Background & Motivation. Layering as Optimization Decomposition: A Mathematical Theory of Network Architectures. Layered Architecture

Size: px
Start display at page:

Download "Background & Motivation. Layering as Optimization Decomposition: A Mathematical Theory of Network Architectures. Layered Architecture"

Transcription

1 Background & Motivation Layering as Optimization Decomposition: A Mathematica Theory o Network Architectures Network Architecture? Convex Optimization max U(x) Ax C x 0 Francesco Lo Presti Universita di Roma Tor Vergata opresti@ino.uniroma2.it U(x) concave unction x, C vectors A matrix 1 2 Layered Architecture Layered Architecture Communication system as composed o ordered set o ayers Each ayer provides a service (to the ayer above) Service: set o unctions oered to the service users Error Contro, Fow Contro reying on services provided by ayer beow via its own interna-ayer actions Each ayer provides a vaue added (communication) service with respect to the (communication) service provided by the ayer beow appication transport appication transport TCP/P Architecture Layer 4, Tranport: Congestion Contro end-to-end Layer 3, Network: Routing Layer 2, Data Link, MAC: Media Access Layer 1, Physica: Coding 3 4

2 Layered Architecture Key Observation [Key98] Probem Today Protocos mosty based on engineering intuitions and ad-hoc heuristics TCP Congestion Contro and its additive increase and mutipicative decrease MAC Layer Coision Detection and Binary Backo Agoritms Exceptions Coding: Maximize Data Rate subject to error probabiity constraints Routing: Minimum Path Cost Routing How we do they work as a whoe? 5 Reverse Engineering o Protocos Behaviour TCP and its variants sove in a distributed way a Network Utiity Maximization Probem (convex) Contention based MAC as a game theoretic seish utiity maximization 6 Forward Engineering 1. Reverse Engineering discovers the underying mathematica probems soved by protocos 2. Forward Engineering based on insights obtained rom 1 above then systematicay improves the protocos Wireess Protocos ssues Wireess s chaenges MAC ag, routing, mobiity, power contro, cong. contro, etc. Cross-Layer Design/Optimization Do away with the strict ayers separation in the protoco stack design Take advantage o (possiby strict) coordination among dierent ayers We consider the congestion contro probem as a joint optimization with routing and MAC Formuated as a utiity based optimization probem 7 8

3 Outine o the Tak Mode Mode Probem Formuation Convex Optimization Probem with inear constraints Probem Soution Via Dua Decomposition and (sub)-gradient agorithm Distributed Agorithm or Congestion Contro, Routing and MAC Numerica Exampes Concusions 9 Static Muti-Hop Wireess Network Transmission range R Logica channe capacity C Link (i,j) ii distance(i,j) R Direct Graph G=(N,E) (i,j) E (j,i) E 10 Mode Mode Links contention Transmission over dierent inks may interere Link contention graph to describe ink intererence Nodes represent inks Edge between nodes when inks interere Contention Graph: Exampe Two inks interere when either ends o one o the two inks as within carrier sense range o the other CSMA/CA-ike contention with RTS/CTS mechanism Assume Carrier sense range~transmission range 11 12

4 Mode Mode Links contention Ony inks orming an independent set in the contention graph can transmit at the same time without causing intererence Transmission Schedue Sequence o independent set 1,2,3,,n, Contention imits the average ink rate c c= C a =C ar : a raction o time independent set appears in the transmission schedue r independent set characteristic vector r=1 i, otherwise r=0 13 Traic: Set o ows F Fow F Source, destination x ow rate y ow rate aong ink Utiity unction U(x) ncreasing Concave Continuousy Dierentiabe e.g.,u(x)=og x 14 Probem Formuation Probem Formuation: Constraints Maximize aggregate utiity Given the constraints max U(x)= U(x) 1. Fow conservation constraints 2. Link capacity constraints 3. Links contention constraints 1. Fow Conservation Constraints For each ow, traic which enters a node n, must eave it 1. n source, destination y= y n enters node n eaves node n n 15 16

5 Probem Formuation: Constraints Probem Formuation: Constraints 1. Fow Conservation Constraints For each ow, traic which enter a node n, must eave it 2. n source node x= y eaves node n n 1. Fow Conservation Constraints For each ow, traic which enter a node n, must eave it 3. n destination node enters node n y = x n Probem Formuation: Constraints Probem Formuation: Constraints 2. Link capacity constraints For each ink, ows traversing it must not exceed its average transmission rate c 3. Links contention constraints Ony inks orming an independent set in the contention graph can transmit at the same time Contention imits the achievabe ink rate c y c c= C ar,, a=1, a

6 Probem Formuation Dua Approach max U(x)= U(x) Consider the dua probem min D(p) subject to p 0 y= y, y 0 n y c c= C ar,, a=1, a 0 21 D(p) (partia) dua unction p=(p) L vector o Lagrangian Mutipiers (ink prices) Reax the ink capacity constraints Sove the dua Strong Duaity hods: the soution o the dua yieds a soution o the prima t is (reativey) easy to compute in a distributed way - D(p) 22 and its derivatives Dua Approach Probem Formuation Separabe wrt x Soution via (Sub)-Gradient agorithm D(p) is a convex (non-dierentiabe) unction 1. Choose initia soution p(0) 2. terate p(k+1)=p(k)+γ [ D(p(k)) ] + p A ows rates y aong ink + c max U(x)= U(x) Fow rate variabes x y 3. Unti convergence criteria are satisied Computation can be distributed among nodes. ts impementation deines the congestion contro, the routing and the MAC contro agorithms 23 y= y, y 0 n y c c= C ar,, a=1, a 0 Link rates c 24

7 Dua Function: Lagrangian Lagrangian Lagrangian Mutipiers Dua Function D(p) L(x,y,c,a,p)= U(x) - p( y-c) y= y, y 0 n y c c=c ar,, a=1, a 0 one mut. per ink p as ink price 25 D(p)=max L(x,y,c,a,p)= x,y,c,a =max U(x) - p( y-c) x,y,c,a y= y, y 0 n c= C ar,, a=1, a 0 x(p),y(p),c(p)=argmax L(x,y,c,a,p) D(p)= U(x(p))- p( y(p)-c(p)) x,y,c,a 26 Dua Probem Dua Probem Decomposition min D(p)=ΣU(x(p))-Σp(Σy(p)-c(p)) p 0 We sove via the (sub)-gradient ag. Compute Communicate Comm. new prices x,y,c new x,y,c p(k+1) Sub gradient update Compute p(k+1) [ ] + p(k+1)=p(k)-γ D(p(k)) p Compute x1(p),y1(p) Compute xn(p),yn(p) Compute c(p) 27 28

8 Network mpementation Network mpementation Compute Communicate Comm. new prices x,y,c new x,y,c p(k+1) Network Update inks price p(k+1) teration 1. Compute x, y, c 1. Sources adjust their rate to paths price (queueing deay) 2. Source seect the cheapest path or routing traic 3. MAC ayer schedue transmission aong competing inks Fow comp. x1(p),y1(p) Fow comp. xn(p),yn(p) MAC ayer Compute c(p) Communicate x, y, c 1. Sources, Routing and MAC behave according to 1 above 3. Compute p(k+1) 1. Link queues enght changes as consequence o the new traic rate/routes 4. Communicate p(k+1) 1. Sources measures the new path prices deays 30 Dua Function D(p) Dua Function D(p) D(p)=max L(x,y,c,a,p)= x,y,c,a =max (U(x) - py)+ pc x,y,c,a Fow rate variabes x y Link rates c y= y, y 0 n c= C ar,, a=1, a 0 31 D(p)=max L(x,y,c,a,p)= x,y,c,a = D(p) + DMAC(p) Fow probem D(p)=max U(x) - py x y y= y, y 0 n MAC probem DMAC(p)=max pc c a c= C ar,, a=1, a 0 32

9 Fow Probem max U(x) - py y= y, y 0 n Fow Net Utiity Net utiity maximized when traic is sent aong minimum cost paths pπ minimum cost x(p)=argmax U(x) -pπx=u -1 (pπ) x Y(p) are set accordingy 33 MAC Probem max pc c= C ar,, a=1, a 0 Convex hu o independent sets characteristic vectors soution is the independent set o maxima price c(p)=c i o maxima price; otherwise c(p)=0 34 (Sub)-Gradient Agorithm (Sub)-Gradient Agorithm mpementation terate p(k+1)=p(k)-γ D(p(k)) p [ ] + D(p)= U(x(p))- p( y(p)-c(p)) D(p) p =- y(p)-c(p)=queue i rate [ ] + p(k+1)= p(k)+γ( y(p(k))-c(p(k))) proportiona to ink queue enght 35 Sotted time Sot duration mutipe o packet transmission time Sot k: Given p(k) Fow sets its rate to x(p(k)), F Routing agorithm adjusts routes according to y(p(k)) Link adjust its transmission rate according to c(p(k)) Link updates its price according to p(k+1)= p(k)+γ( y(p(k))-c(p(k))) [ ] + [ ] + p(k+1)= p(k)+ γ(traic rate traversing -ink transmission rate) p measures ink congestion p ~ ink queue ength Network converges to (socia) optima operating point 36

10 MAC agorithm Routing Agorithm Compute Link Transmission Rate during sot k ndependent set price: p= p Schedue or transmission inks which beong to the independent set o maxima price c=c i o maxima price; otherwise c=0 No exact distributed agorithm exists or genera graph Distributed agorithm exists or perect graphs Requires knowedge o nodes within 2-hops Becomes an approximation or genera graphs More Research is needed Traic is routed aong minimum cost paths!!! Link price p as the ink metric Mutipe paths can be determined by means o a suitabe mutipe path routing protocos Congestion Contro Agorithm To Summarize Fow adjusts its rate according to the end-to-end path price minimum cost path π=1,2,n End-to-end path price pπ=σpj x=u -1 (pπ) og utiity -> x=1/pπ Path prices proportiona to end-to-end deay 39 Price p associated to ink Evoves according to aw o suppy and demand ncreases when traic exceeds ink rate, decrease otherwise Measures ink congestion MAC ayer: schedue the (non interering) inks with maxima aggregate price Routing: minimum cost path routing with ink price as metric Congestion Contro: Sources adjust rates according to end-to-end price (congestion) Price Rate Price Rate 40

11 Exampe 6 nodes CSMA/CA-ike contention ony (1,2) and (5,6) can transmit at the same time C=10Mbps 1 ow: 1->6, og utiity Source Rate over Time Topoogy Average Link Rate Exampe MAC agorithm Link Scheduing Topoogy C/ Concusions Layers as Optimization Decomposition Mode or joint congestion contro, routing and MAC or ad hoc wireess s Utiity maximization probem with routing and ink access constraints Soution via dua decomposition which transates into a distributed cross-ayer scheme Much work yet to be done to make this practica!! 43

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013 500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks

Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of

More information

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1 A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,

More information

WIRELESS Mesh Networks (WMNs) have recently attracted

WIRELESS Mesh Networks (WMNs) have recently attracted 3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

Celerity: A Low-Delay Multi-Party Conferencing Solution

Celerity: A Low-Delay Multi-Party Conferencing Solution Ceerity: A Low-Deay Muti-Party Conferencing Soution Xiangwen Chen Dept. of Information Engineering The Chinese University of Hong Kong Yao Zhao Acate-Lucent Minghua Chen Dept. of Information Engineering

More information

On Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks

On Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks On Distributed omputation ate Optimization for Depoying oud omputing Programming Framewors Jia Liu athy H. Xia Ness B. Shroff Xiaodong Zhang Dept. of Eectrica and omputer Engineering Dept. of Integrated

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE Advances in Eectrica and Eectronic Engineering 98 PROPAGATION OF SRGE WAVES ON NON-HOMOGENEOS TRANSMISSION LINES INDCED BY LIGHTNING STROKE Z. Benešová, V. Kotan WB Pisen, Facuty of Eectrica Engineering,

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Optimization models for congestion control with multipath routing in TCP/IP networks

Optimization models for congestion control with multipath routing in TCP/IP networks Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,

More information

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web 4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open

More information

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks Horizon: Balancing TCP over multiple paths in wireless mesh networks Bozidar Radunovic, Christos Gkantsidis, Dinan Gunawardena, Peter Key Microsoft Research Cambridge, UK Wireless Mesh Networks Goals 1.

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science

More information

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

A Separation Principle for Optimal IaaS Cloud Computing Distribution

A Separation Principle for Optimal IaaS Cloud Computing Distribution A Separation Principle for Optimal IaaS Cloud Computing Distribution Felix Kottmann, Saverio Bolognani, Florian Dörfler Automatic Control Laboratory, ETH Zürich Zürich, Switzerland Email: {felixk, bsaverio,

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Week 3: Consumer and Firm Behaviour: The Work-Leisure Decision and Profit Maximization

Week 3: Consumer and Firm Behaviour: The Work-Leisure Decision and Profit Maximization AROEOOIS 2006 Week 3: onsumer and Firm Behaviour: The Work-Leisure Decision and Profit aximization Questions for Review 1. How are a consumer s preferences over goods represented? By utiity functions:

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

On Capacity Scaling in Arbitrary Wireless Networks

On Capacity Scaling in Arbitrary Wireless Networks On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

European Journal of Operational Research

European Journal of Operational Research European Journa of Operationa Research 198 (2009) 435 446 Contents ists avaiabe at ScienceDirect European Journa of Operationa Research journa homepage: www.esevier.com/ocate/ejor Production, Manufacturing

More information

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any

More information

Journal of Economic Behavior & Organization

Journal of Economic Behavior & Organization Journa of Economic Behavior & Organization 85 (23 79 96 Contents ists avaiabe at SciVerse ScienceDirect Journa of Economic Behavior & Organization j ourna ho me pag e: www.esevier.com/ocate/j ebo Heath

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015 Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

SAT Math Facts & Formulas

SAT Math Facts & Formulas Numbers, Sequences, Factors SAT Mat Facts & Formuas Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reas: integers pus fractions, decimas, and irrationas ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences:

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Modelling Quality of Service in IEEE 802.16 Networks

Modelling Quality of Service in IEEE 802.16 Networks 1 Modelling Quality of Service in IEEE 802.16 Networks Giuseppe Iazeolla1, Pieter Kritzinger2 and Paolo Pileggi2 1 Software Engineering and System Performance Modelling Group University of Roma Tor Vergata,

More information

Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution.

Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution. Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600 The inteigent business soution. Hybrid IP-PBX KX-TDA Teecommunication Patform: Investment in a teecommunication system requires business communication

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Capacity Planning of Survivable MPLS Networks Supporting DiffServ

Capacity Planning of Survivable MPLS Networks Supporting DiffServ Capacity Panning of Survivabe MPLS Networks Supporting DiffServ Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University kwu@unity.ncsu.edu,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

Risk Assessment Methods and Application in the Construction Projects

Risk Assessment Methods and Application in the Construction Projects Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

We focus on systems composed of entities operating with autonomous control, such

We focus on systems composed of entities operating with autonomous control, such Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,

More information

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity

More information

Features and benefits

Features and benefits Showermate provides a range of high quaity, high performing, pastic shower pumps. Designed to boost the performance of shower and tap outets within a bathroom. The range is suitabe for positive and negative

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Optimization Modeling for Mining Engineers

Optimization Modeling for Mining Engineers Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay

Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay Controlling the Internet in the era of Software Defined and Virtualized Networks Fernando Paganini Universidad ORT Uruguay CDS@20, Caltech 2014 Motivation 1. The Internet grew in its first 30 years with

More information

Creat-Poreen Power Electronics Co., Ltd

Creat-Poreen Power Electronics Co., Ltd (STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:

More information

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics

More information

HomeRF: Bringing Wireless Connectivity Home

HomeRF: Bringing Wireless Connectivity Home HomeRF: Bringing Wireess Connectivity Home Jim Lansford Wireess Systems Architect Inte Corporation Technica Committee Chair Home RF Working Group March 9, 1999 1 Inte s Where does wireess fit? Part of

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information