzing the basic principles of a sart optical burst switching network in the second section. Then, we describe different signaling protocols, which are used in OBS, and derive delay equations for each protocol in the third section. In the fourth section, we derive equations for blocking probability in the core node and deterine the optial buffer by running a probabilistic siulation. The tie delays in burst transission for different signaling protocols are studied in the fifth section. Finally, we conclude this paper in the sixth section. Basic principles of sart optical burst switching Sart optical burst switching is the next step in the evolution of an optical transport network, and is positioned between circuit switched NG-SDH networks and future all-optical packet switched networks. OBS effectively utilizes the advantages of both circuit and packet-switched networks while eliinating their drawbacks. This allows elasticity in the high fluctuation of IP traffic in addition to effective bandwidth utilization. The data transission in optical burst switched networks works as follows. First, edge nodes aggregate all data flows and analyzes each IP packet. Second, all IP packets

3 380 Klyash et. al: Perforance Analysis of Sart Optical Burst Switching Networks for Different Signaling Protocols are separated according to their type and scheduled for appropriate bursts. Third, the edge node generates and transits BHPs. Finally, each burst is transitted according to scheduled transission tie. The general architecture of a sart optical burst switching network is shown in Figure. 1. The OBS network core is created by core nodes interconnected according to a esh or circular topology. Edge nodes are located at the periphery of the OBS network and allow interaction with local access networks, as shown in Figure. 1. IP access network IP access network Bursts creating BHPs generation Sending BHPs and bursts IP access network Edge node A Optical channel BHPs analysis IP routing Bursts all-optical switching OBS network Core nodes IP access network Virtual channel BHP is transitted ahead of burst, having enough tie to open virtual channel Burst is transitted quickly without delay in each node, catching up BHP in destination node Edge node B IP access network BHPs analysis Bursts reception Scheduling and distributing of IP packets in access network Figure 1. General architecture and data transission in sart optical burst switching network In an OBS network, data channels are separated fro signaling channels to provide target functionality. Signaling channels are used for BHP transission. Note that signaling channels are established between each pair of nodes: either between an edge node and core node or between two core nodes. The core node analyzes BHP to obtain the necessary inforation about incoing bursts. Then, the BHP processing syste in the core node provides the following operations: analyzing QoS requireents for IP packets in target bursts; providing routing to select a virtual channel for burst transission; deterining necessary path for optical switching; calculating necessary burst delay; generating and forwarding the odified BHP to the next node of the virtual channel. BHP is forwarded fro one hop to another, and in the process it provides necessary inforation to create all parts of the transparent virtual channel for successful burst transission. To avoid the overtake of BHP by an optical burst, a burst transission is scheduled after a predefined delay, which depends on BHP processing tie and the nuber of interediate nodes of a virtual channel. This tie is called the offset tie and is calculated as follows: tot nк ( tconv tdec ) tsw t 1 sw n (1) where n к is the nuber of interediate nodes in a virtual channel, t conv is the tie for BHP conversion fro optical to electrical for, t dec is the processing tie required to ake a decision about routing and switching a burst, and t sw is the tie needed to reconfigure an optical switch to create an all-optical path for incoing bursts.

4 Sart Coputing Review, vol. 5, no. 5, October Analysis of signaling protocols for OBS networks To support the effective transission of various traffic types, several signaling protocols were developed for optical burst switch networks. The ai of the signaling protocol is to keep all core nodes infored about upcoing bursts. However, there are soe liitations in signaling protocols due to QoS requireents. In ters of QoS, network traffic can be separated into two ain types: delay sensitive and loss sensitive. The forer allows soe packet loss, but requires very low latency and jitter. In contrast, the latter incurs low packet loss and requires data integrity, while delay is not very iportant. Therefore, two basic signaling approaches, JET and TAW, were developed for delay-sensitive and loss-sensitive traffic, respectively. Tell-and-Wait signaling protocol In the TAW signaling protocol, BHP is transitted through all core nodes to the destination edge node, which ensures a successful establishent of a virtual channel. Afterwards, the destination node sends acknowledgeent packets to the transitter. The burst is transitted after the edge node receives the acknowledgeent packet. This ensures a successful burst transission without channel blocking or losses. The tie delay in the burst transission for the TAW protocol is calculated as follows: TAW aggr OT _ TAW burst fiber i1 n T t t t t, (2) where t OT_TAW is the tie for BHP transission and acknowledgeent of feedback, t aggr is the tie for the aggregation burst of the input IP packets to the edge node, t burst is the tie for a burst transission, and t fiber is the tie for burst propagation in the optical fiber. TAW signaling is used for TCP datagras, which requires guaranteed delivery of e-ail, utorrent, Skype, etc. The TAW protocol diagra is shown in Figure. 2. Figure 2. Tell-and-Wait protocol diagra Theoretical acknowledgeent before burst transissions helps to avoid loss. However, it requires ore tie to create a virtual channel that ay be larger than the packets Tie to Live (TTL), especially when a virtual channel consists of any hops. In such cases, soe packets ay be lost before transission, which in turn decreases the perforance of the OBS network.

5 382 Klyash et. al: Perforance Analysis of Sart Optical Burst Switching Networks for Different Signaling Just Enough Tie signaling protocol Protocols In the JET protocol, BHP is transitted through a virtual channel to the destination node. Unlike TAW, the destination node does not send an acknowledgeent packet to the transitter. In this case, the establishent of a virtual channel is not ensured because the transitter does not have inforation about the successful transission of a BHP. A burst transission is scheduled after a pre-defined delay tie. In such cases, bursts can be lost due to blocking in the core nodes. The tie delay of burst transission for the JET protocol is calculated as follows: T t t t t JET aggr OT _ JET burst fiber i1 n, (3) where t OT_JET is the tie required for a BHP transission to reach the end node. The JET protocol is optially suited for UDP ultiedia traffic when the iniu tie delay is ore iportant than guaranteed delivery. A JET protocol diagra is shown in Figure. 2. Figure 3. JET protocol diagra Interediate Node Initiation signaling protocol Interediate Node Initiation is an alternative solution that cobines the advantages of both the TAW and JET ethods and can be adjusted for different traffic requireents. The ain feature of the INI signaling protocol lies in the selection of interediate nodes. In this case, a network is divided into two doains: fro edge node to interediate node and fro interediate node to destination node. In the first doain, signaling is provided according to the TAW protocol, where an interediate node sends an acknowledgeent packet to the transitter. In the second doain, signaling is provided according to the JET protocol. The interediate node is selected according to the criteria of blocking probability. In this case, acknowledgeent is used until the probability of blocking becoes high. Later, interediate node acknowledgeent is not used, because the blocking probability is relatively low. The INI protocol diagra is shown in Figure. 4. The blocking probability in each node depends on the nuber of neighboring nodes. To select an appropriate interediate node, a software-defined optical switching approach is used to ensure that QoS requireents will be satisfied [15]. The tie delay of the burst transission for the INI protocol is calculated as follows: INI aggr OT _ INI burst fiber i1 n T t t t t, (4) where t OT_INI is the tie of the BHP transission and feedback acknowledgeent. The INI signaling protocol is able to adapt at the given traffic requireents.

6 Sart Coputing Review, vol. 5, no. 5, October Figure 4. INI protocol diagra Analysis of burst blocking probability Let s consider the case when all core nodes are without buffers. In this case, burst losses ay occur if all optical paths are occupied by existing burst transissions. In this case, the blocking probability for each channel can be calculated as follows: n P! Pb 1, (5) n! where Р is the the probability of data transission between a pair of nodes (equal for all parts); n is the nuber of input nodes, and is the nuber of output nodes. Note that n in order to avoid blocking in the node. If wavelength converters are not used, then n is the nuber of ultiplexers and is the nuber of deultiplexers, respectively. When wavelength converters are used, n and are equal to the product of the nuber of wavelengths in the fiber, which is equal to the nuber of ultiplexers and deultiplexers, respectively. Let us suppose that n equals. In this case Equation 5 is siplified as follows: Pb 1! P, (6) In Equation 6, we can easily see that P b tends to one as increases. In this situation, buffering is necessary. When the queue is processed according to the First Input First Output (FIFO) odel, the probability of loss depends on buffer size when n=: k Pb P C ki k 1, (7) where i is the nuber of optical buffers. Considering that the probabilities of data transission between the pair of nodes are identical, we assue P=1/, and Equation 7 becoes: k 1 C ki Pb, (8) Based on Equation 8, we show the 3D-plot of the loss probability as a function of nuber of buffers and nuber of wavelength channels (Figure. 5). As shown in Figure. 5, the probability of loss decreases as the nuber of buffers increases. We have deterined that if the nuber of buffers are ore than 5, the probability of loss tends to zero regardless of. Therefore, for OBS networks it is enough to have 5 optical buffers for each core node. Each buffer is ipleented as a fiber delay line (FDL) of specific length, into which bursts are switched to achieve target delay. k

7 384 Klyash et. al: Perforance Analysis of Sart Optical Burst Switching Networks for Different Signaling Protocols (a) (b) Figure 5. 3D (a) plot of burst loss probability, which depends on the nuber of buffers and nuber of wavelengths, and (b) 2D-plot of burst loss probability, which depends on the nuber of buffers Analysis of burst tiing and loss in OBS networks The ai of a signaling protocol is to coordinate burst scheduling in each switching node. Correct scheduling ensures that all bursts, which arrive siultaneously, are properly switched to necessary paths without blocking. Wrong scheduling results lead to inevitable blocking and burst loss. Therefore, BHP always contains inforation about burst arrival tie in order to support correct scheduling in core nodes. Buffers are needed for JET and INI protocols, because in this case the correct establishent of virtual channels is not copletely ensured. Using of buffers requires liitation in the burst axial duration t burst to keep the proper tiing of buffering. The burst delay tie in the buffers is calculated as follows: buff burst between t k t t, (9) where k is the nuber of buffers the burst has to go through, and t between is the tie between two consequent bursts. The burst duration ay change dynaically, but cannot exceed the axiu duration t burst. The inter-burst tie t between is required for a switch reaction to rearrange the paths between the input and output ports, and also to avoid the influence of dispersion, nonlinear effects, and jitter. These influences can increase or decrease the duration of burst transission through fiber. Iportant conditions for switching a burst to the next buffer are: when the previous burst in buffer k outstrips the target burst tie by ore than t between, the target burst ay be switched to the buffer k; when the previous burst in buffer k outstrips the target burst tie by less than t between, the target burst ust be switched to the buffer k+1. Figure. 6 describes possible scenarios where data bursts ay be switched to the buffer or gets lost. Digits in parentheses indicate the nuber of buffers that transit the burst. When the tie delay between the data burst of the fifth buffer and data burst received by edge node is less than t between, burst loss is observed. In cases where soe bursts outstrip previous ones in an optical fiber dynaic, change of the size of the burst ay be the case where soe bursts outperfor previous ones. Consider the scenario when Burst B was switched to Buffer K. It happened because the previous Burst A transitted through Buffer K-1, is ahead less than t between. But Burst C, which coes after Burst B, ay be sent to Buffer K-1. But in this case, the tie between Bursts A and C as well as C and B ust be ore than t between. If Burst C is sall enough, then the next Burst D can be sent to Buffer K-1. And the tie between Bursts C and D, and D and V ust be ore than t between.

8 Sart Coputing Review, vol. 5, no. 5, October When scheduling bursts of different priorities, bursts of saller priority are switched to a buffer with a longer duration, which allows a quicker transission for bursts of higher priority. In this case, the aount of losses related to bursts with saller priorities increases. Since these bursts should be delivered without loss, for the last buffer we suggest additional optoelectronic regenerators. Figure 6. Burst tiing and loss in OBS network with 5 buffers Conclusion This article presents a perforance analysis of different signaling protocols, which are used in optical burst switched networks. Three signaling protocols were studied for different traffic requireents. The TAW protocol provides guaranteed establishent of the virtual channel that is optial for loss-sensitive data flows and for which data integrity is vital. The JET signaling protocol provides quick yet not guaranteed virtual channel establishent that is optial for data flows that are highly sensitive to latency and jitter. The alternative solution is the INI signaling protocol, which cobines both approaches and can be adjusted either to the TAW or to JET protocols. To assess the perforance of an optical burst switch network, we analyze the blocking probability in the core nodes for different nubers of wavelengths and optical buffers. The nuber of optial buffers and scheduling conditions for each burst were deterined. We also analyze and take into account the proble of bursts outstripping to deterine a proper buffering policy for each burst. For the latter, we consider burst priorities and tie delay between consistent bursts. References [1] M. Jo, T. Maksyyuk, B. Strykhalyuk, C. Cho, Device-to-Device Based Heterogeneous Radio Access Network Architecture for Mobile Cloud Coputing, IEEE Wireless Counications, vol. 12, no. 3, pp , Jun Article (CrossRef Link) [2] M. Jo, T. Maksyyuk, R. L. Batista, T. F. Maciel, A. L.F. de Aleida,, M. Klyash, A Survey of Converging Solutions for Heterogeneous Mobile Networks, IEEE Wireless Counications, vol. 21, no. 8, pp , Dec

9 386 Klyash et. al: Perforance Analysis of Sart Optical Burst Switching Networks for Different Signaling Protocols [3] D.M. Maro, M. Blau, Switching solutions for WDM-SDM optical networks, IEEE Counications, vol. 53, no. 2, pp , Feb Article (CrossRef Link) [4] L. Xu, H.G. Perros, G. Rouskas, Techniques for optical packet switching and optical burst switching, IEEE Counications Magazine, vol. 39, no. 1, pp , Article (CrossRef Link) [5] S. Dixit. IP over WDM: building the next-generation optical internet, John Wiley & Sons, [6] Y. Chen, C. Qiao, X. Yu, Optical burst switching: a new area in optical networking research, IEEE Network, vol. 18, no. 3, pp , Article (CrossRef Link) [7] D. Klonidis, F. Cugini, O. Gerstel, M. Jinno, V. Lopez, E. Palkopoulou, M. Sekiya, D. Siracusa, G. Thouenon, C. Betoule, Spectrally and spatially flexible optical network planning and operations, IEEE Counications Magazine, vol. 53, no. 2, pp , Feb Article (CrossRef Link) [8] S. Duych, P. Guskov, T. Maksyyuk, M. Klyash, Siulation of characteristics of optical burst switched networks, In Proc. IEEE International Conference on Microwave & Telecounication technology (CriMiCo 2013), pp , Sep [9] K. Dolzer, C. Gauger, On burst assebly in optical burst switching networks a perforance evaluation of Just- Enough-Tie, In Proceedings of ITC 18, pp , Sep Article (CrossRef Link) [10] S. Duych, T. Maksyyuk, P. Guskov, Siulation of Burst Aggregation and Signaling schees for Optical Burst Switched Networks, Int. Conf. Coputer Science and Engineering, Lviv Polytechnic National Univ., Ukraine, pp.40-41, Nov [11] V. M. Vokkarane, J. P. Jue, Prioritized burst segentation and coposite burst-assebly techniques for QoS support in optical burst-switched networks, IEEE Journal on Selected Areas in Counications, vol. 21, no. 7, pp , Article (CrossRef Link) [12] T. Maksyyuk, S. Duych, O. Krasko, M. Kaidan, B. Strykhalyuk, Study and Developent of Next-Generation Optical Networks, Sart Coputing Review, vol. 4, no. 6, pp , Dec Article (CrossRef Link) [13] S. Duych, T. Maksyyuk, O. Krasko, P. Guskov, The Virtual Channel Paraeters Calculation in All-Optical Network. In Proc. IEEE International Conference on The Experience of Designing and Application of CAD Systes in Microelectronics, (CADSM 2013), pp. 88, Feb [14] K. Lu, J. P. Jue, G. Xiao, I. Chlatac, T. Ozugur, Interediate-Node Initiated Reservation (IIR): A New Signaling Schee for Wavelength-Routed Networks, IEEE Journal on Selected Areas in Counications, vol.21, no. 8, pp , Oct [15] T. Maksyyuk, S. Duych, O. Krasko, M. Jo, Software defined optical switching for cloud coputing transport systes, ACM International Conference on Ubiquitous Inforation Manageent and Counication (IMCOM 2015), No. 46, Jan Article (CrossRef Link) Mykhailo Klyash received his DSc degree in telecounication systes and networks, Odessa National Acadey of Telecounication naed after A.S. Popov, Ukraine in 2007, and his PhD in optical data transission, location, and processing systes, Bonch-Bruevich Saint- Petersburg State University of Telecounications, Saint Petersburg, Russia, in Currently, he is Head of the Telecounication Departent at Lviv Polytechnic National University, Ukraine. His current research interests include distributed networks, cloud coputing, convergent obile networks, big data, software-defined networks, and 5G wireless networks. Mykola Kaidan received his PhD in optoelectronics fro Lviv Polytechnic National University, Ukraine in 2006, and his MS in optoelectronics fro Lviv State University naed after Ivan Franko in He is currently doing a post-doctoral study on telecounication systes and networks at Lviv Polytechnic National University, Ukraine. He is a docent with the Telecounication Departent of Lviv Polytechnic National University. His current research interests include optical networks, photonic optical fibers, non-linear fiber optic, and optical network coponents.

10 Sart Coputing Review, vol. 5, no. 5, October Stepan Duych received his BS and MS in radio physics fro Ivan Franko National University of Lviv, Ukraine, in 2004 and 2006, respectively. He is currently a senior teacher with the Telecounication departent of Lviv Polytechnic National University. His research interests include the design and synthesis of icroprocessor systes, FPGA, and optical burst switching. Copyrights 2015 KAIS

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach Int. J. Communications, Network and System Sciences, 2009, 7, 652-656 doi:10.4236/icns.2009.27074 Published Online October 2009 (http://www.scirp.org/ournal/icns/). Optical Network Traffic Control Algorithm

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Introduction to Optical Networks

Introduction to Optical Networks Yatindra Nath Singh Assistant Professor Electrical Engineering Department Indian Institute of Technology, Kanpur Email: ynsingh@ieee.org http://home.iitk.ac.in/~ynsingh 1 What are optical network? Telecomm

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information

Data Center Network Structure using Hybrid Optoelectronic Routers

Data Center Network Structure using Hybrid Optoelectronic Routers Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp

More information

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks International Journal of Coputer Applications (0975 8887) Volue 54 No.7, Septeber 2012 Perforance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks Aandeep Singh Dhaliwal

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University Optial Ties to Decrease Extraction ates During Two-Stage eediation Affected by ate-liited Transport Jose A. Saez, Loyola Maryount University Abstract Saez and Haron presented a two-stage pup and treat

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Experiment 2 Index of refraction of an unknown liquid --- Abbe Refractometer

Experiment 2 Index of refraction of an unknown liquid --- Abbe Refractometer Experient Index of refraction of an unknown liquid --- Abbe Refractoeter Principle: The value n ay be written in the for sin ( δ +θ ) n =. θ sin This relation provides us with one or the standard ethods

More information

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network and : Competing Yet Complementary Technologies for The Metro Network Introduction The next generation of equipment has been well accepted by service providers and is being usefully deployed into networks

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Option B: Credit Card Processing

Option B: Credit Card Processing Attachent B Option B: Credit Card Processing Request for Proposal Nuber 4404 Z1 Bidders are required coplete all fors provided in this attachent if bidding on Option B: Credit Card Processing. Note: If

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

TCP and UDP Performance for Internet over Optical Packet-Switched Networks

TCP and UDP Performance for Internet over Optical Packet-Switched Networks TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University

More information

Design, Manufacturing & Analysis of Differential Crown Gear and Pinion for MFWD Axle

Design, Manufacturing & Analysis of Differential Crown Gear and Pinion for MFWD Axle IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN(e) : 2278-1684, ISSN(p) : 220 4X, PP : 59-66 www.iosrjournals.org Design, Manufacturing & Analysis of Differential Crown Gear and Pinion

More information

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers Course Code: L024 LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning prograe for frontline healthcare anagers 6 days Green Belt equivalent Are you ready to challenge the status quo and transfor

More information

Nonlinear Control Design of Shunt Flexible AC Transmission System Devices for Damping Power System Oscillation

Nonlinear Control Design of Shunt Flexible AC Transmission System Devices for Damping Power System Oscillation Journal o Coputer Science 7 (6): 854-858, ISSN 549-3636 Science Publications Nonlinear Control Design o Shunt Flexible AC Transission Syste Devices or Daping Power Syste Oscillation Prechanon Kukratug

More information

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Motorcycle Accident-Prone Types at Intersections and Innovative Improvement Design Guideline

Motorcycle Accident-Prone Types at Intersections and Innovative Improvement Design Guideline Motorcycle Accident-Prone Types at Intersections and Innovative Iproveent Design Guideline Hsu,Tien-Pen a, Ku-Lin Wen b a,b Departent of Civil Engineering, National Taiwan University, Taipei, 6, Taiwan

More information

Energy Systems Modelling: Energy flow-paths

Energy Systems Modelling: Energy flow-paths Energy Systes Modelling: Energy flow-paths Coputer tools for energy systes design have traditionally been constructed by reducing the coplexity of the underlying syste equations in an attept to lessen

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013 Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information