Input Queued Switches: Cell Switching vs. Packet Switching

Size: px
Start display at page:

Download "Input Queued Switches: Cell Switching vs. Packet Switching"

Transcription

1 Input Queued Switches: Cell Switching vs. Pacet Switching Yashar Ganjali, Abtin Keshavarzian, Devavrat Shah Departents of EE and CS Stanford University Stanford, CA Abstract Input Queued(IQ) switches have been very well studied in the recent past. The ain proble in the IQ switches concerns scheduling. The ain focus of the research has been the fixed length pacet-nown as cells-case. The scheduling decision becoes relatively easier for cells copared to the variable length pacet case as scheduling needs to be done at a regular interval of fixed cell tie. In real traffic dividing the variable pacets into cells at the input side of the switch and then reassebling these cells into pacets on the output side achieve it. The disadvantages of this cell-based approach are the following: (a) bandwidth is lost as division of a pacet ay generate incoplete cells, and (b) additional overhead of segentation and reassebling cells into pacets. This otivates the pacet scheduling: scheduling is done in units of arriving pacet sizes and in non-preeptive fashion. In [7] the proble of pacet scheduling was first considered. They show that under any adissible Bernoulli i.i.d. arrival traffic a siple odification of Maxiu Weight Matching(MWM) algorith is stable, siilar to cell-based MWM [1-4]. In this paper, we study the stability properties of pacet based scheduling algorith for general adissible arrival traffic pattern. We first show that the result of [7] extends to general re-generative traffic odel instead of just adissible traffic, that is, pacet based MWM is stable. Next we show that there exists an adissible traffic pattern under which any wor-conserving (that is axial type) scheduling algorith will be unstable. This suggests that the pacet based MWM will be unstable too. To overcoe this difficulty we propose a new class of waiting algoriths. We show that waiting -MWM algorith is stable for any adissible traffic using fluid liit technique [6]. Keywords Pacet switching, scheduling, variable length pacets I. INTRODUCTION The two iportant design criteria for switching architectures are: (a) throughput of the syste, and (b) average delay. Aong different switching architectures Input Queued(IQ) switch architecture has been very attractive due to its low eory bandwidth requireents copared to other nown architectures. The crossbar constraints of an IQ switch requires it to schedule pacets to be transferred between inputs and outputs. The throughput and delay in IQ switch are heavily dependent on this scheduling decision. In past there has been a lot of research done to design good scheduling algoriths for IQ switches [1-3],[8]. In these studies there is an iplicit assuption that the switch wors with fixed-size cells. In other words, they all assue that whenever a pacet arrives to the syste, it is divided into equal-sized cells, and after the switching is done, the cells are re-assebled in the for of the original pacet before leaving the syste. Contrary to this coon assuption, we consider systes in which the switch directly wors on pacets without breaing the into cells. We call such a switching syste a pacet-based syste copared to the cell-based systes, which only deal with the fixed-size cells. Using fixed-size cells in the switch aes the ipleentation of the scheduling algorith of the switch uch easier copared to the variable-length pacets, but the following are the two ain disadvantages with fixedsized cell approach: (i) Pacets arriving at input side need to be segented into cells, requiring a special input segentation odule; and at the output side these cells need to be re-assebled. This induces significant ipleentation overhead. (ii) Pacets ay generate incoplete cells because a cell should not contain data belonging to two different pacets. This can result in significant bandwidth loss. For exaple, if cell size is 64 bytes and pacet size is 40 bytes then the aount of bandwidth lost is 24/64 37%!. This otivates the study of pacet scheduling algoriths. The pacet-based algoriths have been studied before in [7]. It is iportant to first understand the throughput region for the case of pacet-scheduling algoriths. Naturally there is soe siilarity between pacet-based and cell-based scheduling. For cell-based scheduling it is nown that Maxiu Weight Matching(MWM) algorith is stable [1-6] for any adissible traffic. In [7] it is shown that canonical odification of the cell-based MWM for pacet-based, which we denote as PB-MWM, achieves 100%

2 throughput for any adissible Bernoulli i.i.d. traffic with pacet lengths being bounded (rather probabilistically bounded and independen. In this paper we first study the PB-MWM algorith. We study the throughput properties of the PB-MWM algorith under general adissible traffic rather than restricting to the Bernoulli i.i.d. case. We first show that the PB-MWM is stable even for any for of regenerative adissible traffic, with the tie of regeneration being finite in ean(note: Bernoulli i.i.d. traffic is special case of regenerative traffic). We obtain this result using a different proof technique, which sees to be soewhat sipler. Next we consider general adissible traffic with Strong Law of Large Nubers property. We show that there exists a counter exaple for which the PB-MWM is not stable. In general, this counter exaple shows that any scheduling algorith that tries to schedule in worconserving fashion or in axial-sense every tie, will not be stable. This counterexaple suggests a fundaental difference between pacet-based and cellbased scheduling algoriths. Hence in general to obtain stability we need to design a different type of pacetbased scheduling algorith. We propose a new class of algoriths which is called waiting algoriths. In particular, we show that waiting odification of PB- MWM is stable for any adissible traffic with bounded pacet lengths using fluid technique siilar to [6] (note: in general ean pacet length should be bounded). The structure of this paper is as follows. In section II, we describe the input-queued switch architecture, the cell-based axiu weight atching (MWM) algorith and the fluid odel for the switch briefly. In Section III, the pacet-based switching algoriths are defined. The canonical extension of MWM algorith for the pacet-based scenario is defined. In section IV, we prove the stability of the pacet-based MWM for regenerative adissible traffic extending the proof of [7]. In section V we present the counter-exaple that otivates the classification of pacet-based algorith into two classes of waiting and non-waiting groups. In section VI, we introduce a siple waiting algorith, which is proved to be stable using fluid techniques. Finally in section VII we conclude the paper. II. INPUT-QUEUED SWITCH In this section we describe the odel of an Input Queued (IQ) switch that is the ain architecture studied in this paper. Figure 1 shows the logical structure of an IQ switch. Although it is not necessary, we assue that the switch has the sae nuber of input and output ports denoted by N. In fact, in practical designs, generally one input and output interface reside on the sae line card, thus the nuber of inputs and outputs is the sae. We assue that the tie is slotted and at each tie slot, at ost one data unit (of nown fixed size) can arrive to each input port. We call this data unit a cell. Cells arriving at input i and destined for output j are stored at input in a FIFO buffer called virtual output queue (VOQ), denoted here by VOQ. This queue separation avoids the loss of throughput due to the head-of-line blocing proble. The cross-bar fabric is assued to be eory-less. We say that a switch has speed up S, if at each tie slot at ost S cells can be reoved fro each input and at ost S cells can be transferred to each output. Input 1 Input N VOQ 11 VOQ 1N VOQ N1 VOQ NN Switching Fabric Figure 1. An Input Queued switch. Output 1 Output N The scheduling algorith decides which cells should be transferred between the inputs and outputs of the switch at every tie slot, i.e., it selects a atching between inputs and outputs in such a way that no input (respectively, outpu ay be atched to ore than one output (respectively, inpu. We say a scheduling algorith is "wor conserving" or "axial", if an input is never left un-atched when it has a pacet for an unatched output. We represent a atching by an N N atrix =[ ] where if input i is connected to output j, we have =1, otherwise =0. The set of all possible atchings is denoted by M. Let A (n) denote the nuber of cells that have arrived at input i destined for output j up to tie n. We adopt the convention that A (0)=0. We assue that the arrival processes A(n)=[A (n)] satisfy the Strong Law of Large Nubers (SLLN), that is, A li = λ i, j = 1,..., N a.s. (1) n n We call λ the arrival rate at VOQ. This assuption on the arrival process is very ild.

3 Definition : We say the arrival processes with arrival rate atrix Λ = [λ ], is adissible if the above condition holds and no input or output is overloaded, in other words, N λ 1 j = 1,..., N i= 1 N (2) λ 1 i = 1,..., N. (3) j= 1 Let D (n) show the nuber of departures fro VOQ up to tie n. Again let D (0)=0 and D(n)=[D (n)] Definition : A switch operating under a atching algorith is called stable (rate stable) if, with probability one, D = λ n li i, j = 1,..., N, (4) n for any adissible arrival process A (n) with rate λ. We say the traffic is i.i.d. if the arrival process is such that, (a) the arrivals to different input ports are independent, and (b) the arrival to the sae input port at different tie slots are also independent. We would lie to note that, a general adissible traffic, satisfying SLLN as above, does not need to have independence. Let Z (n) show the nuber of cells in VOQ at tie n, including any arrival at tie n, then the atrix Z(n)=[Z (n)] shows the queue occupancy at tie n. For any atching M the weight W (n) of the atching at tie n is defined as; where < A,B > = the sae size. W =<, Z( n) >, (5) i, j A B for two atrices A and B of A. Maxiu Weight Matching (MWM) Algorith At each tie slot, MWM algorith will select the atching with the axiu weight aong all atchings in M. If there are ultiple MWMs, one of the is selected arbitrarily. We denote the axiu weight atching and its corresponding weight at tie n by ( n ) and W ( n ) respectively. That is, ( ) = arg ax W, (6) n M W ( = M n) = ax W W. (7) In [1][3], it was shown that under any adissible Bernoulli i.i.d. traffic, MWM algorith is stable. In [6] using the fluid odel analysis it was shown that MWM is stable for any adissible traffic satisfying (1). The notion of stability(rate stability) in [6] is weaer than the notion of stability used in [1]-[3], but in [6] the stability is proved for a larger class of arrival traffic. In this paper also we adopt notion of rate stability as in (4). B. Fluid Model and Switch Dynaics This section describes the fluid odel of a discrete tie switch. For any M, let T (n) represent the cuulative aount of tie that the atching has been used up to tie n under the scheduling algorith used. We assue that T (0)=0. Note that T (n) is a nondecreasing function with respect to n. For a discrete-tie switch the following three equations govern the dynaics of the switch: D Z = A D, (8) ( T T ( n 1 ) = D ( n 1) + 1 Z > 0} ) M {, (9) T ( n = n. (10) ) M The first equation siply states that the nuber of cells in VOQ equals the total nuber of arrivals inus the total nuber of departures. The second equation obtains the nuber of departure by considering all the atchings that can connect the input i to output j. The third equation siply states that at each tie slot, exactly one of the possible atchings is used. In [6], the fluid odel of a discrete-tie switch was introduced. We will use this fluid odel in this paper without presenting any proofs or justification. An interested reader can refer to [6] for an elaborate exposition to this topic. Fro [6], the continuous equations governing the dynaics of the fluid odel of switch described above are as follows: for every i,j=1,,n D = Z = λ t D, (11) M M T ( t ) if Z > 0, (12) T ( t ) = t, (13) where the functions Z ( t ), D ( t ), and T ( t ) are called the fluid liits and are obtained fro the discrete rando processes Z (n), D (n), and T (. For

4 exaple the Z ( t ) is obtained as follows. First, a continuous version Zˆ of the discrete function Z (n) is created; Z ˆ = Z ( t ) + Z ( t + 1) Z( t ) ( t t ). (14) ( ) Then the fluid liit is obtained as follows; Z ( t ) Zˆ ( r = li. (15) r r All other fluid liit functions are obtained in a siilar anner, that is, the tie is scaled by r and the function is re-noralized by dividing by r. III. PACKET-BASED SWITCHING We described the structure of a cell-switch in the previous section, now we can define how a pacet-based switch perfors. Pacets with different sizes can arrive to the switch. However we assue that the fabric wors on fixed-size data units (cells). So in each tie slot only one cell can be sent to each output. Thus, the received pacets ust be segented into an integer nuber of cells. For siplicity, without loss of generality we will assue that each pacet is ade up of an integer nuber of cells. We constrain the scheduling algorith to deliver contiguously all the cells obtained fro the segentation of the sae pacet, i.e., at the output they are not interleaved by the cells fro another input port. More forally we can define a pacet-based scheduling algorith as follows: Definition: A pacet-based scheduling algorith is a scheduling algorith such that once it starts transitting the first cell of a pacet to an output port, it continues the transission until the whole pacet is copletely received at the corresponding output port. With this constraint of scheduling algorith being non-preeptive on pacets avoids the proble of segentation at input ports and reassebly of cells at output ports in a switch. In any cell-based switching syste, different cells of the sae pacet ay observe different delay values before leaving the syste. It is reasonable to assue that the delay seen by the user is sae as the delay observed by the last cell of any pacet. Therefore a scheduling algorith that transfers the last cell of a pacet with larger delay perfors poorly, even if it perfors well on all other cells of the pacet. Most of the nown cell-based scheduling are not aware of the existence of pacets, and therefore there is a chance that a pacet-based scheduling algorith which is aware of the entity of a pacet can use this inforation to do a better scheduling (in the sense of the waiting delay observed by the users). Siilar reasoning was given in [7] by authors in the favor of pacet scheduling. It is easy to convert a nown cell-based algorith into a pacet-based one. Let us consider any cell-based scheduling algorith X (e.g. MWM, axial atching, etc.). We can easily convert X into a pacet-based algorith as follows: At each tie slot, we divide the input-output ports into two disjoint sets: Busy ports: the set of input-output ports which have been atched to each other in the previous tie slot and are still in the iddle of sending a pacet. Free ports: the set of input-output ports which either have no pacets to send, or just finished sending a pacet. The scheduling algorith PB-X eeps the atching already used by busy ports and finds a new (sub- )atching for free ports using the cell-based scheduling algorith X. Initially all the ports are assued to be free. In [7] Marsan et al. considered pacet-based scheduling algoriths in the way defined as above. They described the odel of a pacet-based scheduling algorith, and highlighted the effect of considering pacet entity in designing the scheduling algoriths. They proved that the PB-MWM is stable for any adissible Bernoulli i.i.d. traffic. With the help of siulation results, they showed that pacet-based scheduling algoriths could outperfor a cell-based algorith for certain cases. In the next section we give a different proof for stability of PB-MWM using the fluid odel technique. This proof proves the stability of PB- MWM for a ore general class of arrival process. IV. PB-MWM STABILITY In this section we consider the stability of the pacetbased MWM algorith. First we define soe notations used in the proofs. Definition: A atching (n) used at tie n is called -iperfect atching, if = ( n ). (16) In other words, is -iperfect if it is equal to the axiu weight atching tie slots ago. Obviously, any axiu weight atching is a 0- iperfect atching at the tie it is chosen by the scheduler. The following Lea states a very siple but iportant property of -iperfect atchings. Lea 1: The weight of a -iperfect atching is at ost 2N different fro the weight of the axiu

5 weighted (0-iprefec atching at any given tie slot, i.e., if (n) is a -iperfect atching with weight W (n), used at tie slot n, then; W W 2N. (17) that the pacet lengths are bounded. For this section, we assue that arrival process is stationary. Let p T ( denote stationary probability of event {T=t}. Let W(n) denote the weight of atching obtained by scheduling algorith SA at tie n. Then, Proof: For any atching ' let W '( n ) be its weight at tie n and W (n) be its weight at tie n, then the following inequalities hold under any scheduling algorith: W n ) N W W ( n ) + N. (18) '( ' ' Thus; E{ W Z } t= 0 p T = 0 [ W 2Nt] = W ( n ) 2 N tp T ( t ). (22) This is true because of the following siple reason: during tie slots, at ost cells can arrive (depar at an input port, which in turn can increase (decrease) queue size at any input port by at ost. There are N input ports, and hence the net weight can increase (decrease) by at ost N. We now that (n) is -iperfect, thus, ( n) = ( n ), i.e., at tie n, has the largest weight aong all possible atchings; M W n n ) W ( n ). (19) ( )( ' ' Thus if we select = we have; W n ) W ( n ). (20) ( Furtherore, using the above inequities we can write; W + N W ( n ). (21) Cobining the last three inequalities, we obtain the result stated in lea 1. QED. Let us consider the following scheduling algorith, which we denote as SA: 1. Let s (n) be the schedule used by SA at tie n. 2. At tie n+1, if all ports are free then s ( n + 1) = ( n + 1) else s ( n + 1) = s( n). Let T be the tie between two successive occurrences of event that all ports becoe free. Note that the atching obtained by algorith SA is at worst T-iperfect, by definition. Now T is a rando variable which depends on the arrival process and the pacetlengths. For siplicity without loss of generality assue E{ W Z } W 2NE{ T}. (23) Now if E{T} is finite we say that the traffic pattern is regenerative. In other words, it has property that on average it requires a finite aount of tie to reach the state where all the input and output ports are free. Note that this property is related to the traffic pattern and not with the scheduling algorith SA. It is already shown in [7] that if the traffic is fored by variable length pacets with independent rando size with finite average and variance, and adissible Bernoulli i.i.d. traffic the average value of T is bounded. In general, traffic need not be Bernoulli i.i.d. to obtain this property and there is uch larger class of distribution under which this property holds true. For such regenerative traffic, we prove the stability of SA algorith. The following is a ey lea, which states a ore general result about stability. Lea 2: A scheduling algorith is rate-stable for any adissible traffic with property (1) if the average value of the weight of the atching it uses at each tie slot, is at ost away fro the axiu weight by a bounded constant value, i.e., if E{ W Z } W B, (24) then the algorith is stable. Proof: Let Z( t ) = [ Z ] and D = [ D ], then consider the Lyapunov function L( as; 2 L =< Z, Z( >= Z. (25) It was shown in [6] that for MWM L & 0 if any Z 0. This in turn iplies that if Z (0) = 0 then Z = 0 for all t. This proves the rate-stability of the switch. Hence, our interest is in showing L & 0 if any i, j

6 Z 0 under the scheduling algorith in consideration with property that the expected weight of the atching used is at ost a bounded constant away fro the weight of MWM. Consider all t such that the fluid quantities are differentiable and hence L & ( is well defined. By definition where W ( t ) = Z,. L( = 2 Now fro (12) we have; D t Z ( ), Z(, Z( D( = 2 Λ, Z( t = t Λ D ( ) 2 Z ( ), 2 Z(,. (26) = = Let us define (n) as the difference between the weight of the MWM and weight of the atching obtained by scheduling algorith at tie n. We now that E[ ( n)] is bounded by soe constant B which does not depend on n. Further (n) is a positive rando variable. Hence (n) is bounded alost surely. Thus, on the fluid liit scale we obtain that; M M Z, T T W, (27) ˆ ( r Bˆ ( = li li = 0. (28) r r r r atching. If we show the set of atchings used by the scheduling algorith by M, we have; D( Z(, = M T W T t = W t ( ) ( ). (30) M Note that although M M but since M is the set of atchings used by the scheduler, we can odify (13) to; M T = t. (31) changing the M to M. Now cobining this result with (30) we obtain; Thus the derivative of D( Z ( t ), = W ( t ). (32) L( is; L = 2 Z, Λ 2W ( t ). (33) By Biroff-von Neuann s Theore for the doubly sub-stochastic (adissible) traffic Λ, we obtain: Λ γ, γ 1 <. (34) By definition of the axiu weight atching; Z, ( t W ). (35) Thus, in the fluid scale the weight of the MWM and the weight of the atching used by scheduler will be the sae, i.e., W W ( t = ). (29) Therefore the algorith will only use the atchings that have the sae weight as the axiu weight Hence fro (33) and (34) we obtain; L 2 γ 1 W ( t ). (36) Hence if any Z > 0 then L & < 0. The rest of the proof for the rate-stability follows fro [6]. QED.

7 Now cobining this lea with the above result, we conclude that the algorith SA is stable. Note that, the above proof does not require the bounded pacet lengths, but requires only independent pacet lengths with bounded ean. Theore 3: The SA algorith is stable under regenerative adissible input traffic. We would lie to note that, under PB-MWM algorith the tie between successive occurrences of event when all ports becoe free will also have required property as in Lea 2 under Bernoulli i.i.d. traffic for independent pacet lengths with bounded ean. Hence the stability for PB-MWM will follow fro Lea 2. We would lie to note that as proved for SA, the PB- MWM algorith is stable for a ore general class of traffic. In the next section we show that there are adissible traffic patterns for which the algorith is unstable. V. PACKET-BASED ALGORITHM CLASSIFICATION It is proved in [6] that cell-based MWM algorith has strong stability property that it is stable as long as the input traffic is adissible with property (1). It does not require any other condition on distribution. In previous section we proved the stability for PB- MWM(and SA) for adissible traffic with additional condition that it should be regenerative. The question arises is: whether the PB-MWM(or SA) is stable for any adissible traffic under only (1). In this section, we show that it is not stable using a siple counter-exaple. A 11 A 12 Tie =, 2 =. (37) When the first pacet arrives to the switch, the PB- MWM uses parallel atching ( 1), and then the scheduler is forced to eep the sae atching for 3 tie slots till the pacet finishes. Before this pacet is finished, a pacet of length 2 coes to input 1 and it is scheduled for output 1 under scheduling algorith. In this way, under this traffic pattern, it is easy to see that whenever one input port becoes free, the other input port is busy serving a pacet. Hence both input ports are never free together. This forces the scheduling algorith to use the parallel schedule all the tie. Therefore none of the pacets arriving at VOQ 12 and VOQ 21 will ever get the chance to depart. Thus, the switch is unstable. Note that cell-based MWM will be able to handle this traffic. The counter-exaple described above also shows that any wor-conserving or axial algorith is not stable for that particular traffic pattern. This otivates us to classify the pacet-scheduling algorith in the following two classes: 1. Wor-conserving(non-waiting) algoriths: under these algoriths an input is never left un-atched when it has a pacet for any of unatched output. 2. Waiting algoriths: these algoriths are not always wor-conserving, that is, they do wait for an infinite nuber of tie slots. The above counter-exaple suggests the following general result about the wor-conserving (axial) algoriths. Theore 4: There is no wor-conserving scheduling algorith that is stable under any adissible traffic with condition (1). A 21 A 22 Figure 2. Traffic Pattern. Consider a switch operating under PB-MWM (or SA) with input traffic pattern as shown in Figure 2. A (i,j=1,2) shows the arrival to VOQ. The traffic pattern is periodic with period of length 10. Note that no input or output is overloaded. In fact, λ 1, 1 = 0.8, λ1,2 = 0.1, λ 2, 1 = 0. 1, and λ 2, 2 = The switch can use one of the two possible atchings, naely 1 which is called the parallel atching and 2 the cross atching, i.e., Note that even if an algorith is waiting for finite nuber of steps it becoes wor-conserving after that and hence fro above counter-exaple it becoes unstable. This requires that if algorith wants to be stable then it ust wait for infinitely any tie steps. VI. A GENERALLY STABLE WAITING PACKET-BASED ALGORITHM. In this section we describe a waiting algorith. We will show that the waiting -MWM algorith will achieve 100% throughput for any adissible traffic pattern and in particular, it will be stable for the traffic pattern described in previous section for which PB-

8 MWM or any pacet-based wor-conserving scheduling policy was unstable. The waiting algoriths are otivated fro the counter-exaple described in previous section for worconserving algoriths. The ain proble is that the wor-conserving algorith greedily atches the ports whenever possible, forcing it to always eep the parallel atching in the counter-exaple of figure 2. One way to overcoe this proble is the following: when a pacet gets served do not schedule the freed ports till all ports becoe free and schedule according to a full MWM schedule. The waiting, synchronizes the weight of schedule to the weight of MWM schedule. Hence if waiting is done frequently enough then the weight of schedule is always not ore than a bounded constant away fro MWM, by reasoning siilar to Lea 1. However note that waiting eans that during the waiting period soe ports are losing bandwidth. Hence if waiting is done too aggressively then the algorith can not utilize full bandwidth. These observations lead to the following waiting algorith which we denote as PBwMWM. PB-WMWM The switch runs at speedup (1+ ) for arbitrarily sall positive constant >0. Let the axiu length of any pacet be L (this assuption can be relaxed to ean pacet length being finite which will be described later). Divide the tie into period of length ( L / ) units. Thus tie is considered as [ 0, L / ], [ L / + 1,2 L / ], and so on. Scheduling decisions are ade only when any of scheduled pacets finishes its service and corresponding ports get epty. Let one or ore pacets get served at tie n [ L / + 1,( + 1) L / ]. Consider the following cases: n [ L + 1,( + 1) L L ] : use usual PB (1 + ) MWM to atch the free nodes as before. Otherwise wait on all the pacets till all scheduled pacets get over and all ports are free. After that, use full MWM to re-schedule all the ports and serve. Note that the above algorith at ost loses bandwidth of L per every ( L / ) tie slots. That is it loses bandwidth of per tie slot at ost. The algorith runs at ( 1+ ) speedup in order to ae up for this lost bandwidth. We state the following theore about stability of PB-wMWM: Theore 5: The PB-wMWM algorith is stable(rate stable) under any adissible traffic with property (1) at at speedup ( 1+ ) for any > 0. Proof: Note that the way algorith is defined, every ( L / ) tie the weight of atching is sae as weight of axiu weight atching. Thus any tie the algorith is at worst ( L / ) -iperfect. Hence by Lea 1, the weight of the atching is at ost B = 2NL / away fro MWM. The fraction of tie the algorith idles on any of the ports is bounded above by L (1 + ) L =. (38) 1+ Under speedup ( 1+ ) assuing the algorith is scheduling all the tie, the equation (13) changes to T = (1 + t. (39) ) M But in our algorith, since it is waiting, the above equation ay not be true. Fro above discussion, at worst fraction of the bandwidth is lost in waiting. That is, at least ( 1+ )(1 ) = 1, (40) 1+ is the effective speedup obtained. Thus, the equation (13) of the fluid odel changes to In other words, M M T ( t ) t T 1 (41) (42) Now the arguents siilar to ones used in proof of Lea 2, yield the desired result that PB-wMWM is stable. QED. The above algorith PB-wMWM, assues the pacet lengths to be bounded and bound L is nown. But in reality the L ight not be nown. Further we do not require the pacet lengths to be bounded, but only ean pacet length should be bounded. To address this issue we odify the PB-wMWM algorith as follows,

9 MODIFIED PB-WMWM (PB -WMWM) Initially start with the MWM algorith and start waiting iediately. Copute the axiu aount of idling done by any port. When the waiting starts, there are soe unfinished pacets. Note that the axiu waiting done by any port is at ost the axiu length of any pacet that was under schedule. Let L e (1) represent the axiu length of pacets under schedule. Set M ( 1) = Le (1) / and do the PB-MWM for M (1) tie slots and then start waiting after that. Now let L e (2) be the axiu length of the pacets under schedule when the waiting starts at the end of M (1) tie slots. Siilarly define M 2) = L (2) /. ( e Continue this process recursively over tie. In general we obtain the following recursive expression: Le ( l) M ( l) =. (43) The two ain properties required in the proof of Theore 5 are: (a) The effective speed is at least 1, and (b) the weight of schedule used by algorith is at ost bounded constant away fro the weight of MWM. In the above algorith, let s copute these two quantities as follows: (a) The effective bandwidth lost: In the l total idling per port is at ost for tie while the length of period is th L e period the ( l) /(1 + ) = Le ( l) Le ( l) Le ( l) P( l) M ( l) + = (44) + Thus the fraction of bandwidth lost is at ost: L e ( l) (1 + ) P( l) 1 = (45) Note that this bandwidth loss is sae as the loss in PB-wMWM coputed in proof of Theore 5. (b) The difference between the weight of MWM and the schedule will be at ost M ( l)(1 + ) that is L e (l)(1+ ). (46) Given that L e (l) has bounded ean and pacet lengths are independent we will obtain that the above quantity is bounded alost surely as required in Lea 2. Fro above discussion we obtain the following Theore: Theore 6: The PB -wmwm is rate-stable for any adissible traffic with property (1) and independent pacet lengths with bounded ean. A. Note on speedup In PB-wMWM and PB -wmwm we required speedup ( 1+ ) for arbitrary > 0. If we now that the γ = (1 α) (47) in (34), then in PB-wMWM (PB -wmwm) we can use < α / 2 in defining different quantities and have speedup of 1 only to achieve stability. VII. CONCLUSIONS In this paper we considered the pacet-scheduling algoriths for IQ switch architecture. The result of [7] showed that odification of cell-based MWM for pacet scheduling yields 100% throughput for any adissible Bernoulli i.i.d. traffic with independent pacet lengths of bounded ean. We generalized this result for soe what broader class of arrival traffic pattern. We showed that there exists adissible traffic pattern for which no worconserving or axial algorith is stable. To overcoe this proble we proposed a new class of waiting algoriths. Under the waiting algorith the switch becoes stable for any adissible traffic. This was proved using fluid liit technique. It is interesting to note that the wor-conservation for pacet scheduling is not always beneficial in this sense, unlie cell-based scheduling. This suggests that scheduling pacet-based is quite different fro the cell-based scheduling. ACKNOWLEDGMENT The authors than B. Prabhaar and N. McKeown for suggesting the proble and discussions.

10 REFERENCES [1] N.McKeown, V. Ananthara, J. Walrand: Achieving 100% throughput in an input-queued Switch, INFOCOM 1996, pp [2] L. Tassiulas, A. Ephreides, Stability Properties of constrained queuing systes and scheduling plicies for axiu throughput in ultihop radio networs, IEEE Trans. Autoatic Control, vol. 37, no. 12, Dec 1992, pp [3] N.McKeown, V. Ananthara, J. Walrand: Achieving 100% Throughput in an Input-Queued Switch, IEEE Transaction on Co., vol. 47, no. 8, Aug. 1999, pp [4] N. McKeown, islip: a scheduling algorith for input-queued switches, IEEE Transaction on Networing, vol. 7, no.2, April 1999, pp [5] N. McKeown, Scheduling algoriths for input-queued cell switches, PhD Thesis, University of California, Bereley, May [6] J.G. Dai, B. Prabhaar, The throughput of data switches with and without speedup, INFOCOM 2000, pp [7] MA. Marsan, A. Bianco, P. Giaccone, E. Leonardi, F. Neri, Pacet Scheduling in Input-Queued Cell-Based Swithces, INFOCOM 2001, pp [8] P. Giaccone, B. Prabhaar, D. Shah, Towards Siple, High- Perforance Schedulers for High-aggregate bandwidth Switches, New Yor, NY, INFOCOM 2002.

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Lecture L9 - Linear Impulse and Momentum. Collisions

Lecture L9 - Linear Impulse and Momentum. Collisions J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW

PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW ABSTRACT: by Douglas J. Reineann, Ph.D. Assistant Professor of Agricultural Engineering and Graee A. Mein, Ph.D. Visiting Professor

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Note on a generalized wage rigidity result. Abstract

Note on a generalized wage rigidity result. Abstract Note on a generalized age rigidity result Ariit Mukheree University of Nottingha Abstract Considering Cournot copetition, this note shos that, if the firs differ in labor productivities, the equilibriu

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Binary Embedding: Fundamental Limits and Fast Algorithm

Binary Embedding: Fundamental Limits and Fast Algorithm Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin yixy@utexas.edu Eric Price The University of Texas at Austin ecprice@cs.utexas.edu Constantine Caraanis

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters

Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Conerters Yang Qiu, Ming Xu, Jinjun Liu, and Fred C. Lee Center for Power Electroni Systes The Bradley Departent of Electrical

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Performance Analysis of a Practical Load Balanced Switch

Performance Analysis of a Practical Load Balanced Switch Performance Analysis of a Practical Balanced Switch Yanming Shen, Shivendra S Panwar, H Jonathan Chao Department of Electrical and Computer Engineering Polytechnic University Abstract The load balanced

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

Basics of Traditional Reliability

Basics of Traditional Reliability Basics of Traditional Reliability Where we are going Basic Definitions Life and ties of a Fault Reliability Models N-Modular redundant systes Definitions RELIABILITY: SURVIVAL PROBABILITY When repair is

More information

Modeling operational risk data reported above a time-varying threshold

Modeling operational risk data reported above a time-varying threshold Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: Pavel.Shevchenko@csiro.au

More information

Pricing Asian Options using Monte Carlo Methods

Pricing Asian Options using Monte Carlo Methods U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University

More information

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information