On Traffic Fairness in Data Center Fabrics

Size: px
Start display at page:

Download "On Traffic Fairness in Data Center Fabrics"

Transcription

1 On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Univ. of Missouri Kansas City, 5 Rockhill Road, Kansas City, MO 64 USA. dmedhi@umkc.edu Abstract A resent challenge in data center networks (DCN) is to better understand the imact of novel flattened and modular DCN architectures on congestion control rotocols, and viceversa. One of the major concerns in congestion control being the fairness in the offered throughut, the imact of the additional ath diversity and forwarding features, brought by the novel DCN architectures and rotocols, on the throughut of individual endoints (servers) and aggregation oints (edge switches) is unclear. This aer attemts to answer these oen questions. Secifically, how best is the allocation of the cometing elastic demand flows and how is this allocation imacted with the increase in caacity? We rovide an otimization formulation of the roblem based on the roortional fairness rincile of TCP. We conducted a series of test scenarios on the fat-tree data center toology by considering load balancing and link caacities for different network cases in order to resent our analysis on the results. We observed that the traffic allocation fairness is rimarily imacted by the weights associated with the TCP imlementation in use. Index Terms Data Center Networks, Resource fairness, TCP throughut, Fat-tree toology I. INTRODUCTION The emergence of network virtualization solutions, such as Infrastructure as a Service (IaaS), offers several advantages to organizations in terms of both oerational and caital exenditures [9]. The transition from hysical indeendent networks to virtual de-localized networks oerated in the Cloud can be facilitated if, besides security concerns, connectivity erformance is at an accetable level and shows desirable fairness roerties. With the growth in customer volumes, service differentiation and elastic demands, avoiding bottlenecks is a critical oint in Data Center Network (DCN) architectures. With the de-facto dominating trend of deloying services using virtualization servers, a non negligible ratio of the traffic is horizontal traffic between virtualization servers, in suort of virtual machine migration and storage synchronisation. The amount of intra- DC horizontal traffic can overcome the access vertical traffic volume []. This has eventually favored the emergence of novel DCN architectures that exose additional horizontal caacity between server racks and clusters of racks such as fat-tree [], and BCube [5]. An oen question is: how best is the traffic allocation of the cometing elastic demand flows for horizontal traffic between edge servers in data center fabrics, and how is this allocation imacted with the increase in caacity? To address this question, we assume that all traffic uses TCP allowing multiath forwarding. More secifically, we are interested in understanding this imact in equilibrium. It has been shown that several variants of TCP are roortionally fair in the equilibrium, which have been verified through simulation [8], [9]. We, therefore, use a roortional fairness model to understand the allocation for cometing demands in data center fabrics. Our study is focused on a fat-tree data center toology, one of the oular data center network architectures, as this allows us to understand the imact between intra-od and inter-od traffic among all the horizontal traffic. The rest of the aer is organized as follows. Section II resents the background of our work. Our otimization model is formulated in Section III and the study results are resented in Section IV. Section V concludes the aer. II. BACKGROUND In this section, we resent an overview of the TCP roortional fairness model and of existing multiath forwarding rotocols. A. TCP Proortional Fairness Model In a network with multile cometing TCP sessions sharing links, several studies [4], [8], [8], [9] have shown that TCP imlicitly solves a utility roblem in equilibrium. This utility roblem is formally described as a imization of an aggregate utility subject to caacity constraints: subject to X U(X j ) () j J δ je X j c e, e =,,..., E () j J The above model imizes the utility function U(X j ) of each session j J where X j denotes the rate of session j while δ je is the indicator that takes the value if session j uses link e, otherwise. For the Proortional Fairness (PF) [], [6] allocation that is alicable to TCP, utility U(x j ) is set to ω j log x j, where ω j is the weight of the session j. Hence, the resource allocation corresonding to this utility function is commonly referred to as weighted roortionally fair, or, if all ω d are equal to one, as roortionally fair. Thus, () for PF becomes: X ω j log X j (3) j J

2 B. Multiath forwarding rotocols There are many recent rotocols designed in the last decade that include forms of multiath forwarding, also referred to as acket load-balancing techniques. They can act either at the data-link, network, or transort levels. At the data-link layer, a rotocol has been designed secifically for data-center networks, the Transarent Interconnection of a Lot of Links Protocol (TRILL) [7]. It allows a switch and even a virtualization server, acting as virtual bridge, to balance the load over multile destination TRILL bridges for the same air of nodes. However, no forms of congestion control are imlemented here as the evolution of IP networks is such that this has been left to the transort layer. At the network layer, Equal Cost MultiPath (ECMP) [6] is adoted in the Oen Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS) rotocols []: it allows balancing the load over multile next hos. ECMP can also be imlemented in TRILL. However, this is tyically erformed in such a way that for a secific TCP flow, only one ath is used in order to avoid acket disordering and buffer exlosion at TCP endoints. At the transort layer, there have been two major roositions. Stream Control Transmission Protocol (SCTP) [5] allows end hosts to use several aths concurrently, when devices are multihomed. The way it has been designed, however, makes SCTP weak against the de-facto ervasive resence of middleboxes in the Internet such as firewalls, erformance otimizers, load balancers at lower layers and interfaces. In many cases, SCTP connections cannot be oened or maintained. More recently, the Multiath TCP (MPTCP) [4] has been designed with retrocomatibility and incremental deloyability as the first design requirements so that using multile aths simultaneously is made ossible, falling back to standard TCP in case of middlebox blocking. Major attention has also be given to congestion control and fairness. An imortant requirement is that an MPTCP connection over a given link should not take more resources than legacy TCP connections running on the same link. However, as shown in [7], [], the congestion control algorithm is a key choice when fairness with resect to other connections needs to be guaranteed as it is a major concern of network oerators. Our study is agnostic about the secific multiath forwarding rotocol that could be adoted in the DCN fabric, and the related analysis is concetually alicable to any configuration including multiath forwarding and congestion control in whatever layer. III. PROBLEM FORMULATION Following [3], we now generalize the basic roortional fairness model for DCN allowing multiath forwarding for elastic demands that use TCP. First, while the actual TCP sessions are between edge servers in a DCN, we can consider the model in terms of elastic demands between a air of edge switches since all such sessions must enter and exit through edge switches (see Figure ). Thus, moving away from sessions (identified by j earlier), we identify a demand between Indices d =,,... D =,,... P d e =,,... E Variables x d X d Parameters δ ed = α c e ω d Fig.. TABLE I MATHEMATICAL NOTATIONS demands associated with airs of edge switchs candidates aths for demand d links amount allocated to ath of demand d amount allocated to d if link e belongs to ath of demand d;, otherwise a minimum sub-flow ratio allocated to each ath available to a demand d caacity of link e weight of demand d (constant) Fat-tree toology with four ods. a air of edge switches by d with the elastic demand denoted by X d. Secondly, due to multiath forwarding, we identify traffic flow along each ath associated with demand d by using x d (notations are summarized in Table I). Therefore, for a given demand, the sum of traffic amount allocated to the aths is equal to the total elastic demand X d given by: x d = X d d =,,..., D (4) Next, the sum of all the flows using a articular link e must satisfy the link caacity constraint: δ ed x d c e e =,,..., E (5) d The goal is to imize the utility objective: X,x F (X) = d ω d log X d (6) where ω d is weight for demand d, which is discussed further in Section III-B. To summarize, our model is to address the goal given by (6) subject to constraints (4) and (5). It should be noted that while elastic demand X d is non-negative, the logarithm function ensures that no elastic demand takes the value zero, i.e., every demand must get its share according to roortional fairness subject to caacity constraints and any influence due to ω d. In addition to the above model, we are also interested in understanding the imact when we enforce at least some traffic to be carried on each ath of a demand d, which can be imosed using the following additional constraint (7): x d αx d d =,,..., D =,,..., P (7)

3 TABLE II LINEAR APPROXIMATION Indices k =,,..., K Consecutive ieces of the aroximation of log x. Variables f d aroximation of log X d. Parameters a k, b k coefficients of the linear ieces of the linear aroximation of log x. Global throughut Here, each candidate ath has to carry at least αx d, i.e., the minimum of rate allocated to demand d on each candidate ath. A. Linear aroximation of the objective We note that in the revious formulation, the objective function is non-linear due to the logarithm function. We use a linearization aroximation [3] of the logarithm function as follows: log X d = min {a kx d + b k }. (8) k=,,...,k Then, the otimization roblem becomes subject to: X,x,f F = d ω d f d (9) x d = X d d =,,..., D () δ ed x d c e e =,,..., E () d f d a k X d + b k d =,,..., D k =,,..., K () The advantage of this aroximation is that it is a linear rogramming roblem that can be solved using a well-known software ackage such as CPLEX. B. On weights w d We now elaborate on w d taking into consideration two valid TCP imlementations [9]. This was a result of different interretations of TCP Vegas [3]: the one based on bytes er round tri time and the other based on bytes er second leading to utility functions U(X d ) = log X d (3) U(X d ) = ω d log X d, (4) resectively. Here ω d corresonds to the roagation delay of session d. The first situation (3) does not give any weight to the session, and we name it the fixed-delay case. The second situation (4) gives weight to the roagation delay through ω d for session d and we name it the weighted-delay case. Besides the two valid imlementations of TCP Vegas, FAST TCP follows the weighted-delay case [8]. For comarison uroses, we use a simlification for the weighted-delay case by setting ω d to be based on the number of hos between the source and the destination to serve as a rough aroximation of the delay being the number of hos []. Fig.. Global throughut Fig Uniform caacity case: global throughut (All-to-All) Asymmetric caacity case: global throughut (All-to-All) IV. PERFORMANCE EVALUATION We evaluate our roortional fairness model to understand the fair allocation for cometing demands, focusing on a secific data center toology and studying cases to understand the imact of the DCN caacity on traffic fairness. We imlemented our study set u using C++ and CPLEX as the solver for the linear rogramming formulation given by ((9)) - (()). In the following, we resent the study framework and discuss the simulation results. A. DCN toology We run our study cases on the fat-tree toology [], a oular novel DCN architecture, deicted in Figure. It interconnects commodity Ethernet switches as a k-ary network where all switches are identical and organized in two layers: core layer and od layer. At the od layer, there is an aggregation stage and an edge stage. There are k ods, each one containing two layers of k switches. Each k-ort switch in the lower layer is directly connected to k hosts. Each of the remaining k orts is connected to k of the k orts in the aggregation stage. There are ( k ) k-ort core switches. Each core switch has one ort connected to each of the k ods. The i th ort of any core switch is connected to od i. Figure shows a fat-tree examle for k = 4 that was used in our study. The advantage of considering this toology is that it has intra-od traffic and inter-od traffic. Secondly, the caacity

4 (a) All-to-All (b) One-to-All Fig. 4. Uniform caacity case: intra-to-inter od All to all One to all (a) One-to-All and All-to-All (b) All-to-All (c) One-to-All Fig. 5. Asymmetric caacity case: intra-to-inter od may be set different for links with ods comared to the links that connect aggregation switches to core switches. B. Study cases In order to assess traffic fairness with different levels of the horizontal DCN caacities, we consider the two following DCN dimensioning cases: Uniform caacity: all link caacities are set equally. In this case, we consider different caacity configurations, increasing the caacity on all the links from to units in increments of units. Asymmetric caacity: the starting configuration has an equal caacity of units er link. We then increase the caacity only on the intra-od links (link between edge and aggregation switches) from to units by increments of units. The caacity of links between the aggregation and cored switches ( extra-od links ) remains fixed at units. We run our cases for different values of α, i.e., the minimum sub-flow allocated to each ath available to a demand d. We consider the following cases: Unbounded MultiPath (UMP) case, with α =, so that multiath forwarding is not forced for any demand, but can be used; Bounded MultiPath (BMP) case, with α =.5, so that multiath forwarding is lightly forced on all available aths for all demands, and can be freely used; Equi-distribution MultiPath (EMP) case, with α being relaced by α d = /N d in (7), where N d is the number of aths available to demand d, so that traffic distribution is forced to be even over the aths available to each demand. It is worth noting that for the fat-tree toology, intra-od traffic can have two aths, while inter-od traffic can use u to four aths. Moreover, we evaluate the results for both the utility functions resented in Section III: the fixed-delay situation given by (3) and the weighted-delay situation ( ω d = ho count) given by (4). These two otions allow us to see how fairness is guaranteed for intra-od and inter-od traffic. More imortantly, a data center rovider can decide to deloy its referred TCP imlementation (as they own the servers) by taking advantage of the lessons learned from this study, and accordingly allocate jobs to servers to target traffic fairness. In other words, this study also hels the Cloud rovider to decide on fine-grained scheduling of jobs that meets traffic fairness requirements. In order to show the imact on throughut allocation between intra-od and inter-od edge switches, we measure the intra-to-inter-od traffic allocation ratio. Finally, we measure the ath diversity of the solution for the UMP case for all the edge-to-edge demands ( All-to-All ) and from the oint of view of a single edge switch ( One-to-All ).

5 .8.8 Used aths.6.4 Used aths (a) All-to-All (b) One-to-All Fig. 6. Uniform caacity case: used aths ratio.8.8 Used aths.6.4 Used aths (a) All-to-All (b) One-to-All Fig. 7. Asymmetric caacity case: used aths ratio C. Results This subsection illustrates the results of the roortional fairness model concentrating the analysis around three key asects: the throughut allocation, the traffic distribution within and across ods, and the achieved ath diversity. ) Throughut allocation: First, consider the global throughut when traffic between all air of edge switches are allowed ( All-to-All ). Next, assume that all extra-od links are droed, i.e., there are only intra-od links with a caacity of each. It is easy to see that each od is isolated in this case (and there is no inter-od traffic). Thus, the traffic throughut between the two edge switches in a od is limited by the caacity of the intra-od links. Since two links form a ath, we can see that the throughut within a od between its two edge switches is. Thus, for the 4-od fat-tree toology, the total throughut is 8. In this case, also the traffic allocation between intra-od and inter-od is most skewed. It is interesting to note that when extra-od links have a ositive caacity, the total throughut still remains at 8 as long as the caacity of the intra-od links are at units each. In Figures and 3, the global throughut is lotted as the caacity is increased. We find that it grows linearly as dictated by the caacity of intra-od links, irresective of the caacity of the links connecting aggregation and core switches. More imortantly, it is not affected by the multiath case (UMP, BMP, EMP) nor the tye of the utility function (fixed-delay vs. weighted delay). It is not so trivial to observe that the global throughut aears as being directly roortional to the fixed link caacity at eight times the link caacity for the All-to-All case. ) The traffic distribution: Next we investigate how the traffic distribution is affected between intra-od and inter-od edge switches, for which we use the metric intra-to-inter od. We characterize the traffic distribution sensibility with resect to the various cases focusing on the intra-to-inter od and on the between neighboring ods and between non-neighboring ods. For the uniform caacity case with regards to the intra-tointer od for all-to-all demands (Figure 4), we find that on average the allocation between intra-od and inter-od traffic is similar with the fixed-delay situation. On the other hand, with the weighted-delay situation, the inter-od traffic has a traffic roortion that is almost twice that of the intraod traffic. This can also be exlained since the ath ho count of an inter-od demand (4 hos) is twice that of an intra-od demand ( hos) this is reflected in the weights for the weighted-delay situation. For the asymmetric caacity case, the observation is strik-

6 ingly different than the uniform case. The intra-od demands have 6 times more throughut than inter-od demands (Figure 5-a) for the all-to-all traffic case when the caacity of the intra-od links reaches, while the extra-od links caacity was ket fixed at. This gain is in alignment with the secial case we discussed earlier when there is no caacity on extraod links, the most skewed case. From Figures 5b and 5c, we note that the fixed-delay situation also favors intra-od traffic and becomes steady when the extra-od links caacity is three times higher than the intraod link caacity. When we have only one source, it becomes steady when the extra-ods link caacity is twice the caacity of the intra-od links (for the two cases the curves converge when the ratio is equal to 6). 3) Path Diversity: Figures 6 and 7 illustrate ath diversity for the UMP case, measured as the ratio of the overall used aths to the number of overall available aths. We also lot the line corresonding to the single-ath situation. It is worth remembering that for the BMP and EMP cases, all the aths are used (so it would be a to line at a ratio equal to ). Any ath diversity of the solution does not seem to be affected by the secific utility function (TCP behavior). We can see that although ath diversity was allowed, the unconstrained multiath case did not take full advantage of it. This seems to imly that ath diversity is not necessary to maintain the highest throughut. V. CONCLUSION Data center networking is a challenging field of alications of old and new technologies and concets. In this aer, we investigated DCN caacity sharing among cometing greedy demands from a roortional fairness ersective rovided by TCP utility functions in the equilibrium. We resented a generalized formulation of the basic roortional fairness model for DCN allowing multiath forwarding for elastic demands. We also described and evaluated our model under two different TCP utility functions: fixed-delay and weighted-delay. Through a series of scenarios studied on the 4-od fattree toology, we discovered a number of interesting results. In articular, we found out that the weighted-delay utility function gives twice as much imortance to the intra-od traffic, which may be exloited by the data center rovider for high-level scheduling of traffic intensive alications. Another imlication is that for a very large IaaS comosed of numerous virtual machines needing to san more than a od, this bias towards intra-od traffic may be an undesirable behavior, while for a small IaaS this could be a desirable behavior. In our oinion, this should influence the cloud orchestration logic and IaaS management algorithms in VM lacements, to be roerly designed. We also measured the ath diversity of the solutions in the case in which a systematic multiath mode over all demands was not forced, and multile ath selection was left to the congestion control. We found that only a fraction of the aths was eventually chosen for demands. Our study, to the best of our knowledge, was the first one to address the imact of DCN toology design, caacity lanning and multiath forwarding in traffic fairness in DCN fabrics. We believe the results are interesting and deserve further study, esecially grounded on real data as soon as this becomes ublicly accessible to researchers. ACKNOWLEDGEMENT This work was artially suorted by the Systematic FUI 5 roject RAVIR (htt:// by the EU FP7 IRSES MobileCloud Project (Grant No. 6), and by National Science Foundation grant CNS REFERENCES [] M. Al-Fares, A. Loukissas, and A. Vahdat, A scalable, commodity data center network architecture, in ACM SIGCOMM Comuter Communication Review, vol. 38, no. 4. ACM, 8, [] T. Benson, A. Akella, and D. Maltz, Network traffic characteristics of data centers in the wild, in Proceedings of the th annual conference on Internet measurement. ACM,, [3] L. S. Brakmo and L. L. Peterson, TCP vegas: End to end congestion avoidance on a global internet, IEEE Journal on Selected Areas in Communications, vol. 3, no. 8, , 995. [4] A. Ford, C. Raiciu, M. Handley, S. Barre, and J. Iyengar, Architectural guidelines for multiath TCP develoment, RFC68 (March ), www. ietf. ort/rfc/68,. [5] C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu, BCube: a high erformance, server-centric network architecture for modular data centers, in ACM SIGCOMM Comuter Communication Review, vol. 39, no. 4. ACM, 9, [6] F. Kelly, A. Maulloo, and D. Tan, Rate control for communication networks: shadow rices, roortional fairness and stability, Journal of the Oerational Research society, vol. 49, no. 3,. 37 5, 998. [7] R. Khalili, N. Gast, M. Poovic, U. Uadhyay, and J.-Y. Le Boudec, MPTCP is not areto-otimal: erformance issues and a ossible solution, in Proceedings of the 8th international conference on Emerging networking exeriments and technologies. ACM,,.. [8] S. Kunniyur and R. Srikant, End-to-end congestion control schemes: Utility functions, random losses and ecn marks, IEEE/ACM Transactions on Networking, vol., no. 5, , 3. [9] S. H. Low, L. L. Peterson, and L. Wang, Understanding TCP Vegas: a duality model, J. ACM, vol. 49, no.,. 7 35, Mar.. [] R. Mazumdar, L. Mason, and C. Douligeris, Fairness in network otimal flow control: otimality of roduct forms, IEEE Transactions on Communications, vol. 39, no. 5, , 99. [] D. Medhi, Alications with multile arallel flows: Assessing their unfair advantage with roortional fair sharing TCP, in Proc. of IEEE International Conference on Communications (ICC 4), Sydney, Australia, June 4. [] D. Oran, OSI IS-IS intra-domain routing rotocol, 99. [3] M. Pióro and D. Medhi, Routing, flow, and caacity design in communication and comuter networks. Elsevier/Morgan Kaufmann, 4. [4] R. Srikant, The mathematics of Internet congestion control. Birkhauser, 4. [5] R. Stewart, Stream control transmission rotocol, 7. [6] D. Thaler and C. Hos, Multiath issues in unicast and multicast next-ho selection, RFC 99, November, Tech. Re.,. [7] J. Touch and R. Perlman, Transarent interconnection of lots of links (TRILL): Problem and alicability statement, 9. [8] D. Wei, C. Jin, S. Low, and S. Hegde, FAST TCP: Motivation, architecture, algorithms, erformance, IEEE/ACM Transactions on Networking, vol. 4, no. 6, , 6. [9] Q. Zhang, L. Cheng, and R. Boutaba, Cloud comuting: state-of-the-art and research challenges, Journal of Internet Services and Alications, vol., no.,. 7 8,.

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Data Center Network Topologies: FatTree

Data Center Network Topologies: FatTree Data Center Network Topologies: FatTree Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 22, 2014 Slides used and adapted judiciously

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology!

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology! SDN/OenFlow Performance U!, Winterschool, Zurich www.oenflow.org Kurt Baumann kurt.baumann@switch.ch Zurich, 08. March 2013 Outline SDN to OenFlow OenFlow a valid technology! Basic Concet How it works

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Impact of Ethernet Multipath Routing on Data Center Network Consolidations

Impact of Ethernet Multipath Routing on Data Center Network Consolidations Impact of Ethernet Multipath Routing on Data Center Network Consolidations Dallal Belabed, Stefano Secci, Guy Pujolle, Deep Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-7, Paris, France.

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Pricing the Internet. Outline. The Size of the Internet (Cont.) The Size of the Internet

Pricing the Internet. Outline. The Size of the Internet (Cont.) The Size of the Internet Pricing the Internet Costas Courcoubetis thens University of Economics and Business and ICS-FORTH Outline The growth of the internet The role of ricing Some ricing roosals Pricing in a cometitive framework

More information

A Reliability Analysis of Datacenter Topologies

A Reliability Analysis of Datacenter Topologies A Reliability Analysis of Datacenter Topologies Rodrigo S. Couto, Miguel Elias M. Campista, and Luís Henrique M. K. Costa Universidade Federal do Rio de Janeiro - PEE/COPPE/GTA - DEL/POLI Email:{souza,miguel,luish}@gta.ufrj.br

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Non-blocking Switching in the Cloud Computing Era

Non-blocking Switching in the Cloud Computing Era Non-blocking Switching in the Cloud Computing Era Contents 1 Foreword... 3 2 Networks Must Go With the Flow in the Cloud Computing Era... 3 3 Fat-tree Architecture Achieves a Non-blocking Data Center Network...

More information

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014.

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014. IMPROVING LINK UTILIZATION IN DATA CENTER NETWORK USING NEAR OPTIMAL TRAFFIC ENGINEERING TECHNIQUES L. Priyadharshini 1, S. Rajanarayanan, M.E (Ph.D) 2 1 Final Year M.E-CSE, 2 Assistant Professor 1&2 Selvam

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

TRILL Large Layer 2 Network Solution

TRILL Large Layer 2 Network Solution TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit (Please, rovide the manuscrit number!) Authors are encouraged to submit new aers to INFORMS journals by means of a style file temlate, which includes the journal

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

AIN: A Blueprint for an All-IP Data Center Network

AIN: A Blueprint for an All-IP Data Center Network AIN: A Blueprint for an All-IP Data Center Network Vasileios Pappas Hani Jamjoom Dan Williams IBM T. J. Watson Research Center, Yorktown Heights, NY Abstract With both Ethernet and IP powering Data Center

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

Advanced Computer Networks. Datacenter Network Fabric

Advanced Computer Networks. Datacenter Network Fabric Advanced Computer Networks 263 3501 00 Datacenter Network Fabric Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week Today Supercomputer networking

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,

More information

406 IEEE SYSTEMS JOURNAL, VOL. 9, NO. 2, JUNE 2015

406 IEEE SYSTEMS JOURNAL, VOL. 9, NO. 2, JUNE 2015 406 IEEE SYSTEMS JOURNAL, VOL. 9, NO. 2, JUNE 2015 HERO: Hierarchical Energy Otimization or Data Center Networks Yan Zhang, Student Member, IEEE, and Nirwan Ansari, Fellow, IEEE Abstract The raid escalating

More information

Resolving Packet Loss in a Computer Centre Applications

Resolving Packet Loss in a Computer Centre Applications International Journal of Computer Applications (975 8887) olume 74 No., July 3 Resolving Packet Loss in a Computer Centre Applications M. Rajalakshmi C.Angel K. M. Brindha Shree ABSTRACT The modern data

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Jun (Jim) Xu jun.xu@huawei.com Principal Engineer, Futurewei Technologies, Inc.

Jun (Jim) Xu jun.xu@huawei.com Principal Engineer, Futurewei Technologies, Inc. Jun (Jim) Xu jun.xu@huawei.com Princial Engineer, Futurewei Technologies, Inc. Linux K/QEMU Switch/Router NFV Linux IP stack in Kernel ll lications will communicate via socket Limited raw socket alications

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

LuaFlow, an open source Openflow Controller

LuaFlow, an open source Openflow Controller Worksho 2012 LuaFlow, an oen source Oenflow Controller Rahael Amorim rahael@atlantico.com.br rahael.leite@h.com Renato Aguiar aguiar_renato@atlantico.com.br Talk Overview What is OenFlow? How OenFlow Works

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

Generalized DCell Structure for Load-Balanced Data Center Networks

Generalized DCell Structure for Load-Balanced Data Center Networks Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee,JunLi, Xinchao Zhang, Chuanxiong Guo,DavidRincón Swarthmore College, Duke University, Fudan University, Shanghai

More information

Receiver Buffer Requirement for Video Streaming over TCP

Receiver Buffer Requirement for Video Streaming over TCP Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: taehyun.kim@freescale.com

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments

Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments Yueping Zhang NEC Labs America, Inc. Princeton, NJ 854, USA Email: yueping@nec-labs.com

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Wireless Link Scheduling for Data Center Networks

Wireless Link Scheduling for Data Center Networks Wireless Link Scheduling for Data Center Networks Yong Cui Tsinghua University Beijing, 10084, P.R.China cuiyong@tsinghua.edu.cn Hongyi Wang Tsinghua University Beijing, 10084, P.R.China wanghongyi09@mails.

More information

Multi-Constrained Multi-Path Routing for Server-Centric Data Center Networks

Multi-Constrained Multi-Path Routing for Server-Centric Data Center Networks Multi-Constrained Multi-Path Routing for Server-Centric Data Center Networks Kun Qian, ChengChen Hu, Che Zhang, Yadong Zhou MOE Key Lab for Intelligent Networks and Network Security Xi an Jiaotong University

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Data Center Networking with Multipath TCP

Data Center Networking with Multipath TCP Data Center Networking with Multipath TCP Costin Raiciu, Christopher Pluntke, Sebastien Barre, Adam Greenhalgh, Damon Wischik, Mark Handley Hotnets 2010 報 告 者 : 莊 延 安 Outline Introduction Analysis Conclusion

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

Buffer Sizing in 802.11 Wireless Mesh Networks

Buffer Sizing in 802.11 Wireless Mesh Networks Buffer Sizing in 80. Wireless Mesh Networks Kamran Jamshaid, Basem Shihada,LiXia, and Phili Levis MCSE Division, KAUST, Saudi Arabia. {kamran.jamshaid, basem.shihada, li.xia}@kaust.edu.sa Deartment of

More information

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China The current issue and full text archive of this journal is available at www.emeraldinsight.com/2044-1398.htm CFRI 3,4 322 constraints and cororate caital structure: a model Wuxiang Zhu School of Economics

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

The Competitiveness Impacts of Climate Change Mitigation Policies

The Competitiveness Impacts of Climate Change Mitigation Policies The Cometitiveness Imacts of Climate Change Mitigation Policies Joseh E. Aldy William A. Pizer 2011 RPP-2011-08 Regulatory Policy Program Mossavar-Rahmani Center for Business and Government Harvard Kennedy

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Data Center Convergence. Ahmad Zamer, Brocade

Data Center Convergence. Ahmad Zamer, Brocade Ahmad Zamer, Brocade SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information