How To Make A Network More Efficient

Size: px
Start display at page:

Download "How To Make A Network More Efficient"

Transcription

1 Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ ABSTRACT Network virtuliztion is powerful wy to run multiple rchitectures or experiments simultneously on shred infrstructure. However, mking efficient use of the underlying resources requires effective techniques for virtul network emedding mpping ech virtul network to specific nodes nd links in the sustrte network. Since the generl emedding prolem is computtionlly intrctle, pst reserch restricted the prolem spce to llow efficient solutions, or focused on designing heuristic lgorithms. In this pper, we dvocte different pproch: rethinking the design of the sustrte network to enle simpler emedding lgorithms nd more efficient use of resources, without restricting the prolem spce. In prticulr, we simplify virtul link emedding y: i) llowing the sustrte network to split virtul link over multiple sustrte pths nd ii) employing pth migrtion to periodiclly re-optimize the utiliztion of the sustrte network. We lso explore node-mpping lgorithms tht re customized to common clsses of virtulnetwork topologies. Our simultion experiments show tht pth splitting, pth migrtion, nd customized emedding lgorithms enle sustrte network to stisfy much lrger mix of virtul networks. Ctegories nd Suject Descriptors C.2.5 [Computer-Communiction Networks]: Locl nd Wide-Are Networks; G.1.6 [Numericl Anlysis]: Optimiztion Generl Terms Algorithms; Design Keywords Virtul Network Emedding; Pth Splitting; Pth Migrtion; Network Virtuliztion; Optimiztion 1. INTRODUCTION Network virtuliztion hs emerged s powerful wy to llow multiple network rchitectures, ech customized to prticulr ppliction or user community, to run on common sustrte. For exmple, virtuliztion cn enle multiple reserchers to evlute new network protocols simultneously on shred experimentl fcility [3, 7, 2, ]. In ddition, network virtuliztion could serve s the foundtion of future Internet tht llows multiple service providers to offer customized end-to-end services over common physicl infrstructure [14, 27]. For exmple, Voice over IP (VoIP) could run on virtul network tht provides predictle performnce (y llocting dedicted resources nd employing routing protocols tht ensure fst recovery from equipment filures), wheres online nking could run on virtul network tht provides security gurntees (through self-certifying ddresses nd secure routing protocols). Mking efficient use of the sustrte resources requires effective techniques for virtul network (VN) emedding mpping new virtul network, with constrints on the virtul nodes nd links, on to specific physicl nodes nd links in the sustrte network. However, the VN emedding prolem is extremely chllenging, for four min prcticl resons: Node nd link constrints. Ech VN request hs resource constrints, such s processing resources on the nodes nd ndwidth resources on the links, tht the emedding must stisfy. For exmple, to run controlled experiment, resercher my need 1 GHz of CPU for ech virtul node nd Mps for ech virtul link. In ddition, the VN my impose dditionl constrints on node loction or link propgtion dely. For exmple, commercil gming service my need virtul nodes in severl mjor cities, s well s virtul links with propgtion delys less thn 50 msec. The comintion of node nd link constrints mke the emedding prolem computtionlly difficult to solve. Admission control. Since the sustrte resources re limited, some VN requests must e rejected or postponed to void violting the resource gurntees for existing virtul networks. Tht is, the sustrte must reserve node nd link resources, nd perform dmission control on new requests to ensure tht sufficient resources re ville. For exmple, virtul network tht requires 1 GHz of CPU for ech virtul node my e rejected if no physicl nodes hve enough unllocted processing cpcity. Once ccepted, the virtul networks receive their gurnteed resources through scheduling techniques for shring the node nd link resources. Online requests. The VN requests re not known in dvnce, nd my rrive dynmiclly nd sty in the network for n ritrry period of time efore deprting. For exmple, resercher my strt new experiment t ny time, to run for some durtion sed on the needs of the experiment. Similrly, service provider my deploy new service t ny time, nd continue supporting the service indefinitely, possily discontinuing the service when it is no longer profitle. To e prcticl, the emedding lgorithm must hndle VN requests s they rrive, rther thn hndling lrge collection of requests t once. Online prolems re typiclly much ACM SIGCOMM Computer Communiction Review 19 Volume 38, Numer 2, April 08

2 more difficult to solve, ecuse the emedding lgorithm hs little (if ny) visiility into the future request rrivls. Diverse topologies. The virtul networks my hve diverse topologies. For exmple, reserchers my run experiments under vriety of topologies to explore how their protocol performs in different settings. Also, service provider my tilor the virtul-network topology to the ppliction, such s hu-nd-spoke to provide customers with ccess to centrlized server, or tree to distriute streming video to group of receivers. Although virtul networks my hve wide vriety of structures, certin kinds of topologies such s hu-nd-spoke or tree my e especilly common in prctice. Hndling ritrry topologies, while efficiently supporting the most common topologies, introduces n dditionl chllenge for the emedding lgorithm. These four properties mke the VN emedding prolem very difficult. In fct, the prolem is computtionlly intrctle, even if some of these four properties re ignored. Due to the comintion of node nd link constrints, the VN emedding prolem is NP-hrd, even in the offline cse. (For exmple, ssigning virtul nodes to the sustrte network without violting ndwidth constrints cn e reduced to the multiwy seprtor prolem, which is NP-hrd [6].) Even if the loctions of the virtul nodes re pre-determined, emedding the virtul links with ndwidth constrints is still NP-hrd, s discussed in more detil in Section 3. The online prolem is even more difficult to solve. Trditionl techniques for solving online prolems (e.g., dynmic progrmming) re imprcticl here ecuse the properties of incoming VN requests re generlly unpredictle nd the serch spce is prohiitively huge when the sustrte network is lrge. Previous reserch hs ddressed these computtionl chllenges y restricting the prolem spce in one or more dimensions to enle efficient heuristics [31, 13, 23, 26], t the expense of limiting the prcticl pplicility of the solutions. For exmple, the ppers either solve n offline vrint of the prolem [31, 23], consider only ndwidth constrints [13, 23], or do not perform dmission control [31, 23, 13]. In this pper, we tke different pproch we reconsider the cpilities of the underlying sustrte network, to mke the sustrte network more supportive of the VN emedding prolem. This llows us to crete simpler emedding lgorithms tht mke more efficient use of the sustrte resources, without compromising on the four chllenges listed ove. Since network virtuliztion is still in its infncy, we elieve it is importnt to explore how to design the sustrte to est stisfy its gols. In prticulr, we investigte how to simplify the prolem of virtul-link emedding y llowing the sustrte network to mp virtul link to multiple sustrte pths with flexile pth-splitting rtio. In ddition, for efficient hndling of online requests, we llow the sustrte to periodiclly re-optimize the mpping of existing virtul links, either y selecting new underlying pths or dpting the splitting rtios for the existing pths. Flexile pth splitting is relizle in prctice without disrupting the sic properties of link such s predictle ndwidth, propgtion dely, nd in-order pcket delivery, s discussed in more detil in Section 3.3. Flexile pth splitting llows us to mp virtul links to the sustrte in polynomil time, while mking much more efficient use of sustrte ndwidth nd incresing roustness to sustrte filures. This feture llows us Tle 1: Nottions of VN Emedding Prolem G s Sustrte network N s L s A s N A s L P s G v N v L v C v N C v L R N R L Nodes of sustrte network Links of sustrte network Node ttriute of sustrte network Link ttriute of sustrte network Pths on sustrte network Virtul network Nodes of virtul network Links of virtul network Node constrint of sustrte network Link constrint of sustrte network Resources llocted for virtul network nodes Resources llocted for virtul network links VN request 1 c VN request d e Atlnt New Jersey 70 A Sustrte network B C D E c F 60 G H I 60 Figure 1: An exmple of VN emedding to stisfy the first three of the four chllenges listed ove. To ddress the fourth chllenge, we introduce customized node-emedding lgorithms for common topologies like hu-nd-spoke. The reminder of this pper is orgnized s follows. In Section 2, we define the VN emedding prolem nd present simple emedding lgorithm tht does not ssume ny specil cpilities from the sustrte. This lgorithm is similr to the techniques proposed in previous reserch, extended to support dmission control nd online requests. The lgorithm serves s sis of comprison for our new lgorithm for sustrtes tht support pth splitting nd migrtion, s discussed in Section 3. Section 4 presents simultions tht evlute our lgorithm nd quntify the enefits of more flexile sustrte. In Section 5, we present our customized node-emedding lgorithm for hu-nd-spoke topologies, nd promising initil simultion results. Section 6 compres our lgorithms with relted work, nd Section 7 concludes the pper. 2. VIRTUAL NETWORK EMBEDDING In this section, we first descrie the generl VN emedding prolem. Then, we present n originl solution to this prolem without ssuming tht the sustrte cn split virtul link over multiple underlying pths. 2.1 Virtul Network Emedding Prolem Sustrte network. We denote the sustrte network y n undirected grph G s =(N s,l s,a s N,A s L), where N s nd L s refer to the set of nodes nd links, respectively. We use superscript to refer to sustrte or virtul network, nd use 40 d e ACM SIGCOMM Computer Communiction Review Volume 38, Numer 2, April 08

3 suscript to refer to nodes or links, unless otherwise specified. Sustrte nodes nd links re ssocited with their ttriutes, denoted y A s N nd A s L, respectively. In this pper, we consider CPU cpcity nd loction for node ttriutes, nd ndwidth cpcity for link ttriutes. We lso denote y P s the set of ll loop-free pths in the sustrte network. The right side of Figure 1 shows sustrte network. The numers ner the links represent ville ndwidths nd the numers in rectngles re the ville CPU resources t the nodes. Virtul network request. We denote y n undirected grph G v =(N v,l v,cn v,cl) v virtul network request. A VN request typiclly hs link nd node constrints tht re specified in terms of ttriutes of the sustrte network. We denote y CL v nd CN v the set of link nd node constrints, respectively. Figure 1 depicts two VN requests: the VN request 1 requires the ndwidth over the links (, ) nd (, c), nd the CPU resource t ll nodes,,, ndc; the VN request 2 is: connect two nodes d, e N v with constrints tht node d should e in Atlnt (where sustrte nodes D nd G re locted), nd node e should e in New Jersey (where sustrte nodes E nd I re locted), with ten units of ndwidth on the virtul link etween them. VN emedding. A virtul network emedding for VN request is defined s mpping M from G v tosusetof G s, such tht the constrints in G v re stisfied, i.e., M : G v (N, P,R N,R L), where N N s nd P P s, nd R N nd R L re the node nd link resources llocted for the VN requests. The VN network emedding cn e nturlly decomposed into node nd link mpping s follows: Node Mpping: M N :(N v,cn v ) (N,R N ), Link Mpping: M L :(L v,cl) v (P,R L). The right side of Figure 1 shows the VN emedding solutions for the two VN requests. For exmple, the nodes,, nd c in VN request 1 re mpped to the sustrte nodes A, E, nd F, nd the virtul links (, ) nd(, c) rempped to the sustrte pths (A,D,E) nd (A,D,F) with the CPU nd ndwidth constrints ll stisfied. A similr mpping occurs for VN request 2. Ojectives. Our min interest is to propose n efficient emedding lgorithm for the online prolem, where VN requests rrive nd deprt over time. From the sustrte network provider s point of view, nturl ojective of n online emedding lgorithm would e to mximize the revenue. We introduce the notion of revenue tht corresponds to the economic enefit of ccepting VN requests. We denote y R(G v (t)) the revenue of serving the VN requests t time t. Then, our ojective is to mximize the long-term verge revenue, given y the following: P T t=0 lim R(Gv (t)). (1) T T The revenue cn e defined in vrious wys ccording to economic models. In this pper, we focus on ndwidth nd CPU s the min sustrte network resources. Then, nturl choice of the revenue for VN request would e the weighted sum of revenues for ndwidth nd CPU, ech of which is proportionl to the mount of the requested resources. Similr to the work in [31], we introduce tunle weight α tht llows the sustrte provider to strike Req. Queue Reqs postponed Reqs postponed new Reqs. Req comes Node Mpping Req leves fixed nodes Link Mpping time window Emedding output for this time window Figure 2: The seline lgorithm overview lnce etween the reltive costs of the two clsses of resources. Thus, for VN request G v, we define its revenue R(G v (t)) t ny prticulr time t tht the virtul network G v is running s: R(G v (t)) = X X w(l v ) + α CPU(n v ), (2) l v L v n v N v where w(l v )ndcpu(n v ) re the ndwidth nd CPU requirements for the virtul link l v nd the virtul node n v, respectively. We note tht the ndwidth revenue (i.e., the first term in Eqution (2)) is not ffected y the sustrte pths tht the virtul links re mpped to, in prticulr, physicl distnce or the numer of hops of the mpped pths. This seems to e resonle, since VN requests only cre out the stisfiility of their constrints in the sustrte network nd will not py for longer distnce. To chieve the gol in Eqution (1), it is crucil to emed incoming VN requests efficiently, such tht the sustrte resource is minimlly occupied. This is ecuse n inefficient emedding of virtul network t time t my restrict the sustrte s ility to ccept future requests. Section 4.2 shows the reltionship of revenue nd efficiency. 2.2 Bseline VN Emedding Algorithm In this susection, we propose simple emedding lgorithm tht does not exploit ny specil cpilities from the sustrte network. The lgorithm is motivted y the techniques proposed in relted work (e.g., [31, 26]) with extensions to perform dmission control nd hndle online requests. Figure 2 depicts our lgorithm. Our lgorithm collects group of incoming requests during time window nd then tries to llocte sustrte resources to stisfy the constrints required y the requests. Some requests my e deferred due to lck of ndwidth or CPU resources in the sustrte network, nd returned to the request queue. The requests in the queue re dropped if they cnnot e served within some dely, which, specified y request, corresponds to the time tht request is willing to wit. The requests in the request queue re processed gin in the susequent time windows. We process ll VN requests rriving within the time window s well s in the request queue, in decresing order of their revenues. We mp virtul nodes onto the sustrte for ll the considered VN requests, nd then mp the virtul links for the requests tht successfully finish the node mpping stge. An lterntive wy, which we do not choose, ACM SIGCOMM Computer Communiction Review 21 Volume 38, Numer 2, April 08

4 Algorithm 1 Greedy Node Mpping Algorithm Step 1 Sort the requests ccording to their revenues. Step 2 If no requests left, stop. Step 3 Tke one request with the lrgest revenue. Step 4 Find the suset S of sustrte nodes tht stisfy restrictions nd ville CPU cpcity (lrger thn tht specified y the request.) If S ==, store this request in the queue, nd GOTO Step 2. Step 5 For ech virtul node, find the sustrte node in S with the mximum ville resources H (defined in Eqution (3)), nd GOTO Step 2. is to mp the nodes nd links of one request first, efore mpping the other requests. In the seline VN emedding lgorithm, oth methods produce similr mpping results, ut our method is more efficient ecuse of tch processing in the node/link mpping stge. The optiml emedding lgorithm is computtionlly intrctle s discussed in Section 1. Our seline VN emedding lgorithm heuristiclly tries to chieve the gol in Eqution (1) over ech time window. Indeed, the lgorithm contriutes to instntneous revenue mximiztion y giving higher priority to the requests with more revenue nd ccepting s mny requests s possile in the node mpping. Additionlly, the lgorithm tends to mke efficient utiliztion of the sustrte ndwidth resources y mpping virtul links to shortest pths in the sustrte network, leving more resources for future requests Node Mpping Algorithm We employ greedy node mpping lgorithm, since it is computtionlly too expensive to employ other strtegies, such s itertive methods [23] nd simulted nneling [13, ]. The motivtion of the greedy lgorithm is to mp the virtul nodes to the sustrte nodes with the mximum sustrte resources so s to minimize the use of the resources t the ottleneck nodes/links [31]. This is eneficil to future requests which require specific sustrte nodes with scrce resources. In our lgorithm, we collect ll outstnding requests, nd then mp ll the virtul nodes in these requests to the sustrte nodes. VN requests sometimes impose some restrictions on their nodes. The exmples of node restrictions include geogrphic loction nd specil functionlity t the sustrte node. These node restrictions re quite common in prctice, e.g., servers ner their customers in content-delivery service, progrmmle routers, nd node with Internet-2 network connectivity. Requests with restrictions reduce the serch spce for plcing the virtul nodes (Step 4). For exmple, loction-specific requests usully limit their virtul nodes to prticulr geogrphic regions. Then, we keep trck of the ville node/link resources of the sustrte network. Note tht for sustrte node n s N s,wedonotusecpu(n s ) lone s the metric of ville resource, ecuse we not only wnt to mke sure tht there is enough CPU cpcity ville, ut lso consider ndwidth cpcity to prepre for the susequent link mpping stge. Therefore, we define the mount of ville resources for sustrte node n s y: X H(n s )=CPU(n s ) w(l s ), (3) l s L(n s ) where L(n s ) is the set of ll djcent sustrte links of n s, Algorithm 2 Link Mpping Algorithm Step 1 Sort the requests tht successfully completed the node-mpping stge y their revenues. Step 2 If no requests left, stop. Step 3 Tke one request with the lrgest revenue. Step 4 For ech virtul link of the request, we serch the k-shortest pths for incresing k, nd stop the serch if we cn find one with enough ndwidth cpcity. Step 5 If fil in Step 3 for some virtul link, then defer this request, nd store it in the request queue. Step 6 GOTO Step 2. CPU(n s ) is the remining CPU resource of n s,ndw(l s ) is the unoccupied ndwidth resource for the sustrte link l s. The definition in (3) is similr to tht in [31] with slight difference tht the numer of virtul links nd nodes re used to mesure the resources, not the ctul mount of CPU nd ndwidth resources. With this definition, for virtul node, we find the sustrte node with the mximum ville resources (Step 5) Link Mpping Algorithm When the sustrte nodes re selected for mpping, we mp the virtul links to specific sustrte links. Finding n optiml mpping from virtul link to single sustrte pth with fixed node mpping reduces to the Unsplittle Flow Prolem (UFP), which is NP-hrd [21, 22]. Therefore, we use the k-shortest pth lgorithm s n pproximtion pproch in order to minimize ndwidth consumption y the virtul network. We serch the k-shortest pths for incresing vlues of k, until we find pth which hs enough ndwidth to mp the corresponding virtul link. Our k-shortest-pth linkmpping lgorithm cn e solved in O(M +N log N +k) time in sustrte network with N nodes nd M links [12]. Both for computtionl efficiency nd efficient use of sustrte resources, k should e kept smll. 3. PATH SPLITTING AND MIGRATION Restricting ech virtul link to single sustrte pth mkes the link-emedding prolem computtionlly intrctle, nd the resulting emeddings inefficient. In this section, we first rgue tht the sustrte network should support flexile splitting of virtul links over multiple sustrte pths, nd present new link-emedding lgorithm tht cpitlizes on the flexiility. Next, we descrie how to periodiclly re-optimize the mpping of existing virtul links to llow the sustrte network to ccept more new requests. Finlly, we explin how sustrte support for pth splitting nd migrtion cn e implemented in prctice. 3.1 Pth Splitting Motivtion for Flexile Pth Splitting To motivte sustrte support for pth splitting, consider the exmple in Figure 3. Initilly the sustrte network runs single virtul network with three virtul nodes nd two virtul links tht ech require units of ndwidth. The virtul nodes re mpped to physicl nodes A, E, nd F, nd the two virtul links re mpped to the pths (A,D,E) nd (A,D,F), s shown in the lower left prt of the figure. Now, suppose new VN request rrives with single virtul ACM SIGCOMM Computer Communiction Review 22 Volume 38, Numer 2, April 08

5 Existing VN Req 1 A B D E c F G H I Sustrte network t time t-1 c C New rriving VN Req 2 d 30 Accept A e Without pth splitting Pth splitting B C Reject D E c F G H I Sustrte network t time t Figure 3: Illustrtion of the enefit of pth splitting link tht requires 30 units of ndwidth. Unfortuntely, no one pth in the sustrte network cn ccommodte the new request. However, the new VN could e mpped to nodes D nd E, if the sustrte could llocte units of ndwidth onthepth(d,e)ndonthepth(d,g,h,i,e).tht is, directing two-thirds of the trffic over the (D, E) pth nd one-third over the (D, G, H, I, E) pth would llow the sustrte to ccept the second request. Pth splitting enles etter resource utiliztion y hrnessing the smll pieces of ville ndwidth, llowing the sustrte to ccept more VN requests. In ddition, flexile pth splitting mkes the link-emedding prolem computtionlly trctle. A virtul link l with some cpcity constrint, sy C l, is mpped into multiple pths in the sustrte network, such tht the sum of reserved end-toend ndwidth long the multiple pths is equl to C l.the division of trffic over the sustrte pths is specified s splitting rtio, such s rtio of 2:1 in the exmple in Figure 3. Under flexile splitting over multiple pths, the link-emedding prolem cn e reduced to the Multicommodity Flow Prolem (MFP) [5], which cn e solved in polynomil time. The enefits of hving multiple pths hve een estlished in other contexts, such s lod lncing nd reliility. In fct, even hving just two pths cn significntly reduce the mximum lod on network, compred to solutions tht limit the trffic flow to single pth [24, 19]. Hving multiple pths lso enles fster recovery from network filures. For exmple, if link or node fils, the network cn quickly switch the ffected trffic to other pths simply y chnging the splitting rtios. In contrst, in singlepth setting, filure requires estlishing new end-toend pth, leding to more severe service disruption. Due to the computtionl, performnce, nd reliility enefits, we elieve flexile pth splitting should e key feture in future virtulized network infrstructures, nd the rest of this pper will provide the lgorithmic nd simultion-sed evidence to support this view Link Mpping Algorithm with Pth Splitting We descrie the link mpping lgorithm supporting pth splitting to enle efficient solutions in Algorithm 3. In Step 1, we first construct liner constrints for the virtul links. For simplicity, consider request with only one link l v with the cpcity constrint C, where two end nodes of l v re denoted y n v 1 nd n v 2. We denote y M N (n v 1)=n s 1 nd M N (n v 2)=n s 2 the sustrte nodes chosen for n v 1 nd n v 2, Req. Queue new Reqs. Reqs postponed Reqs postponed Reqs postponed Req comes Link Mpping Link Mpping Node Mpping Req leves fixed nodes Pth Migrtion time window Unsplittle Node Rempping Splittle Emedding output for this time window Figure 4: Algorithm for pth splitting nd migrtion respectively, y the node-mpping lgorithm in Section 2.2. The pir of sustrte nodes (n s 1, n s 2) is commodity, nd finding multiple sustrte pths for l v is equivlent to finding flows from source n s 1 to destintion n s 2 in the sustrte network with ville ndwidth on the sustrte links. Thus, group of, sy r, virtul links genertes group of r commodities. The lgorithm tries to find ll the pths for r commodities sed on the following liner constrints: l s L s, rx f(c i,l s ) w(l s ) (4) i=1 where f(c i,l s ) is the ndwidth on the sustrte link l s tht we llocte to commodity c i, or its corresponding virtul link. After generting the r commodities nd the liner constrints, we solve the resulting multicommodity flow prolem (Step 2). Even with flexile pth splitting, the MFP prolem my not hve fesile solution ecuse one or more sustrte links do not hve enough ville cpcity. The lgorithm revisits the node-mpping decisions for these virtul links (Steps 4, 5, nd 6). The filure in the MFP computtion implies tht one or more sustrte links violte the liner constrints in Eqution (4). Fortuntely, the MFP lgorithm cn esily output the sustrte links tht violte the constrint, s well s the extent of the violtion. The noderempping stge focuses its ttention on the sustrte link with the lrgest violtion (ottleneck link), i.e., the l s L s with the highest vlue of P r i=1 f(ci,ls ) w(l s ). We rndomly choose one virtul link tht is originlly mpped to the pth including the ottleneck link, nd mp one end of this virtul link to nother sustrte node with mximum remining resource H (defined in Eqution (3)), in order to void occupying this ottleneck link. The node rempping revisits the node mpping decision for the new requests. However, the rempping process does not chnge the resource lloction for virtul networks lredy running in the sustrte. We try this node rempping for predefined numer of times T try nd mke sure ech time we choose different ottleneck link. If the MFP is still infesile fter T try trils, we defer the request tht requires the most ndwidth on the ottleneck sustrte link nd return ACM SIGCOMM Computer Communiction Review 23 Volume 38, Numer 2, April 08

6 Algorithm 3 Link Mpping Algorithm for Requests with Pth Splitting MFP Computtion: Step 1 For ll requests with splittility, construct liner constrint on the commodities for ech sustrte link. Step 2 Solve MFP (Multicommodity Flow Prolem). Step 3 If fesile, stop. Node Rempping: Step 4 If infesile, find the ottleneck sustrte link. Step 5 Rndomly choose one virtul link tht is originlly mpped t the ottleneck link, pick one end of the virtul link nd mp it to nother sustrte node with mximum remining resource H (defined in Eqution (3)). Then GOTO Step 2 with new liner constrints. Step 6 If rempping of virtul nodes for T try times does not produce fesile solution, eliminte one of the VN requests hving the lrgest impct on infesiility. Then, construct the liner constrins only with the remining requests, nd GOTO Step 2. it to the request queue, nd then try to solve the MFP with the remining requests gin. Lrger vlues of T try increse the computtionl overhed ut improve the likelihood of finding successful emedding. In prctice, some virtul networks my hve strict requirements tht preclude pth splitting As such, we envision our lgorithm would hndle mix of oth kinds of VN requests. As illustrted in Figure 4, we first pply Algorithm 2 for requests tht do not llow pth splitting, efore pplying Algorithm 3 for requests tht llow pth splitting. Unfortuntely, node-rempping is difficult to perform for the unsplittle virtul links, since the emedding lgorithm processes one virtul link t time. For the collection of virtul links tht fil to find suitle pth, we cnnot esily identify the most congested sustrte link in computtionlly efficient mnner. To mintin computtionl simplicity, we do not consider node-rempping for these requests. In the evlution, we quntify the enefits of pth splitting, with nd without the node-rempping step. 3.2 Pth Migrtion To del with the online nture of the VN emedding prolem, we introduce the ide of pth migrtion, i.e., chnging the route or splitting rtio of virtul link. This turns out to e nother dvntge of llowing multipth in the sustrte network Motivtion for Pth Migrtion Since VN requests rrive nd deprt over time, the sustrte network cn esily drift into n inefficient configurtion, where resources re incresingly frgmented, forcing the sustrte to reject future requests or route new virtul links over more expensive (longer) pths. Theoreticlly, one could try to ddress these chllenges with predictive models of future requests, coupled with mthemticl techniques like dynmic progrmming. However, the rrivl nd deprture of requests is unpredictle nd the underlying serch spce is too lrge for dynmic progrmming to e prcticl. Insted, we rgue the sustrte network should e le to relnce the mpping of virtul networks to mke more efficient use of the sustrte resources nd to mximize the A Existing VN Req 1 B C 5 5 d D E A D 30 c F Sustrte network t time t-1 c New rriving Without VN Req 2 d 30 migrtion e Reject Accept With migrtion c B F Sustrte network t time t Figure 5: Illustrtion of the enefit of migrtion chnce of ccepting future requests. In prticulr, the ility to migrte virtul links to different sustrte pths while keeping the node mpping intct cn further improve the sustrte s ility to ccept future requests. To motivte sustrte support for pth migrtion, consider the exmple in Figure 5. Initilly the sustrte networks runs single virtul network with three nodes (mpped to physicl nodes A, E, nd F) nd two virtul links tht ech require units of ndwidth (mpped to the pths (A,D,E) nd (A,D,F)). Now, suppose new VN request rrives with single virtul link tht requires 30 units of ndwidth. Unfortuntely, no pir of nodes in the sustrte network cn ccommodte the new request, even if pth splitting is permitted. For exmple, in the left side of Figure 5, nodes D nd E hve pth (D,E) with units of ndwidth, pth (D,B,C,E) with 5 units of ndwidth, nd pth (D, A, B, C, E) with 0 units of ndwidth not enough to support virtul link requiring 30 units of ndwidth. However, migrting some of the trffic for the first virtul network to different pth would enle the sustrte to ccept the new request. In prticulr, the sustrte could crry hlf of the trffic for virtul link (,) on new pth (A, B, C, E) to free up dditionl cpcity on the sustrte link (D, E). Then, the second virtul network cn hve link (d,e) mpped to sustrte pth (D,E) Migrtion Algorithm In the migrtion lgorithm descried in Algorithm 4, we fix the node mpping of the virtul networks lredy running on the sustrte. We perform pth migrtion y rerunning the link-mpping lgorithm with requests tht llow pth splitting (Algorithm 3). Pth migrtion is performed y either chnging the splitting rtios for the existing pths or selecting new underlying pths. If only djusting the splitting rtios is llowle rther thn setting up ny new pths, we hve to mke sure tht the flows coming from commodity only trverse the sustrte pths originlly tken in the link mpping stge. Thus, we dd the following liner constrints to the constrints in Eqution (4) (Step 2): f(c i,l s )=0, l s L s, c i,l s / P s (c i), (5) where P s (c i) is the set of originl sustrte pths the virtul link (or corresponding commodity c i) ws mpped to. Then we solve the MFP prolem gin with the new constrints of oth Equtions (4) nd (5). If we re llowed to select C E e ACM SIGCOMM Computer Communiction Review 24 Volume 38, Numer 2, April 08

7 Algorithm 4 Pth Migrtion Algorithm For ll the served requests, Step 1 Select the request set S whose durtions re lrger thn threshold T dur. Step 2 If only chnging splitting rtio is llowed, dd liner constrints (Eqution (5)), so tht ech virtul link is forced to e mpped to the pths it originlly tke in the link mpping step. If setting up new pth is lso llowed, skip this step. Step 3 Rerun the link mpping lgorithm with pth splitting, nd migrte the relted pths. new underlying pths, we rerun the link-mpping lgorithm with only the constrints in Eqution (4). Pth migrtion llows us to (periodiclly) tret the online emedding prolem s n offline prolem, to cpitlize on the efficiency gins tht re possile when hndling lrge collection of requests together. As such, we expect the enefits of pth migrtion to e highest when the time window (for grouping requests) is smll, nd less significnt s the window grows lrger. In prctice, migrting pths introduces overhed to estlish new pths, switch the trffic onto the new pths, nd ter down the old pths. As such, the enefits of pth migrtion should e weighed ginst the overheds. To illustrte this, we expect tht VN requests would e quite diverse in their durtions, which corresponds to their running time in the sustrte network, rnging from few months to severl hours. As n exmple, content distriution network like Akmi [1] my run infinitely, wheres n impromptu conference or video gme my lst for few hours. The lgorithm should not migrte short-lived virtul networks tht re likely to exit the system soon fter the migrtion completes. Thus, our lgorithm only considers the requests whose durtions re lrger thn some threshold T dur (Step 1). Fortuntely, migrting long-running virtul networks should offer mple enefits in prctice, since mny shortlived virtul networks will come nd go while they run. Virtul-network requests would indicte their likely durtion, or we cn infer tht virtul network tht hs run for long time is likely to continue running for long time, nlogous to previous reserch on migrtion in the context of jo scheduling [17]. 3.3 Implementtion Issues Pth splitting cn e implemented in the sustrte network without significnt overhed. When the virtul node directs pcket over the virtul link, the sustrte sends the pcket over one of the pths sed on the trget splitting rtio. Pth splitting my cuse out-of-order pcket delivery. Some virtul networks do not cre out out-of-order pckets; or they cn reorder the out-of-order pckets y themselves, e.g. those pplictions with only UDP flows. We cn lso mke the virtul networks olivious to the trffic splitting y preventing the disruptions of out-of-order pckets in the sustrte, e.g., using hsh-sed splitting. Out-of-order delivery is primry concern for pckets in the sme flow group of pckets etween the sme end hosts or prt of the sme trnsport-level connection. Hshsed splitting prevents out-of-order delivery y directing ll pckets from the sme flow to the sme pth. The sustrte router first divides the hsh spce into weighted prtitions tht ech correspond to one sustrte pth. Then, we pply hshing to the pckets sed on their heder its nd forwrd the pckets to the corresponding sustrte pth. This hsh-sed scheme is efficient nd, in fct, is widely used in IP networks to split trffic evenly over equl-cost multipth [, 8]. For those non-ip pckets, the virtul network would need to tell the sustrte which its in the heder indicte pckets in the sme flow, so tht the hshing cn e sed on those fields. There re lso techniques for more generlized, enhnced multipth routing to relize pth splitting, see e.g., [18]. Pth migrtion is closely relted to pth splitting, nd is esily implemented either y selecting new underlying pths or dpting the splitting rtios for the existing pths. In ddition, pth migrtion will not cuse significnt service disruptions for two resons: (i) we only need slight chnge of flow splitting rtio for the lredy-existing pths; (ii) we cn crete the new pth in dvnce efore moving the trffic to void service disruption. The sustrte router cn use consistent hshing to minimize the frction of flows tht must chnge pths when the splitting rtio chnges or new pths re creted [9]. Therefore, pth migrtion should not unduly influence the performnce experienced y the virtul network. In our current work, we hve focused on pth migrtion while keeping the node-mpping intct, to minimize the disruption experienced y the virtul networks. However, in ongoing work we pln to explore node migrtion to provide even greter flexiility in hndling new VN requests. We elieve node migrtion should e fesile for severl resons. First, long-running services usully hve their own mintennce windows, where they drin trffic off server to upgrde the softwre. These mintennce windows cn e used for node migrtion. Second, with mple wrning nd prior plnning, we cn minimize the negtive effects of node migrtion on n ongoing service. Node migrtion cn e done quite quickly in prctice, e.g., within few seconds [29], nd the virtul node cn continue running in the old loction until the migrtion completes. 4. PERFORMANCE EVALUATION In this section, we first descrie the performnce evlution environment, nd then present our min evlution results. Our evlution focuses primrily on quntifying the enefits of sustrte support for flexile pth splitting nd migrtion in the VN emedding prolem. 4.1 Evlution Environment We implemented VN emedding simultor (pulicly ville t [4]) to evlute our emedding lgorithm nd the dvntges of pth splitting nd migrtion. The ctul chrcteristics of sustrte nd virtul networks re not well understood since network virtuliztion is still n open field. Therefore, we use synthetic networks to study the trends nd quntify the enefits of pth splitting nd migrtion. Sustrte network. We use the GT-ITM tool [30] to generte sustrte network topology. The GT-ITM tool hs een populrly used in reserch tht requires prcticl network topology genertion. The sustrte network is configured to hve 0 nodes nd round 500 links, scle tht corresponds to medium-sized ISP The CPU resources t nodes nd the link ndwidths t links follow uniform distriution from 0 to 0 units. ACM SIGCOMM Computer Communiction Review 25 Volume 38, Numer 2, April 08

8 Averge Revenue Over Time E[w] = 50, Bseline Algorithm E[w] = 50, Pth Splitting E[w] = 50, Pth Splitting & Migrtion E[w] = 25 Averge Revenue Over Time Bseline Algorithm Pth Splitting Pth Splitting & Migrtion Averge Revenue Over Time Ttry = 0 Ttry = 1 Ttry = Splitting Rtio (%) Figure 6: Revenue chnges with RPS(%) (E[CPU]:0, DELAY:3, α:0, T try:1) Splitting Rtio (%) Figure 7: Revenue chnges with RPS(%) (E[BW]:50, E[CPU]:0, DELAY:6, α:0, T try:1) Splitting Rtio (%) Figure 8: Influence of Node Rempping (E[BW]:50, E[CPU]:0, DE- LAY:3, α:0) Virtul network request. In one VN request, the numer of VN nodes is rndomly determined y uniform distriution etween 2 nd in Figures 6 12, following similr setup to previous work [31]. We lso test lrger requests whose numer of re chosen uniformly etween 2 nd in Figure 11. Ech pir of virtul nodes re rndomly connected with proility 0.5. This mens tht for n-node virtul network, we hve n(n 1)/4 links on verge. The rrivls of VN requests re modeled y Poisson process with men five requests per time window. The durtion of the requests follows n exponentil distriution with time windows on verge. We run ll of our simultions for 500 time windows, which corresponds to out 2500 requests on verge in one instnce of simultion. The prmeters nd their symols tht we vry in ll our simultions re summrized in the following tle: E[CPU] verge CPU requirement on virtul node E[BW] verge ndwidth requirement on virtul link RPS(%) percentge of the requests llowing pth splitting DELAY time request is willing to wit (see Section 2.2) α weight constnt in revenue function (Eqution (2)) T try numer of rounds in node rempping Comprison method. Compring our lgorithm with previous work is difficult ecuse these erlier emedding lgorithms do not strt with the sme prolem formultion. They do not hndle one or more of the first three chllenges in Section 1 (i.e., comined node nd link constrints, dmission control, or online requests). Insted, we use the lgorithm in Section 2.2, which emodies mny of the key ides from prior work, s seline for comprison. 4.2 Evlution Results Our evlution results quntify the enefits of pth splitting nd migrtion in vrious environments. We present our simultion results y summrizing the key oservtions. (1) More requests llowing pth splitting leds to lrger revenues, which is further improved y pth migrtion. Figures 6 shows the long-term verge revenue with incresing percentges of the requests permitting pth splitting for different verge link ndwidth requirements. In these experiments, we remove the influence of CPU in the constrint nd the revenue (i.e., E[CPU]=0 nd α=0). Ech request which cnnot e served immeditely will wit for t most 3 time windows in the queue (DELAY=3) nd node rempping in Algorithm 3 is tried just once, i.e., T try =1. In Figure 6, the performnce of the seline lgorithm in Section 2 does not depend on RPS(%), since the seline lgorithm mps ech virtul link into singlepthin the sustrte network. However, with more requests llowing pth splitting, the sustrte network resources re efficiently utilized t current time window, which enles the system to ccept more requests, leding to n increse in the verge revenue. When ll the requests llow pth splitting, our lgorithm chieves out 1% revenue increse over the seline lgorithm. Even with hlf of the requests permitting pth splitting, we still gin out 65% revenue increse. Figure 6 lso shows tht pth migrtion further increses the revenue. For exmple, when RPS(%)=0, our lgorithm with pth migrtion chieves dditionl % revenue increse over the lgorithm only with pth splitting. This implies tht pth splitting is dominnt fctor in the revenue increse, nd pth migrtion further uilds on pth splitting to dpt to the online VN emedding prolem more flexily. More enefits re expected to e otined y node migrtion, t the expense of more service disruption. When the ndwidth requirement is low (E[BW]=25) nd sustrte resources re mple, we cn ccept ll the requests for oth lgorithms. Nturlly, the revenue remins the sme, whether the requests llow pth splitting or not. We will show lter in Figure 12 tht in this cse, our lgorithm reduces cost more thn the seline lgorithm. Note tht in Figure 6, the revenues differ when E = 25 nd E =50 due to its dependence on the mount of required (verge) ndwidth in the requests. (2) Pth splitting still increses revenue when CPU requirements re considered. Figure 9 shows the longterm revenues with oth CPU nd ndwidth requirements, where the verge CPU requirement is set to e 25 nd other prmeters re the sme s those in Figure 6. We oserve similr increse in revenue from pth splitting. We chieve more thn 0% revenue increse over the seline lgorithm, when RPS(%)=0; nd out 50% when RPS(%)=50. However, the enefits from migrtion re less drmtic. This is due to the fct tht we only employ pth migrtion, which does not offer ny enefits when the node CPU resource is the ottleneck. Note tht revenue increse with the CPU requirement is less thn tht without the CPU requirement. This is nticipted, ecuse when ACM SIGCOMM Computer Communiction Review 26 Volume 38, Numer 2, April 08

9 Averge Revenue Over Time Bseline Algorithm Pth Splitting Pth Splitting & Migrtion Splitting Rtio (%) Averge Revenue Over Time Bseline Algorithm Pth Splitting Pth Splitting & Migrtion Weight Constnt in Revenue () Averge Revenue Over Time Bseline Algorithm Pth Splitting Pth Splitting & Migrtion Splitting Rtio (%) Figure 9: Effect of CPU requirement (E[BW]:50, E[CPU]:25, DELAY:3, α:0, T try:1) Figure : Effect of α (RPS(%):0, E[BW]:50, E[CPU]:25, DELAY:3, T try:1) Figure 11: Effect of lrger virtul networks (nodes:2-, E[BW]:25, E[CPU]:0, α:0, T try:1) CPU requirements tends to reduce the numer of ccepted requests. To further evlute effects of CPU resource constrints, in Figure, we hve tested different weight constnts α in the revenue definition (Eqution (2)) while keeping ll the other prmeters the sme. The enefits of pth splitting over the seline lgorithm decrese s α increses, since pth splitting nd migrtion only improve the ndwidth resource utiliztion in the link mpping stge. For exmple, when CPU nd ndwidth re lmost eqully evluted in the revenue function, we chieve more thn 0% of revenue increse over the seline lgorithm; when CPU resource ecomes the min fctor (α=1), our lgorithm with pth splitting still chieves round 60% more revenue thn the seline lgorithm. (3) Node rempping contriutes modestly to revenue increse. Revenue is not significntly influenced y the dely we choose. All previous experiments were mde with T try =1, i.e., we rn one round of node rempping in Algorithm 3. In Figure 8, we show the result of the pth splitting lgorithm without node rempping (i.e., T try = 0), where the revenue only decreses y 4%. This implies tht the revenue increse shown in erlier simultions minly comes from pth splitting itself. With incresing vlues of T try, we could chieve more sustntil increses in revenue t the expense of computtion time, ecuse we must rerun the link mpping stge for T try times more thn the pth splitting solution without node rempping. Figure 7 shows tht our enefits of pth splitting nd migrtion re not influenced y dely we choose (DELAY=3), since the result for DELAY=6 is similr to Figure 6 where DE- LAY=3. This is ecuse the sustrte resources re lmost fully used with requests coming nd deprting over time, so tht the deferred requests cnnot e ccepted even if it wits for more time. (4) Pth splitting nd migrtion cn still help improve revenue for lrger requests. Figure 11 exmines the enefits of pth splitting nd migrtion for lrger requests, i.e., the numer of nodes in ech VN request uniformly rnges etween 2 nd. We first keep the totl mount of resource requirement the sme s tht in the erlier experiments. Figure 11 shows tht with ll the requests llowing pth splitting, the revenue increses y 50% with pth splitting. This enefit is less thn the 1% increse of revenue in Figure 6 with E[BW] = 50. This is due to the fct tht without chnge of totl resource requirement, lrger requests led to more links nd thus less ndwidth per link. In other experiments when we increse the scle of requests without chnging the verge ndwidth per link, then we re le to chieve more enefits. We omit this result due to spce limittion. Averge Bndwidth Cost Over Time Bseline Algorithm Pth Splitting Pth Splitting & Migrtion Splitting Rtio (%) Figure 12: Effect on cost (E[BW]:25, E[CPU]:0, DELAY:3, α:0, T try:1) (5) Without dmission control, pth splitting nd migrtion reduces cost. In cse when the sustrte network resources re sufficient, ut the numer of incoming VN requests per time-window is smll, we cn proly service ll the requests, irrespective of using of pth splitting or not, i.e., the long-term revenue chieved will e the sme for the seline lgorithm nd the lgorithm with pth splitting. However, the lgorithm llowing pth splittility sves sustrte network resources. First, we discuss notions of cost to quntify efficiency in resource utiliztion. The ndwidth cost for VN request should e defined to reflect the entire mount of ndwidth used to mp the request to the physicl sustrte network. For single virtul link in the request, it would e nturl to use its required ndwidth multiplied y the length of the sustrte pth tht the virtul link is mpped to. With pth splitting, we count the ndwidth llocted on ech pth of the virtul link nd sum them up. Thus, we define ACM SIGCOMM Computer Communiction Review 27 Volume 38, Numer 2, April 08

10 Algorithm 5 Customized Node Mpping Algorithm for Requests with Hu-nd-spoke Steps 1, 2, nd 3: Sme s in Greedy Node Mpping (Algorithm 1). Step 4 If the request hs hu-nd-spoke topology, 4.1 For ech hu node, find the sustrte node with the mximum ville resource in S. 4.2 For ech spoke node, find the shortest pth etweensustrtenodeins nd the sustrte node mpped to the corresponding hu node. else, pply Step 4 in Greedy Node Mpping. Step 5 Sme s in Greedy Node Mpping. the cost of virtul network G v y: C w (G v )= X X hops(p)w(p, l v ), (6) l v L v p P s (l v ) where P s (l v ) is the pth(s) the virtul link l v is mpped on, hops(p) is the numer of hops of pth p, ndw(p, l v ) is the mount of ndwidth llocted to tht virtul link. Similrly, we define the CPU cost of virtul network G v y: C CPU(G v )= X CPU(n v ), (7) n v N v where CPU(n v ) is the mount of CPU virtul node n v requires. In Figure 12, we hve simulted the cse where the resource requirement of requests is low (E[BW]=25, E[CPU]=0), where other prmeters re the sme s efore, i.e., (DE- LAY=3, α=1, T try=1). We oserve tht with the increse in percentge of requests permitting pth splitting, we reduce the ndwidth cost C w over the seline lgorithm y mking more efficient use of the network. When RPS(%)=0, we reduce % cost thn the seline lgorithm. Pth migrtion further reduces the ndwidth cost y 7%. The CPU cost C CPU remins the sme (C CPU =3.1) with the increse of RPS(%), since ll the requests re ccepted, whether they llow pth splitting or not. 5. CUSTOMIZED NODE MAPPING Although virtul networks my hve ritrry topologies, we expect some clsses of topologies to e reltively common, since they meet the needs of the key pplictions in network virtuliztion. For exmple, hu-nd-spoke topology is commonly used to connect multiple sites to centrlized server, e.g., gming nd CDN (Content Distriution Network), nd tree topology is commonly used to distriute content efficiently to lrge collection of receivers, e.g. multicst distriution of IPTV. The populrity of smll set of topologicl structures cn e leverged for etter solutions to the VN emedding prolem. In our ongoing work, we present node-mpping techniques tht re customized to specific topologies, strting with the simple hu-nd-spoke topology. As n exmple, we propose customized node mpping (which is extended from the Greedy Node Mpping in Algorithm 1) with hu-nd-spoke topologies, s summrized in Algorithm 5. The customized node mpping lgorithm differs from the greedy node mpping in tht we choose the sustrte nodes differently for hu nd spokes nodes. The mximum ville resource is llocted only for the hu nodes (Step 4.1), nd the spoke nodes re mpped into the sustrte nodes tht hve the shortest pth to the sustrte node hosting the virtul hu node (Step 4.2). This is motivted y the fct tht the hu node hndles much more trffic thn the individul spokes. In Step 4.2, we lso chieve significnt cost reduction, since cost is generlly proportionl to the distnce (i.e., numer of hops), wheres the greedy lgorithm lloctes lrge sustrte resource to unimportnt nodes (i.e., the spokes). The wsted resources keep the greedy node mpping lgorithm from leving enough resources ville to stisfy the future requests. We did the evlution on our customized node mpping lgorithm with the requests of hu-nd-spoke topologies nd compre it with the greedy node mpping. Our preliminry experiments show tht tht our customized lgorithm performs etter thn the greedy lgorithm when the percentge of hu-nd-spoke topologies mong ll the requests increses. By tking dvntge of the topology informtion, our customized lgorithm lloctes the hu-nd-spoke request more efficiently thn the greedy lgorithm. Thus, our lgorithm cn llow more requests nd chieve higher verge revenue over time. This result is omitted due to pge limit. We re currently exploring nd evluting other lgorithms tht re customized for different common topologies, like trees. 6. RELATED WORK Previous reserch hs explored how to emed Virtul Privte Networks (VPNs) in shred provider topology [11, 16]. VPNs usully hs stndrd topology, such s full mesh nd hu-nd-spoke [25]. The resource constrints in VPN re typiclly just ndwidth requirements, specified y trffic mtrix (i.e., the trffic volume for ech pir of nodes), rther thn node constrints (e.g., processing resources). VN emedding prolem is different with VPN design prolem in tht VN emedding prolem must del with oth node nd link constrints for ritrry topology. Relted work on VN emedding ddresses the hrdness of the prolem y relxing one or more of the key properties of the prolem. These key properties include (i) whether requests re processed online or not, (ii) whether the requests hve link constrints, node constrints, or oth, (iii) whether dmission control is performed to reject requests when resources re insufficient, nd (iv) wht virtul topologies re supported. Severl of the previous studies focus on the offline prolem, where ll VN requests re known in dvnce. Zhu nd Ammr [31] ssume tht the sustrte network resources re unlimited, nd im t chieving lod lncing in the sustrte network without the need for dmission control. The VN-emedding prolem for the requests with generl topology is solved y sudividing the requests into multiple str topologies to llocte more sustrte resource to the center of ech decomposed str topology. Our greedy node emedding lgorithm (Algorithm 1) is sed on the key ide of this pper. Lu nd Turner [23] lso consider n offline prolem for only single virtul network with ckone-str topology, where their gol is to minimize the cost. They ssume tht only ndwidth constrints re imposed, nd the sustrte network resources re unlimited with no dmission control needed. In regrd to the online prolem, Fn nd Ammr [13] consider dynmic topology reconfigurtion policies for virtul ACM SIGCOMM Computer Communiction Review 28 Volume 38, Numer 2, April 08

11 networks with dynmic communiction requirements, ut no considertion of the node constrints such s CPU. They lso ssume tht sustrte network resources re unlimited to ccept ll requests (i.e., no dmission control) nd try to find strtegy to minimize cost. Zhu nd Ammr [31] lso solve the online prolem y reclculting the whole emedding solution periodiclly. The Assign lgorithm [26] used in Emul tested considers the online emedding prolem with the ndwidth constrint. The node constrint in Emul is provided s the exclusive use of nodes, i.e., different virtul networks cnnot shre sustrte node. Admission control is not explicitly ddressed in [26], ut it cn e inferred tht emul rejects request if the sustrte ndwidth/node resources re insufficient. Emul s PlnetL portl [28] provides resource lloction service for users to ccess to PlnetL tested. It serches for the PlnetL nodes with low CPU nd memory lods for the users. Our work considers ll the four chllenges outlined in Section 1. In prticulr, we improve the link mpping lgorithm through sustrte support for pth splitting nd migrtion. 7. CONCLUSION A key prolem in the current study of network virtuliztion, the VN emedding prolem, hs vrious constrints tht mke it computtionlly intrctle. In this pper, rther thn significntly restrict the prolem spce to mke the prolem trctle, we rethink the VN emedding prolem y proposing more flexile sustrte network to etter support virtul network emedding. This flexiility includes pth splitting nd migrtion. Pth splitting (i.e. multipth) hs een recurring theme in mny network reserch topics, nd we demonstrte the power of multipth in sustrte network for more cost-effective virtul network emedding. From oth the theoreticl nd engineering perspective, we show tht llowing sustrte pth splitting nd migrtion would help us to ttin etter resource utiliztion. Through our pulicly ville simultor, we demonstrte the enefits of these pproches in mking the emedding prolem computtionlly esier, nd the resulting emeddings more efficient. 8. REFERENCES [1] Akmi content distriution network. [2] GENI. [3] Plnetl. [4] Virtul Network Emedding Simultor. [5] R.K.Ahuj,T.L.Mgnnti,ndJ.B.Orlin.Network Flows: Theory, Algorithms, nd Applictions. Prentice Hll, [6] D. G. Andersen. Theoreticl pproches to node ssignment. Unpulished Mnuscript, http: // 02. [7] T. Anderson, L. Peterson, S. Shenker, nd J. Turner. Overcoming the Internet impsse through virtuliztion. IEEE Computer Mgzine, 38(4):34 41, 05. [8] B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedmn, M. Ltpy, C. Mgnien, nd R. Teixeir. Avoiding trceroute nomlies with Pris trceroute. In Proc. Internet Mesurement Conference, 06. [9] I. Avrmopoulos, D. Syrivelis, J. Rexford, nd S. Llis. Secure vilility monitoring using stelth proes. Technicl Report TR , Princeton University, 06. [] A. Bvier, N. Femster, M. Hung, L. Peterson, nd J. Rexford. In VINI verits: Relistic nd controlled network experimenttion. In Proc. ACM SIGCOMM, Septemer 06. [11] N.G.Duffield,P.Goyl,A.Greenerg,P.Mishr,K.K. Rmkrishnn, nd J. E. vn der Merwe. Resource mngement with hoses: Point-to-cloud services for virtul privte networks. IEEE/ACM Trns. Networking, 02. [12] D. Eppstein. Finding the k shortest pths. In Proc. IEEE Symposium on Foundtions of Computer Science, [13] J. Fn nd M. Ammr. Dynmic topology configurtion in service overly networks: A study of reconfigurtion policies. In Proc. IEEE INFOCOM, 06. [14] N. Femster, L. Go, nd J. Rexford. How to lese the Internet in your spre time. ACM Computer Communiction Review, 37(1):61 64, 07. [] A. Feldmnn, A. Greenerg, C. Lund, N. Reingold, nd J. Rexford. NetScope: Trffic engineering for IP networks. IEEE Network Mgzine, 14(2):11 19, Mrch 00. [16] A. Gupt, J. Kleinerg, A. Kumr, R. Rstogi, nd B. Yener. Provisioning virtul privte network: A network design prolem for multicommodity flow. In Proc. ACM Symposium on Theory of Computing, 01. [17] M. Hrchol-Blter nd A. B. Downey. Exploiting process lifetime distriutions for dynmic lod lncing. ACM Trnsctions on Computer Systems, (3): , [18] J. He nd J. Rexford. Towrds Internet-wide multipth routing. In IEEE Network Mgzine Specil Issue on Sclility, Mrch 08. [19] P. Key, L. Mssoulie, nd D. Towsley. Pth selection nd multipth congestion control. In Proc. IEEE INFOCOM, 07. [] S. Kirkptrick, C. D. Geltt, nd M. P. Vecchi. Optimiztion y simulted nneling. Science, Numer 4598, 13 My 1983, 2, 4598: , [21] J. Kleinerg. Approximtion lgorithms for disjoint pths prolems. PhD thesis, MIT, [22] S. G. Kolliopoulos nd C. Stein. Improved pproximtion lgorithms for unsplittle flow prolems. In Proc. IEEE Symposium on Foundtions of Computer Science, [23] J. Lu nd J. Turner. Efficient mpping of virtul networks onto shred sustrte. Technicl Report WUCSE-06-35, Wshington University, 06. [24] M. Mitzenmcher. The power of two choices in rndomized lod lncing. IEEE Trnsctions on Prllel nd Distriuted Systems, 12():94 14, 01. [25] S. Rghunth, K. K. Rmkrishnn, S. Klynrmn, nd C. Chse. Mesurement sed chrcteriztion nd provisioning of IP VPNs. In Proc. Internet Mesurement Conference, 04. [26] R. Ricci, C. Alfeld, nd J. Lepreu. A solver for the network tested mpping prolem. ACM Computer Communiction Review, 33(2):65 81, 03. [27] J. S. Turner nd D. E. Tylor. Diversifying the Internet. In Proc. IEEE GLOBECOM, 05. [28] K.We,M.Hiler,R.Ricci,A.Clements,nd J. Lepreu. Implementing the Emul-Plnetl portl: Experience nd lessons lerned. In Workshop on Rel, Lrge Distriuted Systems (WORLDS), 04. [29] T. Wood, P. Shenoy, A. Venktrmni, nd M. Yousif. Blck-ox nd gry-ox strtegies for virtul mchine migrtion. In Proc. Networked Systems Design nd Implementtion, 07. [30] E. W. Zegur, K. L. Clvert, nd S. Bhttchrjee. How to model n internetwork. In Proc. IEEE INFOCOM, [31] Y. Zhu nd M. Ammr. Algorithms for ssigning sustrte network resources to virtul network components. In Proc. IEEE INFOCOM, 06. ACM SIGCOMM Computer Communiction Review 29 Volume 38, Numer 2, April 08

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Simulation of operation modes of isochronous cyclotron by a new interative method

Simulation of operation modes of isochronous cyclotron by a new interative method NUKLEONIKA 27;52(1):29 34 ORIGINAL PAPER Simultion of opertion modes of isochronous cyclotron y new intertive method Ryszrd Trszkiewicz, Mrek Tlch, Jcek Sulikowski, Henryk Doruch, Tdeusz Norys, Artur Srok,

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324 A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

QoS Framework for SIP Signalling

QoS Framework for SIP Signalling QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: kist@ieee.org, richrd@ctt.rmit.edu.u ABSTRACT The Session Initition Protocol

More information

A Study on Autonomous Cooperation between Things in Web of Things

A Study on Autonomous Cooperation between Things in Web of Things A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, 305-700,

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

The Acoustic Design of Soundproofing Doors and Windows

The Acoustic Design of Soundproofing Doors and Windows 3 The Open Acoustics Journl, 1, 3, 3-37 The Acoustic Design of Soundproofing Doors nd Windows Open Access Nishimur Yuy,1, Nguyen Huy Qung, Nishimur Sohei 1, Nishimur Tsuyoshi 3 nd Yno Tkshi 1 Kummoto Ntionl

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014 Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

Combined Liability Insurance. Information and Communication Technology Proposal form

Combined Liability Insurance. Information and Communication Technology Proposal form Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y

More information

piecewise Liner SLAs and Performance Timetagment

piecewise Liner SLAs and Performance Timetagment i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

Intellio Video System 25

Intellio Video System 25 Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs Journl of Grph Algorithms nd Applictions http://jg.info/ vol. 13, no. 3, pp. 319 347 (2009) DAGmps: Spce Filling Visuliztion of Directed Acyclic Grphs Vssilis Tsirs 1,2 Sofi Trintfilou 1,2 Ionnis G. Tollis

More information

THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY

THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY GEOCHRONOMETRIA Vol. 2, pp 15-2, 21 Journl on Methods nd Applictions of Asolute Chronology THE PARAMETERS OF TRAPS IN K-FELDSPARS AND THE TL BLEACHING EFFICIENCY ALICJA CHRUŒCIÑSKA 1, HUBERT L. OCZKOWSKI

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journl of Systems nd Softwre xxx (2008) xxx xxx Contents lists ville t ScienceDirect The Journl of Systems nd Softwre journl homepge: www.elsevier.com/locte/jss Energy-efficient rel-time oject trcking

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator AP Clculus Finl Review Sheet When you see the words. This is wht you think of doing. Find the zeros Find roots. Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor.

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

Vector differentiation. Chapters 6, 7

Vector differentiation. Chapters 6, 7 Chpter 2 Vectors Courtesy NASA/JPL-Cltech Summry (see exmples in Hw 1, 2, 3) Circ 1900 A.D., J. Willird Gis invented useful comintion of mgnitude nd direction clled vectors nd their higher-dimensionl counterprts

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

Discovering General Logical Network Topologies

Discovering General Logical Network Topologies Discovering Generl Logicl Network Topologies Mrk otes McGill University, Montrel, Quebec Emil: cotes@ece.mcgill.c Michel Rbbt nd Robert Nowk Rice University, Houston, TX Emil: {rbbt, nowk}@rice.edu Technicl

More information

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information