REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems

Size: px
Start display at page:

Download "REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems"

Transcription

1 : Resoure-Awre Applition Stte Monitoring for Lrge-Sle Distriuted Systems Shiong Meng Srinivs R. Kshyp Chitr Venktrmni Ling Liu College of Computing, Georgi Institute of Tehnology, Atlnt, GA 332, USA {smeng, IBM Reserh T.J. Wtson, Hwthorne, NY 532, USA {srkshy, Astrt To oserve, nlyze nd ontrol lrge sle distriuted systems nd the pplitions hosted on them, there is n inresing need to ontinuously monitor performne ttriutes of distriuted system nd pplition sttes. This results in pplition stte monitoring tsks tht require finegrined ttriute informtion to e olleted from relevnt nodes effiiently. Existing pprohes either tret multiple pplition stte monitoring tsks independently nd uild d-ho monitoring trees for eh tsk, or onstrut single stti monitoring tree for multiple tsks. We rgue tht reful plnning of multiple pplition stte monitoring tsks y jointly onsidering multi-tsk optimiztion nd node level resoure onstrints n provide signifint gins in performne nd slility. In this pper, we present, REsoure-wre pplition stte MOnitoring system. produes forest of optimized monitoring trees through itertions of two phses, one phse exploring ost shring opportunities vi estimtion nd the other refining the monitoring pln through resoure-sensitive tree onstrution. Our experimentl results inlude those gthered y deploying on BlueGene/P rk running IBM s lrge-sle distriuted streming system - System S. Using in the ontext of running over monitoring tsks for n pplition deployed ross nodes results in 35%-45% derese in the perentge error of olleted ttriutes ompred to existing shemes. 1. Introdution Lrge-sle distriuted systems suh s loud omputing systems [1] nd strem-proessing systems [2], [3] llow multiple pplitions to e deployed over different sets of hosts. These systems pose interesting hllenges for monitoring the funtioning of oth systems nd pplitions running on them. We refer to the tsk of ontinuously monitoring the stte of pplitions deployed on suh systems s pplition stte monitoring, whih is essentil for the oservtion, nlysis nd ontrol of these systems nd the long running pplitions they host. Applition stte monitoring requires ontinuously monitoring nd olleting performne ttriute vlues, suh s CPU-usge, memory-usge, dt rte, pket size distriution, nd ny numer of ustom ttriutes t the pplition level. In mny ses, it is useful to ollet detiled performne ttriutes t ontrolled olletion frequeny. For instne, fine-grined performne hrteriztion informtion is required to onstrut vrious system models nd to test hypotheses on system ehvior. Similrly, the dtrte nd uffer oupny in eh element of distriuted pplition my e required for dignosis purposes when there is pereived ottlenek. As the sle of the system, pplition nd monitoring tsks inreses, the overhed of the stte monitoring nd ttriute olletion n eome prohiitive. A lrge ody of reserh ddresses the design of distriuted monitoring systems nd hs minly foused on exeuting single monitoring tsks effiiently (TAG [4], SDIMS [5], PIER [6], pproximte quntiles [7], [8], join ggregtions [9], REED [], opertor plement [11]). These pprohes use either stti monitoring trees [12], [11], where pre-onstruted monitoring tree is used for ll monitoring tsks ross ll pplitions, or onstrut monitoring trees for individul monitoring tsks independently [6]. We rgue tht these pprohes suffer from two mjor drwks. Firstly, performing multiple pplition stte monitoring tsks using either pre-onstruted single monitoring tree or onstruting one stte monitoring tree for eh pplition my result in su-optiml monitoring pln. For exmple, if two tsks re performed over the sme set of nodes, using one monitoring tree for monitoring dt trnsmission is more effiient thn using two, s nodes n merge updtes for oth tsks nd redues per-messge proessing overhed. While finding n optiml monitoring network eomes muh more omplited s the size of the system, the numer of monitoring tsks, nd the durtion of monitoring inrese, it is ritil for the monitoring slility. Seondly, these pprohes fil to onsider node level resoure onstrints in the onstrution of stte monitoring trees, nd thus, suffer from node overlod nd onsequently serious monitoring dt loss. This prolem gets worse in pplition stte monitoring, s the olleting of individul ttriute vlues from different nodes in lrge sle distriuted systems demnds onsiderle resoures nd nodes my dedite most of their pities for pplition hosting.

2 Without onsidering resoure onstrints in stte monitoring plnning, these pprohes my use ertin nodes to e ssigned with exessive monitoring worklod, leding undesirle performne degrdtion. Thus, we envision tht pplition stte monitoring in lrge sle distriuted systems should e slle, effiient, nd resoure-wre. In this pper, we rgue tht reful plnning of multiple pplition stte monitoring tsks y jointly onsidering multi-tsk optimiztion nd resoure-onstrined monitoring tree onstrution n provide signifint gins in performne nd slility. We present, resoure-wre pplition stte monitoring system, whih produes forest of optimized monitoring trees through itertions of two proedures. One proedure explores opportunities for shring per-messge proessing overhed sed on performne estimtion. The other proedure refines the monitoring pln produed in the previous proedure y uilding monitoring trees with resoure sensitive tree onstrution lgorithm. We undertke n experimentl study of our system nd present results inluding those gthered y deploying on BlueGene/P rk (using 256 nodes ooted into Linux) running IBMs lrge-sle distriuted streming system - System S. The results show tht our resoure-wre pproh for pplition stte monitoring onsistently outperforms the urrent est known shemes for multiple pplition stte monitoring. For instne, in our experiments with rel pplition tht spnned up to nodes nd out s mny monitoring tsks, using to ollet ttriutes resulted in 35%-45% redution in the perentge error of the ttriutes tht were olleted. This pper mkes two unique ontriutions: We hrterize nd identify two importnt requirements for effiient pplition stte monitoring in lrge sle distriuted systems: the shring of messge proessing ost mong ttriutes nd onsidering node level resoure onstrints. These two requirements re essentil for the slility of monitoring nd existing pprohes filed to ddress them. We develop frmework for ommunition-effiient pplition stte monitoring, whih jointly solves prolems of multiple monitoring tsk optimiztion nd resoure-wre monitoring network onstrution. To our est knowledge, is the first system tht promotes resoure-wre methodology to support nd sle multiple pplition stte monitoring tsks in lrge sle distriuted systems. 2. System Overview Figure 1 illustrtes the rhiteture of our system. The tsk mnger tkes stte monitoring tsks nd removes duplition mong pplition stte monitoring tsks. These de-duplited tsks re then feed to the mngement ore, where the monitoring plnner rries out the resoure wre multi-tsk optimiztion y orgnizing monitoring nodes into forest of optimized monitoring trees. The mngement ore lso provides support for reliility enhnement nd filure hndling. The dt olletor module provides lirry Monitoring Tsks Tsk Mnger De-duplited tsks Reliility Hndler Root Sme node Filure Hndler Monitoring Plnner Dt Colletor Sme node Cost Estimtor Root Mngement Core Result Proessor Monitoring Nodes Applition Sttes App CPU Usge Throughput xxx xx;xx;xx;xx; xx;xxx;x xx x;xx;x;xx; x;xxx;x xxx xx;xx;xx;xx; xx;xxx;x Figure 1: A Simplified System Arhiteture for effiient olleting ttriute vlues from the monitoring network. The result proessor exeutes the onrete monitoring opertions inluding olleting nd ggregting ttriute vlues, triggering wrnings, nd et. In this pper, we fous on the design of the monitoring plnner. Applition stte monitoring tsks re long running tivities used for oservtion, nlysis, nd ontrol of lrge sle distriuted systems or pplitions they host. Eh tsk periodilly ollets vlues of ertin ttriutes from the set of nodes over whih n pplition is running. Formlly, we define n pplition stte monitoring tsk t s follows: Definition 1: A monitoring tsk t =(A t,n t ) is pir of sets, where A t i N t A i is set of ttriutes nd N t N is set of nodes. In ddition, t n lso e represented s list of node-ttriute pirs (i, j), wherei N t,j A t. As suh systems run multiple pplitions simultneously nd my monitor mny fets of n pplition, more often thn not, different monitoring tsks my shre duplited monitored ttriutes. For instne, monitoring tsks t 1 = ({pu utiliztion}, {, }) nd t 2 = ({pu utiliztion}, {, }) hve duplited monitored ttriute pu utiliztion on node. With suh duplition, node hs to send pu utiliztion informtion twie for eh updte, whih is lerly unneessry. Therefore, given set of monitoring tsks, the tsk mnger trnsforms this set of tsks into list of node-ttriute pirs nd elimintes ll duplited nodettriute pirs. For instne, t 1 nd t 2 re equivlent to the list {-pu utiliztion, -pu utiliztion} nd {pu utiliztion, -pu utiliztion} respetively. In this se, node-ttriute pir {-pu utiliztion} is duplited, nd thus, is eliminted from the output of the tsk mnger. Given list of node-ttriute pirs, the monitoring plnner orgnizes ssoited nodes into forest of monitoring trees, eh of whih ollets vlues for set of ttriutes. One monitoring node my onnet to multiple trees (s shown in Figure 1 nd 3()). Within monitoring tree T, eh node i periodilly sends n updte messge to its prent. Suh updte messges inlude oth vlues lolly oserved y node i nd vlues sent y i s hildren, for ttriutes monitored y T. This proess ontinues upwrds in the tree until the messge rehes the entrl dt olletor node. Eh monitoring node hs set of oservle ttriutes A i = { j j [1,m]}. Attriutes t different nodes ut with the sme susription re onsidered s ttriutes of the sme type. For instne, monitored nodes my ll hve lo-

3 CPU usge (logsle) Num. of nodes = Num. of messges t str-root nd Messge Size [x ''] num-messges messge-size Figure 2: CPU Usge vs Inresing Messge Numer/Size lly oservle CPU utiliztion. We onsider n ttriute s ontinuously hnging vrile whih outputs new vlue in every unit time. For simpliity, we ssume ll ttriutes re of the sme size nd it is strightforwrd to extend our work to support ttriutes with different sizes. Eh node i, the entrl node or monitoring node, hs pity i (lso referred to s the resoure onstrint of node i) for reeiving nd trnsmitting monitoring dt. In ddition, eh messge trnsmitted in the system is ssoited with per-messge overhed C, nd, orrespondingly, the ost of trnsmitting messge with x vlues is C + x. In our setting, we hrterize the per-messge overhed s proessing overhed. Figure 2 shows how signifint the per-messge proessing overhed is. The mesurements were performed on BlueGene/P node whih hs 4-ore 8MHz PowerPC proessor. The figure shows n exmple monitoring tsk where nodes re onfigured in str network where eh node periodilly trnsmits single fixed smll messge to root node. The CPU utiliztion of the root node grows roughly linerly from round 6% for 16 nodes (the root reeives 16 messges periodilly) to round 68% for 256 nodes (the root reeives 256 messges periodilly). Note tht this inresed overhed is due to the inresed numer of messges t the root node nd not due to the inrese in the totl size of messges. The ost inurred to reeive single smll messge of size is round.2% while the ost inurred to reeive single messge of size 256 is still round 1.4% (see Figure 2). In other senrios, the per-messge overhed ould e trnsmission or protool overhed. For instne, typil monitoring messge delivered vi TCP/IP protool hs messge heder of t lest 78 ytes not inluding pplition-speifi heders, while n integer monitoring dt is just 4 ytes Chllenges in Monitoring Plnning From the users perspetive, monitoring results should e s urte s possile, suggesting tht the underlying monitoring network should mximize the numer of nodettriute pirs reeived t the entrl node. In ddition, suh monitoring network should not use the exessive use of resoure t ny node. Aordingly, we define the monitoring plnning prolem (MP) s follows: Prolem Sttement 1: Given set of node-ttriute pirs for monitoring Ω={ω 1,ω 2,...,ω p } where ω q =(i, j), i N, j A, q [1,p], nd resoure onstrint i for eh ssoited node, find prent f(i, j), i, j, wherej A i 1.3 suh tht node i forwrds ttriute j to node f(i, j) tht mximizes the totl numer of node-ttriute pirs reeived t the entrl node nd the resoure demnd of node i, d i, stisfies d i i, i N. NP-ompleteness. When restriting ll nodes to only monitor the sme ttriute j, we otin speil se of the monitoring plnning prolem where eh node hs t most one ttriute to monitor. As shown y [13], this speil se is NP-omplete prolem. Consequently, the MP is NP-Complete prolem, sine eh instne of MP n e restrited to this speil se. Therefore, in, we primrily fous on effiient pprohes tht n deliver resonly good monitoring plns. We now use some intuitive exmples to illustrte the hllenges nd key questions tht need to e ddressed in designing resoure-wre monitoring plnner. Consider exmples in Figure 3, where we hve 6 monitoring nodes in the system nd eh monitors set of ttriutes indited y lphets on nodes. Exmple () shows widely used topology in whih every nodes send their updtes diretly to the entrl node. This topology, however, hs poor slility, euse it requires the entrl node to hve lrge mount of resoures to ount for per-messge overhed. Exmple () orgnizes ll nodes in single tree whih delivers updtes for ll ttriutes. While this topology redues the resoure onsumption t the entrl node, the root node now hs to rely updtes for ll node-ttriute pirs, nd gin fes slility issues due to limited resoures. These two exmples suggest tht hieving ertin degree of lod lning is ritil. Unfortuntely, lod lne lone does not led to good monitoring pln. In exmple (), to lne the trffi mong nodes, the entrl node uses three trees, eh of whih delivers only one ttriute, nd thus hieves more lned worklod mong nodes ompred with exmple (). However, sine eh node monitors t lest two ttriutes, nodes hve to send out multiple updte messges insted of one s in exmple (). Due to per-messge overhed, this pln leds to higher resoure onsumption t lmost every node. As result, ertin nodes my still fil to deliver ll updtes nd less resoures will e left over for dditionl monitoring tsks. The ove exmples revel two fundmentl spets of the monitoring plnning prolem: How to determine the numer of monitoring trees nd the set of ttriutes on eh? This is non-trivil prolem. Exmple (d) shows topology whih uses one tree to deliver ttriute, nd nother tree to deliver ttriute. It introdues less per-messge overhed ompred with exmple () nd is more lod-lned solution ompred with exmple (). How to determine the topology of eh monitoring tree under node level resoure onstrints? Construting monitoring trees sujet to resoure onstrints t nodes is lso non-trivil prolem nd the hoie of topology n signifintly impt the resoure usge on the prtiipting nodes. Exmple (e) shows three different

4 C entrlnode, C entrlnode, C entrlnode C entrlnode,,,,, STAR MIXED CHAIN () Str olletion () One-Set olletion () Singleton-Set olletion (d) Optiml olletion (e) Different Trees Figure 3: Motivting exmples for the topology plnning prolem. trees. The str topology (upper left), while introdues the lest relying ost, uses signifint per-messge overhed t its root. The hin topology (upper right), on the ontrry, distriutes the per-messge overhed mong ll nodes, ut uses the most relying ost. A mixed tree (ottom) might hieve good trde-off etween relying ost nd per-messge overhed, ut it is diffiult to determine its optiml topology. 3. The Approh The pproh promotes the resoure wre multitsk optimiztion frmework, onsisting of two phse itertive proess nd suite of multi-tsk optimiztion tehniques. At high level, opertes s guided lol serh pproh, whih strts with n initil monitoring network omposed of multiple independently onstruted monitoring trees, nd itertively optimizes the monitoring network until no further improvements re possile. When exploring vrious optimiztion diretions, employs ost estimtion to guides susequent improvement so tht the serh spe n e restrited to smll size. This guiding feture is essentil for the slility of. Conretely, during eh itertion, first runs prtition ugmenttion proedure whih genertes list of most promising ndidte ugmenttions for improving the urrent distriution of monitoring worklod mong monitoring trees. While the totl numer of ndidte ugmenttions is very lrge, this proedure n trim down the size of the ndidte list y seleting the most promising ones through ost estimtion. Given the generted ndidte ugmenttion list, the resoure-wre evlution proedure further refines ndidte ugmenttions y uilding monitoring trees ordingly with resoure-wre tree onstrution lgorithm Prtition Augmenttion The prtition ugmenttion proedure is designed to produe the ttriute prtitions tht n potentilly redue permessge proessing ost through guided itertive proess. These ttriute prtitions determine the numer of monitoring trees in the forest nd the set of ttriutes eh tree delivers. To etter understnd the design priniples of our pproh, we first riefly desrie two simple ut essentilly the-stte-of-the-rt shemes in multi-tsk monitoring. Rell tht mong exmple shemes in Figure 3, one sheme (exmple ()) delivers eh ttriute in seprte tree, nd the other sheme (exmple ()) uses single tree to deliver updtes for ll ttriutes. We refer to these two shemes s the Singleton-set prtition sheme (SP) nd the One-set prtition (OP) sheme respetively. We use the term prtition euse these shemes prtition the set of monitored ttriutes into numer of non-overlpping susets nd ssign eh susets to monitoring tree. Singleton-Set Prtition (SP). Speifilly, given set of ttriutes A for olleting, singleton-set prtition sheme divides A into A susets, eh of whih ontins distint ttriute in A. Thus, if node monitors m ttriutes, it is ssoited with m trees. This sheme is widely used in previous work, e.g. PIER[6], whih onstruts routing tree for eh ttriute olletion. While this sheme provides the most lned lod mong trees, it is not effiient s nodes pys high ost in per-messge overhed. One-Set Prtition (OP). The one-set prtition sheme uses the set A s the only prtitioned set. This sheme is lso used in numer of previous work[12], [11]. Using OP, eh node n send just one messge whih inludes ll the ttriute vlues, nd thus, sves per-messge overhed. Nevertheless, sine the size of eh messge is lrger ompred with messges ssoited with SP, the orresponding olleting tree n not grow very lrge Exploring Prtition Augmenttions seeks middle ground etween these extreme solutions - one where nodes py lower per-messge over ompred to SP while eing more lod-lned nd onsequently more slle thn OP. Our prtition ugmenttion sheme explores possile ugmenttions to given ttriute prtition P y serhing for ll prtitions tht re lose to P in the sense tht the resulting prtition n e reted y modifying P with ertin predefined opertions. We first define two si opertions for modifying ttriute set prtitions. Given two ttriute sets A P i nd A P j in prtition P,merge opertion over A P i nd A P j, denoted s A P i A P j, yields new set AP k = AP i A P j. Given one ttriute set A P i nd n ttriute α, split opertion on A P i with regrding to α, denoted s A P i α, yields two new sets A P k = AP i α. Bsed on the definition of merge nd split opertions, we now define neighoring solution s follows: Definition 2: For n ttriute set prtition P,wesyprtition P is neighoring solution of P if nd only if either A P i,ap j P so tht P = P/{A P i,ap j } (AP i A P j ),or A P i P, α A P i so tht P = P/A P i (A P i α) {α}.

5 Guided Prtition Augmenttion. Exploring nd evlute ll neighoring ugmenttions of given prtition is prtilly infesile, sine the evlution involves onstruting resoure-onstrined monitoring trees. To mitigte this prolem, we use guided prtition ugmenttion sheme whih gretly redues serhing spe. The si ide is to rnk ndidte prtitions ording to the estimted ost redution tht would result from using the new prtition, s prtition tht provides lrge ost redution will likely free up more pity for ggregting ttriute vlue pirs. Following this, we evlute neighoring prtitions in the deresed order of their estimted pity-redution so tht we n find good ugmenttion without evluting ll ndidtes. To estimte the gin of ndidte ugmenttion, we first need to understnd how the resoure onsumption would hnge fter pplying n ugmenttion m. Chnge in the totl resoure onsumption resulting from n ugmenttion m n e ontriuted y the hnge in the rely ost nd tht in the per-messge overhed ost, s m my hnge the numer of trees nd the struture of trees. Let g(m) e the overll redution in resoure onsumption of n ugmenttion m, Δ p (m) e the estimted differene in overhed ost due to m nd Δ r (m) e the estimted differene in rely ost due to m. Wehveg(m) =Δ p (m)+δ r (m). We estimte g(m) ssuming tht following n ugmenttion, the tree onstrution proedure is le to ssign ll the ttriute-vlue pirs tht were in the ffeted prtitions using str topology. Assuming topology is neessry to e le to estimte Δ r (m). Rell tht C is the per-messge overhed nd is the ost of messge of unit size. Also let N Ai denote the numer of nodes ssoited with ttriute set A i.wethenhve: { ( 1).C. NAi N Aj m : A i A j = A k Δ p(m) = C. N Aj N Ak m : A i A j = A k {. NAi A Δ r(m) = j N Ai A j m : A i A j = A k ( 1).. N Ai N Ai A j m : A i A j = A k Intuitively, when we merge two ttriute sets, the permessge overhed redues s nodes ssoited with oth sets send fewer messges for n updte. However, the orresponding relying ost my inrese s the merged tree my e higher thn the previous two trees, whih mkes messges trvel more hops to reh the root. On the ontrry, when we split n ttriute set, the per-messge overhed inreses nd the relying ost dereses. The ove equtions pture these two hnges nd mke the estimtion possile. This guided lol-serh heuristi is essentil to ensure the prtility of our sheme Resoure-wre Evlution To evlute the ojetive funtion for given ndidte prtition ugmenttion m, the resoure-wre evlution exmines m y onstruting trees for nodes ffeted y m nd mesures the the numer of node-ttriute pirs tht n e olleted using these trees. This proedure primrily involves two tsks. One is onstruting tree for given set of nodes without exeeding resoure onstrints t ny node. The other is for node onneted to multiple trees to llote its resoures to different trees Tree Constrution The tree onstrution proedure onstruts olletion tree for given set of nodes D suh tht no node exeeds its resoure onstrints while trying to inlude s mny nodes s possile into the onstruted tree. Formlly, we define the tree onstrution prolem s follows: Prolem Sttement 2: Given set of n nodes, eh hs x i ttriutes to monitor, nd resoure onstrint i, find prent p(i), i, so tht the numer of nodes in the onstruted tree is mximized sujet to the following onstrints where u i is the resoure onsumed t node i for sending updte messges to its prent: 1) For ny node i in the tree, p(j)=i u j + u i i 2) Let y i e the numer of ll ttriute vlues trnsmitted y node i. Wehvey i = x i + p(j)=i x j. 3) Aording to our definition, u i C + y i The first onstrint requires tht the resoure spent on node i for sending nd reeiving updtes should not exeed its resoure onstrint 1 i. The seond onstrint requires node to deliver its lol monitored vlues s well s vlues reeived from its hildren. The lst onstrint sttes tht the ost of proessing n outgoing messge is the omintion of per-messge overhed nd vlue proessing ost. The tree onstrution prolem, however, is lso NP-Complete[13] nd we present heuristis for the tree-onstrution prolem. We first disuss two simple tree onstrution heuristis: Str. This sheme forms str -like trees y giving priority to inresing the redth of the tree. Speifilly, it dds nodes into the onstruted tree in the order of deresed ville pity, nd tthes new node to the node with the lowest height nd suffiient ville pity, until no suh nodes exist. STAR retes ushy trees nd onsequently pys low rely ost. However, due to lrge node degrees, the root suffers from high per-messge overhed, nd thus, the tree n not grow very lrge. Chin. This sheme gives priority to inresing the height of the tree, nd onstruts hin -like trees. CHAIN dds nodes to the tree in the sme wy s STAR does exept tht it tries to tth nodes to the node with the highest height nd suffiient ville pity. CHAIN retes long trees tht hieve good lod lne, ut due to the numer of hops eh messge hs to trvel to reh the root, most nodes py high rely ost. STAR nd CHAIN revel two onfliting ftors in tree onstrution effiieny nd slility. Minimizing tree height hieves effiieny, i.e. minimum rely ost, ut uses poor slility, i.e. smll tree size. On the other hnd, mximizing tree height hieves good slility, ut degrdes effiieny. The dptive tree onstrution sheme seeks middle-ground etween the STAR nd CHAIN proedures. It tries to minimize the totl resoure onsumption, nd n trde off per-messge overhed for rely ost, nd vie vers, if it ommodtes more nodes y doing so. The dptive tree onstrution sheme frequently uses the following two onepts: Given set of nodes N for tree 1. In our setting, proessing n outgoing messge onsumes the sme mount of resoure s proessing the sme messge s n inoming one

6 onstrution nd the orresponding tree T whih ontins nodes set N N, wesyt is sturted if no more nodes d (N N ) n e dded to T without using violtion of resoure onstrint for t lest one node in T. We refer to nodes whose resoure onstrint would e violted if d (N N ) is dded to T s ongested nodes. The dptive tree onstrution sheme itertively invokes two proedures, the onstrution proedure nd the djusting proedure. The onstrution proedure runs the STAR sheme whih tthes new nodes to low level existing tree nodes. STAR uses the pity onsumption t low level nodes to e muh hevier thn tht t other nodes. Thus, s low level tree nodes eome ongested ( sturted tree), the onstrution proedure termintes nd returns ll ongested nodes. The sheme then invokes the djusting proedure, whih tries to relieve the worklod of low level nodes y reduing the degree of these nodes nd inresing the height of the tree(similr to CHAIN). As result, the djusting proedure redues ongested nodes nd mkes sturted tree unsturted. The sheme then repets the onstrutingdjusting itertion until no more nodes n e dded to the tree. For detils of the djusting proedure nd resoure llotion for nodes prtiipted in multiple trees, we refer interested reders to our tehnil report[14]. 4. Experimentl Evlution We undertke n experimentl study of nd present results inluding those gthered y deploying on BlueGene/P rk running IBM s lrge-sle distriuted streming system - System S. We first hrterize our prtition ugmenttion nd tree onstrution shemes using syntheti dt, nd then vlidte the performne of our system through rel system experiments. Syntheti Dtset Experiments. For our experiments on syntheti dt, we ssign rndom suset of ttriutes to eh node in the system. We generte monitoring tsks y rndomly seleting A t ttriutes nd N t nodes with uniform distriution, for given size of ttriute set A nd node set N. We lso lssify monitoring tsks into two tegories - 1) smll-sle ones tht re for smll set of ttriutes from smll set of nodes, nd 2) lrge-sle ones tht either involves mny nodes or mny ttriutes. Rel System Experiments. Through experiments in rel system deployment, we lso show tht the error in ttriute vlue oservtions (due to either stle or dropped ttriute vlues used y insuffiient node resoures) introdued y is smll. Note tht this error n e mesured in meningful wy only for rel system. System S is lrge-sle distriuted strem proessing middlewre. Applitions re expressed s dtflow grphs tht speify nlyti opertors interonneted y dt strems. These pplitions re deployed in System S s proesses exeuting on distriuted set of hosts, nd interonneted y strem onnetions using trnsports suh s TCP/IP. Eh node tht runs pplition proesses n oserve ttriutes t vrious levels suh s t the nlyti opertor level, System S middlewre level nd the OS Perentge of Colleted Vlues Perentge of Colleted Vlues 1 1 Averge Numer of Attriutes Per Tsk () Inresing A t Numer of Tsks () Inresing Smll-sle Tsks Perentge of Colleted Vlues Perentge of Colleted Vlues Averge Numer of Nodes Per Tsk () Inresing N t Numer of Tsks (d) Inresing Lrge-sle Tsks Figure 4: Comprison of Attriute Set Prtition Shemes under Diff. Worklod Chrteristis level. For these experiments, we deployed one suh System S pplition lled YieldMonitor [15], tht monitors hip mnufturing test proess nd uses sttistil strem proessing to predit the yield of individul hips ross different eletril tests. This pplition onsisted of over proesses deployed ross nodes, with - ttriutes to e monitored on eh node, on BlueGene/P luster. The BlueGene is very ommunition rih nd ll ompute nodes re interonneted y 3D Torus mesh network. Consequently, for ll prtil purposes, we hve fully onneted network where ll pirs of nodes n ommunite with eh other t lmost equl ost. We generte worklod for these experiments using the sme proedure tht we used for the syntheti dtset experiments Result Anlysis We present smll suset of our experimentl results to highlight the following oservtions mongst others: n ollet lrger frtion of node-ttriute pirs to server tsks presented to the system ompred to simple heuristis (whih re essentilly the stte-ofthe-rt). dpts to tsk nd system hrteristis, nd outperforms eh of these simple heuristis. In rel pplition senrio, lso signifintly redues perentge error in the oserved vlues of the node-ttriute pirs required y monitoring tsks when ompred to simple heuristis. Vrying the sle nd numer of monitoring tsks. Figure 4 ompres the performne of different ttriute set prtition shemes under different worklod hrteristis. In Figure 4(), where we inrese the numer of ttriutes A t in monitoring tsks, our prtition ugmenttion sheme() performs onsistently etter thn singletonset() nd one-set() shemes. In ddition, outperforms when A t is reltively smll. As eh node sends only one

7 Perentge of Colleted Vlues Numer of Nodes Perentge of Colleted Vlues Numer of Nodes Perentge of Colleted Vlues STAR CHAIN MAX_AVB ADAPTIVE 1 1 Averge Numer of Attriutes Per Tsk Perentge of Colleted Vlues STAR CHAIN MAX_AVB ADAPTIVE Numer of Tsks () Inresing Nodes(Smll-sle) () Inresing Nodes(Lrge-sle) () Inresing A t () Inresing Smll-sle Tsks Perentge of Colleted Vlues C/ () Inresing C/(Smll-sle) Perentge of Colleted Vlues C/ (d) Inresing C/(Lrge-sle) Figure 5: Comprison of Attriute Set Prtition Shemes under Diff. System Chrteristis messge whih inludes ll its own ttriutes nd those reeived from its hildren, uses the minimum per-messge overhed. However, when A t inreses, the pity demnd of low level nodes, i.e. nodes lose to the root, inreses signifintly, whih limits the size of the tree nd uses poor performne. In Figure 4(), where we set A t = nd inrese N t to rete extremely hevy worklods, grdully onverges to SINGLETON- SET, s provides the est lod lne whih results in the est performne in this se. We oserve similr results in Figure 4() nd 4(d), where we inrese the totl numer of smll-sle nd lrge-sle monitoring tsks respetively. Vrying nodes in the system. Figure 5 shows the performne of different ttriute set prtition shemes under different system hrteristis. In Figure 5() nd 5(), where we inrese the numer of nodes in the system given smll nd lrge sle monitoring tsks respetively, we n see is etter for lrge-sle tsks while is etter for smll-sle tsks, nd performs muh etter thn them in oth ses, round % extr olleted node-ttriute pirs. Vrying per-messge proessing overhed. To study the impt of per-messge overhed, we vry the C/ rtio under oth smll nd lrge sle monitoring tsks in Figure 5() nd 5(d). As expeted, inresed per-messge overhed hits the sheme hrd sine it onstruts lrge numer of trees nd, onsequently, inurs the lrgest overhed ost while the performne of the ONE- SET sheme whih onstruts just single tree degrdes more grefully. However, hving single tree is not the est solution s shown y whih outperforms oth shemes s C/ inreses. Comprison of tree-onstrution shemes. In Figure 6, we study the performne of different tree onstrution shemes under different worklods nd system hr- Figure 6: Comprison of Tree Constrution Shemes under Different Worklod nd System Chrteristis teristis. Our omprison lso inludes new sheme, nmely MAX AVB, heuristi sheme used in TMON[13] whih tthes new nodes to the existing node with the most ville pity. While we vry different worklods nd system hrteristis in the four figures, our dptive tree onstrution sheme(adaptive) lwys performs the est. Among ll the other tree onstrution shemes, STAR performs well when worklod is hevy, s suggested y Figure 6() nd 6(). This is euse STAR uilds trees with minimum height, nd thus, voids pying onsiderle ost for relying given hevy worklods. CHAIN performs the worst in lmost ll ses. While CHAIN provides good lod lne y distriuting per-messge overhed in CHAIN-like trees, nodes hve to py high ost for relying, espeilly when worklods re hevy. MAX AVB sheme outperforms oth STAR nd CHAIN given smll worklod, s it voids over strething tree in redth or height y growing trees from nodes with the most ville pity. However, its performne quikly degrdes with inresing worklod due to relying ost. Averge Perentge Error Numer of Nodes () Comprison etween Prtition Shemes Averge Perentge Error Numer of Tsks () Comprison etween Tree Constrution Shemes Figure 7: Comprison of Shemes on Averge Perentge Error Rel-world performne. To evlute the performne of in rel world pplition. we mesure the verge perentge error of reeived ttriute vlues for synthetilly generted monitoring tsks. Speifilly, we mesure verge perentge error etween the snpshot of vlues oserved y our sheme nd ompre it to the snpshot of tul vlues (tht n e otined y omining lol log files t the end of the experiment). Figures 7() ompres the hieved perentge error etween different prtition shemes given inresing nodes. The figure shows tht our prtition ugmenttion sheme in outperforms the other prtition shemes. The perentge error hieved y is round %-% less thn tht hieved y

8 nd. Interestingly, the perentge error hieved y lerly redues when the numer of nodes in the system inreses. The reson is tht s nodes inreses, monitoring tsks re more sprsely distriuted mong nodes. Thus, eh messge is reltively smller nd eh node n hve more hildren, whih redues the perentge error used y lteny. Similrly, gins signifint error redution ompred with the other two shemes in Figure 7() where we ompre tree onstrution shemes under inresing monitoring tsks. 5. Relted Work Muh erly work on distriuted query systems minly fouses on exeuting single queries effiiently. As our work study multiple queries, we omit disussing these work. In ddition, reserh on proessing multiple queries on entrlized dt strem [16], [17], [18], [19] is not diretly relted with our work either, s we study distriuted streming where inter-node ommunition is of onern. A lrge ody of work studies query optimiztion nd proessing for distriuted dtses (see [] for survey). Our prolem is fundmentlly different s nodes in our prolem re pity onstrined. There re lso muh work on multiquery optimiztion for ontinuous ggregtion queries over physilly distriuted dt strems [19], [21], [22], [23], [24], [25], [16], [17], [18]. These shemes ssume routing trees re provided s prt of the input, whih my not e true for ertin senrios. is le to hoose optiml routing trees from mny possile ones sed on multi-tsk optimiztion nd resoure onstrints. Reently, severl work studies effiient dt olletion mehnisms. CONCH [26] uilds spnning forest with miniml monitoring osts for ontinuously olleting redings from sensor network y utilizing temporl nd sptil suppression. However, it does not onsider node level resoure limittion nd per-messge overhed s we did, whih my limit its ppliility. PIER [6] suggests using distint routing trees for eh query in the system, whih is essentilly the sheme we disussed. This sheme, though hieves good lod lne, my use signifint ost on per-messge overhed. 6. Conlusion nd Future Work We hve presented, resoure-wre multi-tsk optimiztion frmework for sling pplition stte monitoring in lrge sle distriuted systems. Our pproh optimizes monitoring y lning ommunition effiieny nd slility of the monitoring network. The unique ontriution of is the tehniques for generting monitoring forests tht optimize multiple tsks nd, t the sme time, lnes node level resoure onsumption. We evlute through extensive experiments inluding deploying in rel-world strem proessing pplition hosted on BlueGene/P. The results show tht signifintly nd onsistently outperforms existing pprohes. The development ontinues long severl dimensions. First we pln on implementing extensions suh s in-network ggregtion nd lternte routing. Seond, we re onsidering extending our frmework to hndle oth short-term nd long-term monitoring tsks. Furthermore, we re interested in studying the runtime dpttion ost of trnsforming from one monitoring network to nother. Aknowledgment The first nd lst uthors re prtilly supported y grnts from NSF CISE CyerTrust progrm, IBM fulty prtnership wrd, nd n IBM SUR grnt. Referenes [1] B. Hyes, Cloud omputing, Commun. ACM 8, vol. 51. [2] N. Jin nd et l., Design, implementtion, nd evlution of the liner rod enhmrk on the strem proessing ore, in SIGMOD Conferene, 6, pp [3] D. Adi nd et l, The design of the orelis strem proessing engine, in Proeedings of CIDR, 5. [4] S. Mdden nd et l., Tg: A tiny ggregtion servie for d-ho sensor networks, in OSDI, 2. [5] P. Ylgndul nd M. Dhlin, A slle distriuted informtion mngement system, in SIGCOMM4, pp [6] R. H. et l., The rhiteture of pier: n internet-sle query proessor, in CIDR, 5, pp [7] G. Cormode, M. N. Groflkis, S. Muthukrishnn, nd R. Rstogi, Holisti ggregtes in networked world: Distriuted trking of pproximte quntiles, in SIGMOD5. [8] M. Greenwld nd S. Khnn, Power-onserving omputtion of order-sttistis over sensor networks, in PODS4. [9] G. Cormode nd et l., Skething strems through the net: Distriuted pproximte query trking, in VLDB5. [] D. J. Adi nd et l., Reed: Roust, effiient filtering nd event detetion in sensor networks, in VLDB, 5. [11] U. Srivstv, K. Mungl, nd J. Widom, Opertor plement for in-network strem query proessing, in PODS5. [12] A. Deliginnkis nd et l., Hierrhil in-network dt ggregtion with qulity gurntees, in EDBT4. [13] S. R. Kshyp, D. Turg, nd C. Venktrmni, Effiient trees for ontinuous monitoring, 8. [14] S. Meng, S. R. Kshyp, C. Venktrmni, nd L. Liu, Resoure-wre pplition stte monitoring for lrge-sle distriuted systems, Tehnil Report, 8. [15] D. S. Turg nd et l., Rel-time monitoring nd preditive nlysis of hip mnufturing dt, 8. [16] R. Z. 3, N. Kouds, B. C. Ooi, nd D. Srivstv, Multiple ggregtions over dt strems, in SIGMOD5. [17] S. Krishnmurthy, C. Wu, nd M. J. Frnklin, On-the-fly shring for stremed ggregtion, in SIGMOD6. [18] J. Li nd et l., Effiient evlution of sliding-window ggregtes over dt strems, SIGMOD Reord 5. [19] S. Mdden nd et l., Continuously dptive ontinuous queries over strems, in SIGMOD, 2, pp. 49. [] D. Kossmnn, The stte of the rt in distriuted query proessing, ACM Comput. Surv., vol. 32, no. 4,. [21] R. Huesh nd et l., Shring ggregte omputtion for distriuted queries, in SIGMOD, 7, pp [22] R. Gupt nd K. Rmmrithm, Optimized query plnning of ontinuous ggregtion queries in dynmi dt dissemintion networks, in WWW7. New York, NY, USA: ACM. [23] N. Trigoni nd et l., Multi-query optimiztion for sensor networks, in DCOSS, 5, pp [24] A. Silerstein nd J. Yng, Mny-to-mny ggregtion for sensor networks, in ICDE, 7, pp [25] S. Xing, H.-B. Lim, K.-L. Tn, nd Y. Zhou, Two-tier multiple query optimiztion for sensor networks, in ICDCS7. [26] A. Silerstein, R. Brynrd, nd J. Yng, Constrint hining: on energy-effiient ontinuous monitoring in sensor networks, in SIGMOD Conferene, 6, pp

Inter-domain Routing

Inter-domain Routing COMP 631: COMPUTER NETWORKS Inter-domin Routing Jsleen Kur Fll 2014 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit the notion of

More information

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5.

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5. . Definition, Bsi onepts, Types. Addition nd Sutrtion of Mtries. Slr Multiplition. Assignment nd nswer key. Mtrix Multiplition. Assignment nd nswer key. Determinnt x x (digonl, minors, properties) summry

More information

Arc-Consistency for Non-Binary Dynamic CSPs

Arc-Consistency for Non-Binary Dynamic CSPs Ar-Consisteny for Non-Binry Dynmi CSPs Christin Bessière LIRMM (UMR C 9928 CNRS / Université Montpellier II) 860, rue de Sint Priest 34090 Montpellier, Frne Emil: essiere@rim.fr Astrt. Constrint stisftion

More information

Towards Zero-Overhead Static and Adaptive Indexing in Hadoop

Towards Zero-Overhead Static and Adaptive Indexing in Hadoop Nonme mnusript No. (will e inserted y the editor) Towrds Zero-Overhed Stti nd Adptive Indexing in Hdoop Stefn Rihter Jorge-Arnulfo Quiné-Ruiz Stefn Shuh Jens Dittrih the dte of reeipt nd eptne should e

More information

Equivalence Checking. Sean Weaver

Equivalence Checking. Sean Weaver Equivlene Cheking Sen Wever Equivlene Cheking Given two Boolen funtions, prove whether or not two they re funtionlly equivlent This tlk fouses speifilly on the mehnis of heking the equivlene of pirs of

More information

PLWAP Sequential Mining: Open Source Code

PLWAP Sequential Mining: Open Source Code PL Sequentil Mining: Open Soure Code C.I. Ezeife Shool of Computer Siene University of Windsor Windsor, Ontrio N9B 3P4 ezeife@uwindsor. Yi Lu Deprtment of Computer Siene Wyne Stte University Detroit, Mihign

More information

Cell Breathing Techniques for Load Balancing in Wireless LANs

Cell Breathing Techniques for Load Balancing in Wireless LANs 1 Cell rething Tehniques for Lod lning in Wireless LANs Yigl ejerno nd Seung-Je Hn ell Lortories, Luent Tehnologies Astrt: Mximizing the network throughput while providing firness is one of the key hllenges

More information

Innovation in Software Development Process by Introducing Toyota Production System

Innovation in Software Development Process by Introducing Toyota Production System Innovtion in Softwre Development Proess y Introduing Toyot Prodution System V Koihi Furugki V Tooru Tkgi V Akinori Skt V Disuke Okym (Mnusript reeived June 1, 2006) Fujitsu Softwre Tehnologies (formerly

More information

Active Directory Service

Active Directory Service In order to lern whih questions hve een nswered orretly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

p-q Theory Power Components Calculations

p-q Theory Power Components Calculations ISIE 23 - IEEE Interntionl Symposium on Industril Eletronis Rio de Jneiro, Brsil, 9-11 Junho de 23, ISBN: -783-7912-8 p-q Theory Power Components Clultions João L. Afonso, Memer, IEEE, M. J. Sepúlved Freits,

More information

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1)

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1) August 31, 2015 GETTING STARTED WITH VHDL 2 Top-down design VHDL history Min elements of VHDL Entities nd rhitetures Signls nd proesses Dt types Configurtions Simultor sis The testenh onept OUTLINE 3 GAJSKI

More information

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones A System Context-Awre Approh for Bttery Lifetime Predition in Smrt Phones Xi Zho, Yo Guo, Qing Feng, nd Xingqun Chen Key Lbortory of High Confidene Softwre Tehnologies (Ministry of Edution) Shool of Eletronis

More information

- DAY 1 - Website Design and Project Planning

- DAY 1 - Website Design and Project Planning Wesite Design nd Projet Plnning Ojetive This module provides n overview of the onepts of wesite design nd liner workflow for produing wesite. Prtiipnts will outline the sope of wesite projet, inluding

More information

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH TOTAL LOGISTIC MANAGEMENT No. PP. Avishi CEDER PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH Astrt: Commonly, puli trnsit genies, with view towrd effiieny, im t minimizing the numer

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

How To Balance Power In A Distribution System

How To Balance Power In A Distribution System NTERNATONA JOURNA OF ENERG, ssue 3, ol., 7 A dynmilly S bsed ompt ontrol lgorithm for lod blning in distribution systems A. Kzemi, A. Mordi Koohi nd R. Rezeipour Abstrt An lgorithm for pplying fixed pitor-thyristorontrolled

More information

Words Symbols Diagram. abcde. a + b + c + d + e

Words Symbols Diagram. abcde. a + b + c + d + e Logi Gtes nd Properties We will e using logil opertions to uild mhines tht n do rithmeti lultions. It s useful to think of these opertions s si omponents tht n e hooked together into omplex networks. To

More information

Ratio and Proportion

Ratio and Proportion Rtio nd Proportion Rtio: The onept of rtio ours frequently nd in wide vriety of wys For exmple: A newspper reports tht the rtio of Repulins to Demorts on ertin Congressionl ommittee is 3 to The student/fulty

More information

McAfee Network Security Platform

McAfee Network Security Platform XC-240 Lod Blner Appline Quik Strt Guide Revision D MAfee Network Seurity Pltform This quik strt guide explins how to quikly set up nd tivte your MAfee Network Seurity Pltform XC-240 Lod Blner. The SFP+

More information

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning Cluse Trees: Tool for Understnding nd Implementing Resolution in Automted Resoning J. D. Horton nd Brue Spener University of New Brunswik, Frederiton, New Brunswik, Cnd E3B 5A3 emil : jdh@un. nd spener@un.

More information

control policies to be declared over by associating security

control policies to be declared over by associating security Seure XML Querying with Seurity Views Wenfei Fn University of Edinurgh & Bell Lortories wenfei@infeduk Chee-Yong Chn Ntionl University of Singpore hny@ompnusedusg Minos Groflkis Bell Lortories minos@reserhell-lsom

More information

Fundamentals of Cellular Networks

Fundamentals of Cellular Networks Fundmentls of ellulr Networks Dvid Tipper Assoite Professor Grdute Progrm in Teleommunitions nd Networking University of Pittsburgh Slides 4 Telom 2720 ellulr onept Proposed by ell Lbs 97 Geogrphi Servie

More information

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations USINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 dversries enountered t defining model trnsformtions Mrion Murzek Women s Postgrdute College for Internet Tehnologies (WIT), Institute of Softwre Tehnology

More information

How To Organize A Meeting On Gotomeeting

How To Organize A Meeting On Gotomeeting NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

European Convention on Products Liability in regard to Personal Injury and Death

European Convention on Products Liability in regard to Personal Injury and Death Europen Trety Series - No. 91 Europen Convention on Produts Liility in regrd to Personl Injury nd Deth Strsourg, 27.I.1977 The memer Sttes of the Counil of Europe, signtory hereto, Considering tht the

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE Tble of Contents 1 Home Pge 1 2 Pge 2 3 Your Control Pnel 3 4 Add New Job (Three-Step Form) 4-6 5 Mnging Job Postings (Mnge Job Pge) 7-8 6 Additionl

More information

Calculating Principal Strains using a Rectangular Strain Gage Rosette

Calculating Principal Strains using a Rectangular Strain Gage Rosette Clulting Prinipl Strins using Retngulr Strin Gge Rosette Strin gge rosettes re used often in engineering prtie to determine strin sttes t speifi points on struture. Figure illustrtes three ommonly used

More information

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur Module 5 Three-hse A iruits Version EE IIT, Khrgur esson 8 Three-hse Blned Suly Version EE IIT, Khrgur In the module, ontining six lessons (-7), the study of iruits, onsisting of the liner elements resistne,

More information

ORGANIZER QUICK REFERENCE GUIDE

ORGANIZER QUICK REFERENCE GUIDE NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn Prtie Test 2 1. A highwy urve hs rdius of 0.14 km nd is unnked. A r weighing 12 kn goes round the urve t speed of 24 m/s without slipping. Wht is the mgnitude of the horizontl fore of the rod on the r?

More information

Student Access to Virtual Desktops from personally owned Windows computers

Student Access to Virtual Desktops from personally owned Windows computers Student Aess to Virtul Desktops from personlly owned Windows omputers Mdison College is plesed to nnoune the ility for students to ess nd use virtul desktops, vi Mdison College wireless, from personlly

More information

Using CrowdSourcing for Data Analytics

Using CrowdSourcing for Data Analytics Using CrowdSouring for Dt Anlytis Hetor Gri-Molin (work with Steven Whng, Peter Lofgren, Adity Prmeswrn nd others) Stnford University 1 Big Dt Anlytis CrowdSouring 1 CrowdSouring 3 Rel World Exmples Ctegorizing

More information

Chapter. Contents: A Constructing decimal numbers

Chapter. Contents: A Constructing decimal numbers Chpter 9 Deimls Contents: A Construting deiml numers B Representing deiml numers C Deiml urreny D Using numer line E Ordering deimls F Rounding deiml numers G Converting deimls to frtions H Converting

More information

PRIVATE HEALTH INSURANCE. Geographic Variation in Spending for Certain High-Cost Procedures Driven by Inpatient Prices

PRIVATE HEALTH INSURANCE. Geographic Variation in Spending for Certain High-Cost Procedures Driven by Inpatient Prices United Sttes Government Aountility Offie Report to the Rnking Memer, Committee on Energy nd Commere, House of Representtives Deemer 2014 PRIVATE HEALTH INSURANCE Geogrphi Vrition in Spending for Certin

More information

Enterprise Digital Signage Create a New Sign

Enterprise Digital Signage Create a New Sign Enterprise Digitl Signge Crete New Sign Intended Audiene: Content dministrtors of Enterprise Digitl Signge inluding stff with remote ess to sign.pitt.edu nd the Content Mnger softwre pplition for their

More information

1 GSW IPv4 Addressing

1 GSW IPv4 Addressing 1 For s long s I ve een working with the Internet protools, people hve een sying tht IPv6 will e repling IPv4 in ouple of yers time. While this remins true, it s worth knowing out IPv4 ddresses. Even when

More information

European Convention on Social and Medical Assistance

European Convention on Social and Medical Assistance Europen Convention on Soil nd Medil Assistne Pris, 11.XII.1953 Europen Trety Series - No. 14 The governments signtory hereto, eing memers of the Counil of Europe, Considering tht the im of the Counil of

More information

Forensic Engineering Techniques for VLSI CAD Tools

Forensic Engineering Techniques for VLSI CAD Tools Forensi Engineering Tehniques for VLSI CAD Tools Jennifer L. Wong, Drko Kirovski, Dvi Liu, Miorg Potkonjk UCLA Computer Siene Deprtment University of Cliforni, Los Angeles June 8, 2000 Computtionl Forensi

More information

Multi-level Visualization of Concurrent and Distributed Computation in Erlang

Multi-level Visualization of Concurrent and Distributed Computation in Erlang Multi-level Visuliztion of Conurrent nd Distriuted Computtion in Erlng Roert Bker r440@kent..uk Peter Rodgers P.J.Rodgers@kent..uk Simon Thompson S.J.Thompson@kent..uk Huiqing Li H.Li@kent..uk Astrt This

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

J. Q. Mou, Fukun Lai, I. B. L. See, and W. Z. Lin Data Storage Institute, 5 Engineering Drive 1, Singapore 117608

J. Q. Mou, Fukun Lai, I. B. L. See, and W. Z. Lin Data Storage Institute, 5 Engineering Drive 1, Singapore 117608 Anlysis of Noteook Computer Cssis Design for rd Disk Drive nd Speker Mounting J. Q. Mou, Fukun Li, I. B. L. See, nd W. Z. Lin Dt Storge Institute, 5 Engineering Drive 1, Singpore 117608 Astrt - Cssis design

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Simulation of a large electric distribution system having intensive harmonics in the industrial zone of Konya

Simulation of a large electric distribution system having intensive harmonics in the industrial zone of Konya Turkish Journl of Eletril Engineering & omputer Sienes http:// journls. tuitk. gov. tr/ elektrik/ Reserh rtile Turk J Ele Eng & omp Si (2013) 21: 934 944 TÜİTK doi:10.3906/elk-1201-55 Simultion of lrge

More information

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00 Chter 19, exmle rolems: (19.06) A gs undergoes two roesses. First: onstnt volume @ 0.200 m 3, isohori. Pressure inreses from 2.00 10 5 P to 5.00 10 5 P. Seond: Constnt ressure @ 5.00 10 5 P, isori. olume

More information

MATH PLACEMENT REVIEW GUIDE

MATH PLACEMENT REVIEW GUIDE MATH PLACEMENT REVIEW GUIDE This guie is intene s fous for your review efore tking the plement test. The questions presente here my not e on the plement test. Although si skills lultor is provie for your

More information

1 Fractions from an advanced point of view

1 Fractions from an advanced point of view 1 Frtions from n vne point of view We re going to stuy frtions from the viewpoint of moern lger, or strt lger. Our gol is to evelop eeper unerstning of wht n men. One onsequene of our eeper unerstning

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Arhiteture nd Dt Flows Referene Guide BES12 Version 12.3 Pulished: 2015-10-14 SWD-20151014125318579 Contents Aout this guide... 5 Arhiteture: BES12 EMM solution... 6 Components used to mnge BlkBerry 10,

More information

Fluent Merging: A General Technique to Improve Reachability Heuristics and Factored Planning

Fluent Merging: A General Technique to Improve Reachability Heuristics and Factored Planning Fluent Merging: A Generl Tehnique to Improve Rehility Heuristis n Ftore Plnning Menkes vn en Briel Deprtment of Inustril Engineering Arizon Stte University Tempe AZ, 85287-8809 menkes@su.eu Suro Kmhmpti

More information

THE LONGITUDINAL FIELD IN THE GTEM 1750 AND THE NATURE OF THE TERMINATION.

THE LONGITUDINAL FIELD IN THE GTEM 1750 AND THE NATURE OF THE TERMINATION. THE LONGITUDINAL FIELD IN THE GTEM 175 AND THE NATURE OF THE TERMINATION. Benjmin Guy Loder Ntionl Physil Lbortory, Queens Rod, Teddington, Middlesex, Englnd. TW11 LW Mrtin Alexnder Ntionl Physil Lbortory,

More information

SECTION 7-2 Law of Cosines

SECTION 7-2 Law of Cosines 516 7 Additionl Topis in Trigonometry h d sin s () tn h h d 50. Surveying. The lyout in the figure t right is used to determine n inessile height h when seline d in plne perpendiulr to h n e estlished

More information

Seeking Equilibrium: Demand and Supply

Seeking Equilibrium: Demand and Supply SECTION 1 Seeking Equilirium: Demnd nd Supply OBJECTIVES KEY TERMS TAKING NOTES In Setion 1, you will explore mrket equilirium nd see how it is rehed explin how demnd nd supply intert to determine equilirium

More information

On Equivalence Between Network Topologies

On Equivalence Between Network Topologies On Equivlene Between Network Topologies Tre Ho Deprtment of Eletril Engineering Cliforni Institute of Tehnolog tho@lteh.eu; Mihelle Effros Deprtments of Eletril Engineering Cliforni Institute of Tehnolog

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Quick Guide to Lisp Implementation

Quick Guide to Lisp Implementation isp Implementtion Hndout Pge 1 o 10 Quik Guide to isp Implementtion Representtion o si dt strutures isp dt strutures re lled S-epressions. The representtion o n S-epression n e roken into two piees, the

More information

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus?

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus? UNIT 18 Dt Seurity 1 STARTER Wht stories do you think followed these hedlines? Compre nswers within your group. 1 Love ug retes worldwide hos. 2 Hkers rk Mirosoft softwre odes. 3 We phone sm. Wht other

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

SOLVING EQUATIONS BY FACTORING

SOLVING EQUATIONS BY FACTORING 316 (5-60) Chpter 5 Exponents nd Polynomils 5.9 SOLVING EQUATIONS BY FACTORING In this setion The Zero Ftor Property Applitions helpful hint Note tht the zero ftor property is our seond exmple of getting

More information

Application of high-speed line scan camera for acoustic measurements of vibrating objects

Application of high-speed line scan camera for acoustic measurements of vibrating objects Applition of high-speed line sn mer for ousti mesurements of virting ojets Mirko Mustonen, Dmitri Krtofelev, Antoli Stulov Lortory of Nonliner Dynmis, Institute of Cyernetis t Tllinn University of Tehnology,

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

2. Use of Internet attacks in terrorist activities is termed as a. Internet-attack b. National attack c. Cyberterrorism d.

2. Use of Internet attacks in terrorist activities is termed as a. Internet-attack b. National attack c. Cyberterrorism d. Moule2.txt 1. Choose the right ourse of tion one you feel your mil ount is ompromise?. Delete the ount b. Logout n never open gin. Do nothing, sine no importnt messge is there. Chnge psswor immeitely n

More information

INSTALLATION, OPERATION & MAINTENANCE

INSTALLATION, OPERATION & MAINTENANCE DIESEL PROTECTION SYSTEMS Exhust Temperture Vlves (Mehnil) INSTALLATION, OPERATION & MAINTENANCE Vlve Numer TSZ-135 TSZ-150 TSZ-200 TSZ-275 TSZ-392 DESCRIPTION Non-eletril temperture vlves mnuftured in

More information

SOLVING QUADRATIC EQUATIONS BY FACTORING

SOLVING QUADRATIC EQUATIONS BY FACTORING 6.6 Solving Qudrti Equtions y Ftoring (6 31) 307 In this setion The Zero Ftor Property Applitions 6.6 SOLVING QUADRATIC EQUATIONS BY FACTORING The tehniques of ftoring n e used to solve equtions involving

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Analysis of Algorithms and Data Structures for Text Indexing Moritz G. Maaß

Analysis of Algorithms and Data Structures for Text Indexing Moritz G. Maaß FAKULTÄT FÜR INFORMATIK TECHNISCHE UNIVERSITÄT MÜNCHEN Lehrstuhl für Effiziente Algorithmen Anlysis of Algorithms nd Dt Strutures for Text Indexing Moritz G. Mß FAKULTÄT FÜR INFORMATIK TECHNISCHE UNIVERSITÄT

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Orthodontic marketing through social media networks: The patient and practitioner s perspective

Orthodontic marketing through social media networks: The patient and practitioner s perspective Originl rtile Orthodonti mrketing through soil medi networks: The ptient nd prtitioner s perspetive Kristin L. Nelson ; Bhvn Shroff ; l M. Best ; Steven J. Linduer d BSTRCT Ojetive: To (1) ssess orthodonti

More information

The remaining two sides of the right triangle are called the legs of the right triangle.

The remaining two sides of the right triangle are called the legs of the right triangle. 10 MODULE 6. RADICAL EXPRESSIONS 6 Pythgoren Theorem The Pythgoren Theorem An ngle tht mesures 90 degrees is lled right ngle. If one of the ngles of tringle is right ngle, then the tringle is lled right

More information

Maximum area of polygon

Maximum area of polygon Mimum re of polygon Suppose I give you n stiks. They might e of ifferent lengths, or the sme length, or some the sme s others, et. Now there re lots of polygons you n form with those stiks. Your jo is

More information

GENERAL OPERATING PRINCIPLES

GENERAL OPERATING PRINCIPLES KEYSECUREPC USER MANUAL N.B.: PRIOR TO READING THIS MANUAL, YOU ARE ADVISED TO READ THE FOLLOWING MANUAL: GENERAL OPERATING PRINCIPLES Der Customer, KeySeurePC is n innovtive prout tht uses ptente tehnology:

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

End-to-end development solutions

End-to-end development solutions TECHNICAL SERVICES Endtoend development solutions Mnged y TFE HOTELS TFE Hotels re the only Austrlin Hotel group with inhouse end to end development solutions. We hve expertise in Arhiteturl nd Interior

More information

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013 Utiliztion of Smoking Cesstion Benefits in Medicid Mnged Cre, 2009-2013 Office of Qulity nd Ptient Sfety New York Stte Deprtment of Helth Jnury 2015 Introduction According to the New York Stte Tocco Control

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Chap.6 Surface Energy

Chap.6 Surface Energy Chp.6 urfe Energy (1) Bkground: Consider the toms in the bulk nd surfe regions of rystl: urfe: toms possess higher energy sine they re less tightly bound. Bulk: toms possess lower energy sine they re muh

More information

GAO POSTSECONDARY EDUCATION. Student Outcomes Vary at For-Profit, Nonprofit, and Public Schools. Report to Congressional Requesters

GAO POSTSECONDARY EDUCATION. Student Outcomes Vary at For-Profit, Nonprofit, and Public Schools. Report to Congressional Requesters GAO United Sttes Government Aountbility Offie Report to Congressionl Requesters Deember 2011 POSTSECONDARY EDUCATION Outomes Vry t For-Profit, Nonprofit, nd Publi Shools GAO-12-143 Contents Letter 1 Limited

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

ACCOUNTING IN THE CLOUD

ACCOUNTING IN THE CLOUD ACCOUNTING IN THE CLOUD Otili Dimitriu "Alexndru Ion Cuz" University of Isi, Romni dimitriu.otili88@yhoo.om Mrin Mtei "Alexndru Ion Cuz" University of Isi, Romni mri_mrtinik@yhoo.om Abstrt: Aounting in

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

S-Scrum: a Secure Methodology for Agile Development of Web Services

S-Scrum: a Secure Methodology for Agile Development of Web Services Worl of Computer Siene n Informtion Tehnology Journl (WCSIT) ISSN: 2221-0741 Vol. 3, No. 1, 15-19, 2013 S-Srum: Seure Methoology for Agile Development of We Servies Dvou Mougouei, Nor Fzli Moh Sni, Mohmm

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

TOA RANGATIRA TRUST. Deed of Trust 3714386.2

TOA RANGATIRA TRUST. Deed of Trust 3714386.2 TOA RANGATIRA TRUST Deed of Trust 1 Deed dted 2011 Prties 1 Te Runng o To Rngtir Inorported n inorported soiety hving its registered offie t Poriru (the Runng ) Bkground A B C D The Runng is n inorported

More information

7 mm Diameter Miniature Cermet Trimmer

7 mm Diameter Miniature Cermet Trimmer 7 mm Dimeter Miniture Cermet Trimmer A dust seled plsti se proteting qulity ermet trk gurntees high performne nd proven reliility. Adjustments re mde esier y the ler sle redings. is idelly suited to ll

More information

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide VMwre Horizon FLEX Administrtion Guide Horizon FLEX 1.0 This doument supports the version of eh produt listed nd supports ll susequent versions until the doument is repled y new edition. To hek for more

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Would your business survive a crisis? A guide to business continuity planning. www.staffordbc.gov.uk

Would your business survive a crisis? A guide to business continuity planning. www.staffordbc.gov.uk Would your usiness survive risis? A guide to usiness ontinuity plnning www.stfford.gov.uk 2 A guide to Business Continuity Plnning A guide to usiness ontinuity plnning Contents The Lw Wht type of inidents

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Radial blowers with AC motor

Radial blowers with AC motor Rdil lowers with AC motor Generl informtion Desription 32 Rdil lowers, motor diretly mounted RL, RLF, RLD, RLA, RLE, RLS 33 Rdil lowers with doule housing 37 Rdil lowers, motor deoupled mounted, high temperture

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

If two triangles are perspective from a point, then they are also perspective from a line.

If two triangles are perspective from a point, then they are also perspective from a line. Mth 487 hter 4 Prtie Prolem Solutions 1. Give the definition of eh of the following terms: () omlete qudrngle omlete qudrngle is set of four oints, no three of whih re olliner, nd the six lines inident

More information

Exploring Image Virality in Google Plus

Exploring Image Virality in Google Plus Exploring Imge Virlity in Google Plus Mro Guerini Trento RISE Trento - Itly Emil: mro.guerini@trentorise.eu Jopo Stino University of Trento Trento - Itly Emil: stino@disi.unitn.it Dvide Alnese Fondzione

More information

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001 KEY SKILLS INFORMATION TECHNOLOGY Level 3 Question Pper 29 Jnury 9 Ferury 2001 WHAT YOU NEED This Question Pper An Answer Booklet Aess to omputer, softwre nd printer You my use ilingul ditionry Do NOT

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information