Background & Motivation. Layering as Optimization Decomposition: A Mathematical Theory of Network Architectures. Layered Architecture
|
|
- Dale Dawson
- 7 years ago
- Views:
Transcription
1 Background & Motivation Layering as Optimization Decomposition: A Mathematica Theory o Network Architectures Network Architecture? Convex Optimization max U(x) Ax C x 0 Francesco Lo Presti Universita di Roma Tor Vergata opresti@ino.uniroma2.it U(x) concave unction x, C vectors A matrix 1 2 Layered Architecture Layered Architecture Communication system as composed o ordered set o ayers Each ayer provides a service (to the ayer above) Service: set o unctions oered to the service users Error Contro, Fow Contro reying on services provided by ayer beow via its own interna-ayer actions Each ayer provides a vaue added (communication) service with respect to the (communication) service provided by the ayer beow appication transport appication transport TCP/P Architecture Layer 4, Tranport: Congestion Contro end-to-end Layer 3, Network: Routing Layer 2, Data Link, MAC: Media Access Layer 1, Physica: Coding 3 4
2 Layered Architecture Key Observation [Key98] Probem Today Protocos mosty based on engineering intuitions and ad-hoc heuristics TCP Congestion Contro and its additive increase and mutipicative decrease MAC Layer Coision Detection and Binary Backo Agoritms Exceptions Coding: Maximize Data Rate subject to error probabiity constraints Routing: Minimum Path Cost Routing How we do they work as a whoe? 5 Reverse Engineering o Protocos Behaviour TCP and its variants sove in a distributed way a Network Utiity Maximization Probem (convex) Contention based MAC as a game theoretic seish utiity maximization 6 Forward Engineering 1. Reverse Engineering discovers the underying mathematica probems soved by protocos 2. Forward Engineering based on insights obtained rom 1 above then systematicay improves the protocos Wireess Protocos ssues Wireess s chaenges MAC ag, routing, mobiity, power contro, cong. contro, etc. Cross-Layer Design/Optimization Do away with the strict ayers separation in the protoco stack design Take advantage o (possiby strict) coordination among dierent ayers We consider the congestion contro probem as a joint optimization with routing and MAC Formuated as a utiity based optimization probem 7 8
3 Outine o the Tak Mode Mode Probem Formuation Convex Optimization Probem with inear constraints Probem Soution Via Dua Decomposition and (sub)-gradient agorithm Distributed Agorithm or Congestion Contro, Routing and MAC Numerica Exampes Concusions 9 Static Muti-Hop Wireess Network Transmission range R Logica channe capacity C Link (i,j) ii distance(i,j) R Direct Graph G=(N,E) (i,j) E (j,i) E 10 Mode Mode Links contention Transmission over dierent inks may interere Link contention graph to describe ink intererence Nodes represent inks Edge between nodes when inks interere Contention Graph: Exampe Two inks interere when either ends o one o the two inks as within carrier sense range o the other CSMA/CA-ike contention with RTS/CTS mechanism Assume Carrier sense range~transmission range 11 12
4 Mode Mode Links contention Ony inks orming an independent set in the contention graph can transmit at the same time without causing intererence Transmission Schedue Sequence o independent set 1,2,3,,n, Contention imits the average ink rate c c= C a =C ar : a raction o time independent set appears in the transmission schedue r independent set characteristic vector r=1 i, otherwise r=0 13 Traic: Set o ows F Fow F Source, destination x ow rate y ow rate aong ink Utiity unction U(x) ncreasing Concave Continuousy Dierentiabe e.g.,u(x)=og x 14 Probem Formuation Probem Formuation: Constraints Maximize aggregate utiity Given the constraints max U(x)= U(x) 1. Fow conservation constraints 2. Link capacity constraints 3. Links contention constraints 1. Fow Conservation Constraints For each ow, traic which enters a node n, must eave it 1. n source, destination y= y n enters node n eaves node n n 15 16
5 Probem Formuation: Constraints Probem Formuation: Constraints 1. Fow Conservation Constraints For each ow, traic which enter a node n, must eave it 2. n source node x= y eaves node n n 1. Fow Conservation Constraints For each ow, traic which enter a node n, must eave it 3. n destination node enters node n y = x n Probem Formuation: Constraints Probem Formuation: Constraints 2. Link capacity constraints For each ink, ows traversing it must not exceed its average transmission rate c 3. Links contention constraints Ony inks orming an independent set in the contention graph can transmit at the same time Contention imits the achievabe ink rate c y c c= C ar,, a=1, a
6 Probem Formuation Dua Approach max U(x)= U(x) Consider the dua probem min D(p) subject to p 0 y= y, y 0 n y c c= C ar,, a=1, a 0 21 D(p) (partia) dua unction p=(p) L vector o Lagrangian Mutipiers (ink prices) Reax the ink capacity constraints Sove the dua Strong Duaity hods: the soution o the dua yieds a soution o the prima t is (reativey) easy to compute in a distributed way - D(p) 22 and its derivatives Dua Approach Probem Formuation Separabe wrt x Soution via (Sub)-Gradient agorithm D(p) is a convex (non-dierentiabe) unction 1. Choose initia soution p(0) 2. terate p(k+1)=p(k)+γ [ D(p(k)) ] + p A ows rates y aong ink + c max U(x)= U(x) Fow rate variabes x y 3. Unti convergence criteria are satisied Computation can be distributed among nodes. ts impementation deines the congestion contro, the routing and the MAC contro agorithms 23 y= y, y 0 n y c c= C ar,, a=1, a 0 Link rates c 24
7 Dua Function: Lagrangian Lagrangian Lagrangian Mutipiers Dua Function D(p) L(x,y,c,a,p)= U(x) - p( y-c) y= y, y 0 n y c c=c ar,, a=1, a 0 one mut. per ink p as ink price 25 D(p)=max L(x,y,c,a,p)= x,y,c,a =max U(x) - p( y-c) x,y,c,a y= y, y 0 n c= C ar,, a=1, a 0 x(p),y(p),c(p)=argmax L(x,y,c,a,p) D(p)= U(x(p))- p( y(p)-c(p)) x,y,c,a 26 Dua Probem Dua Probem Decomposition min D(p)=ΣU(x(p))-Σp(Σy(p)-c(p)) p 0 We sove via the (sub)-gradient ag. Compute Communicate Comm. new prices x,y,c new x,y,c p(k+1) Sub gradient update Compute p(k+1) [ ] + p(k+1)=p(k)-γ D(p(k)) p Compute x1(p),y1(p) Compute xn(p),yn(p) Compute c(p) 27 28
8 Network mpementation Network mpementation Compute Communicate Comm. new prices x,y,c new x,y,c p(k+1) Network Update inks price p(k+1) teration 1. Compute x, y, c 1. Sources adjust their rate to paths price (queueing deay) 2. Source seect the cheapest path or routing traic 3. MAC ayer schedue transmission aong competing inks Fow comp. x1(p),y1(p) Fow comp. xn(p),yn(p) MAC ayer Compute c(p) Communicate x, y, c 1. Sources, Routing and MAC behave according to 1 above 3. Compute p(k+1) 1. Link queues enght changes as consequence o the new traic rate/routes 4. Communicate p(k+1) 1. Sources measures the new path prices deays 30 Dua Function D(p) Dua Function D(p) D(p)=max L(x,y,c,a,p)= x,y,c,a =max (U(x) - py)+ pc x,y,c,a Fow rate variabes x y Link rates c y= y, y 0 n c= C ar,, a=1, a 0 31 D(p)=max L(x,y,c,a,p)= x,y,c,a = D(p) + DMAC(p) Fow probem D(p)=max U(x) - py x y y= y, y 0 n MAC probem DMAC(p)=max pc c a c= C ar,, a=1, a 0 32
9 Fow Probem max U(x) - py y= y, y 0 n Fow Net Utiity Net utiity maximized when traic is sent aong minimum cost paths pπ minimum cost x(p)=argmax U(x) -pπx=u -1 (pπ) x Y(p) are set accordingy 33 MAC Probem max pc c= C ar,, a=1, a 0 Convex hu o independent sets characteristic vectors soution is the independent set o maxima price c(p)=c i o maxima price; otherwise c(p)=0 34 (Sub)-Gradient Agorithm (Sub)-Gradient Agorithm mpementation terate p(k+1)=p(k)-γ D(p(k)) p [ ] + D(p)= U(x(p))- p( y(p)-c(p)) D(p) p =- y(p)-c(p)=queue i rate [ ] + p(k+1)= p(k)+γ( y(p(k))-c(p(k))) proportiona to ink queue enght 35 Sotted time Sot duration mutipe o packet transmission time Sot k: Given p(k) Fow sets its rate to x(p(k)), F Routing agorithm adjusts routes according to y(p(k)) Link adjust its transmission rate according to c(p(k)) Link updates its price according to p(k+1)= p(k)+γ( y(p(k))-c(p(k))) [ ] + [ ] + p(k+1)= p(k)+ γ(traic rate traversing -ink transmission rate) p measures ink congestion p ~ ink queue ength Network converges to (socia) optima operating point 36
10 MAC agorithm Routing Agorithm Compute Link Transmission Rate during sot k ndependent set price: p= p Schedue or transmission inks which beong to the independent set o maxima price c=c i o maxima price; otherwise c=0 No exact distributed agorithm exists or genera graph Distributed agorithm exists or perect graphs Requires knowedge o nodes within 2-hops Becomes an approximation or genera graphs More Research is needed Traic is routed aong minimum cost paths!!! Link price p as the ink metric Mutipe paths can be determined by means o a suitabe mutipe path routing protocos Congestion Contro Agorithm To Summarize Fow adjusts its rate according to the end-to-end path price minimum cost path π=1,2,n End-to-end path price pπ=σpj x=u -1 (pπ) og utiity -> x=1/pπ Path prices proportiona to end-to-end deay 39 Price p associated to ink Evoves according to aw o suppy and demand ncreases when traic exceeds ink rate, decrease otherwise Measures ink congestion MAC ayer: schedue the (non interering) inks with maxima aggregate price Routing: minimum cost path routing with ink price as metric Congestion Contro: Sources adjust rates according to end-to-end price (congestion) Price Rate Price Rate 40
11 Exampe 6 nodes CSMA/CA-ike contention ony (1,2) and (5,6) can transmit at the same time C=10Mbps 1 ow: 1->6, og utiity Source Rate over Time Topoogy Average Link Rate Exampe MAC agorithm Link Scheduing Topoogy C/ Concusions Layers as Optimization Decomposition Mode or joint congestion contro, routing and MAC or ad hoc wireess s Utiity maximization probem with routing and ink access constraints Soution via dua decomposition which transates into a distributed cross-ayer scheme Much work yet to be done to make this practica!! 43
Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks
Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,
More informationPricing Internet Services With Multiple Providers
Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More information500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013
500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationScheduling in Multi-Channel Wireless Networks
Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona
More informationCooperative Content Distribution and Traffic Engineering in an ISP Network
Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering
More informationIterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks
terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of
More informationA Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1
A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,
More informationWIRELESS Mesh Networks (WMNs) have recently attracted
3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationPricing and Revenue Sharing Strategies for Internet Service Providers
Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu
More informationAn Idiot s guide to Support vector machines (SVMs)
An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning
More informationCelerity: A Low-Delay Multi-Party Conferencing Solution
Ceerity: A Low-Deay Muti-Party Conferencing Soution Xiangwen Chen Dept. of Information Engineering The Chinese University of Hong Kong Yao Zhao Acate-Lucent Minghua Chen Dept. of Information Engineering
More informationOn Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks
On Distributed omputation ate Optimization for Depoying oud omputing Programming Framewors Jia Liu athy H. Xia Ness B. Shroff Xiaodong Zhang Dept. of Eectrica and omputer Engineering Dept. of Integrated
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationAn FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332
More informationPROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE
Advances in Eectrica and Eectronic Engineering 98 PROPAGATION OF SRGE WAVES ON NON-HOMOGENEOS TRANSMISSION LINES INDCED BY LIGHTNING STROKE Z. Benešová, V. Kotan WB Pisen, Facuty of Eectrica Engineering,
More informationGREEN: An Active Queue Management Algorithm for a Self Managed Internet
: An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationAn Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
More informationOptimization models for congestion control with multipath routing in TCP/IP networks
Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,
More informationModeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web
4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open
More informationHorizon: Balancing TCP over multiple paths in wireless mesh networks
Horizon: Balancing TCP over multiple paths in wireless mesh networks Bozidar Radunovic, Christos Gkantsidis, Dinan Gunawardena, Peter Key Microsoft Research Cambridge, UK Wireless Mesh Networks Goals 1.
More informationSNMP Reference Guide for Avaya Communication Manager
SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this
More informationMinimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games
Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS
More informationOptimization of Communication Systems Lecture 6: Internet TCP Congestion Control
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP
More informationLink Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes
Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science
More informationA Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks
A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationWide-Area Traffic Management for. Cloud Services
Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance
More informationA Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
More informationTCP/IP Gateways and Firewalls
Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and
More informationA Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
More informationCERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society
CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision
More informationMinimizing the Total Weighted Completion Time of Coflows in Datacenter Networks
Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications
More informationMapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis
Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa
More informationEfficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
More informationTelephony Trainers with Discovery Software
Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System
More informationA Separation Principle for Optimal IaaS Cloud Computing Distribution
A Separation Principle for Optimal IaaS Cloud Computing Distribution Felix Kottmann, Saverio Bolognani, Florian Dörfler Automatic Control Laboratory, ETH Zürich Zürich, Switzerland Email: {felixk, bsaverio,
More informationWINMAG Graphics Management System
SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationA New Statistical Approach to Network Anomaly Detection
A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit
More informationOn the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
More informationWeek 3: Consumer and Firm Behaviour: The Work-Leisure Decision and Profit Maximization
AROEOOIS 2006 Week 3: onsumer and Firm Behaviour: The Work-Leisure Decision and Profit aximization Questions for Review 1. How are a consumer s preferences over goods represented? By utiity functions:
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationOn Capacity Scaling in Arbitrary Wireless Networks
On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationPART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
More informationEuropean Journal of Operational Research
European Journa of Operationa Research 198 (2009) 435 446 Contents ists avaiabe at ScienceDirect European Journa of Operationa Research journa homepage: www.esevier.com/ocate/ejor Production, Manufacturing
More informationA MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks
A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any
More informationJournal of Economic Behavior & Organization
Journa of Economic Behavior & Organization 85 (23 79 96 Contents ists avaiabe at SciVerse ScienceDirect Journa of Economic Behavior & Organization j ourna ho me pag e: www.esevier.com/ocate/j ebo Heath
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationBetting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing
More informationCapacity planning and.
Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have
More informationA train dispatching model based on fuzzy passenger demand forecasting during holidays
Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand
More informationarxiv:1506.05851v1 [cs.ai] 18 Jun 2015
Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationSAT Math Facts & Formulas
Numbers, Sequences, Factors SAT Mat Facts & Formuas Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reas: integers pus fractions, decimas, and irrationas ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences:
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More informationModelling Quality of Service in IEEE 802.16 Networks
1 Modelling Quality of Service in IEEE 802.16 Networks Giuseppe Iazeolla1, Pieter Kritzinger2 and Paolo Pileggi2 1 Software Engineering and System Performance Modelling Group University of Roma Tor Vergata,
More informationHybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution.
Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600 The inteigent business soution. Hybrid IP-PBX KX-TDA Teecommunication Patform: Investment in a teecommunication system requires business communication
More information2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationCapacity Planning of Survivable MPLS Networks Supporting DiffServ
Capacity Panning of Survivabe MPLS Networks Supporting DiffServ Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University kwu@unity.ncsu.edu,
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationSELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationA Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities
A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,
More informationSeamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
More informationMarket Design & Analysis for a P2P Backup System
Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationApplication-Aware Data Collection in Wireless Sensor Networks
Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationA Latent Variable Pairwise Classification Model of a Clustering Ensemble
A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.
More informationRisk Assessment Methods and Application in the Construction Projects
Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,
More informationManagement of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationWe focus on systems composed of entities operating with autonomous control, such
Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,
More informationCI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass
CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity
More informationFeatures and benefits
Showermate provides a range of high quaity, high performing, pastic shower pumps. Designed to boost the performance of shower and tap outets within a bathroom. The range is suitabe for positive and negative
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationConference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers
econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationIT Governance Principles & Key Metrics
IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationAdaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks
Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationAnswers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
More informationOptimization Modeling for Mining Engineers
Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationControlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay
Controlling the Internet in the era of Software Defined and Virtualized Networks Fernando Paganini Universidad ORT Uruguay CDS@20, Caltech 2014 Motivation 1. The Internet grew in its first 30 years with
More informationCreat-Poreen Power Electronics Co., Ltd
(STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:
More informationOnline Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations
Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics
More informationHomeRF: Bringing Wireless Connectivity Home
HomeRF: Bringing Wireess Connectivity Home Jim Lansford Wireess Systems Architect Inte Corporation Technica Committee Chair Home RF Working Group March 9, 1999 1 Inte s Where does wireess fit? Part of
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More information