How To Connect Two Servers Together In A Data Center Network

Size: px
Start display at page:

Download "How To Connect Two Servers Together In A Data Center Network"

Transcription

1 DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech University Xi an, ShanXi 77, China Lixin Gao ECE Department University of Massachusetts Amherst, MA 3, USA Abstract Data centers are becoming increasingly important infrastructures for many essential applications such as ata intensive computing an large-scale network services. A typical future ata center can consist of up to hunres of thousans of servers. Yet, the conventional ata center networks are not able to keep up with the network banwith requirement for efficiently connecting that huge number of servers in a cost-efficient manner. In this paper, we present DPillar, a highly scalable ata center interconnection architecture, which uses only low-en off-theshelf commoity PC servers an switches. DPillar has minimal requirements for the equipment. The switches are low-cost plugan-play layer- evices an servers are ual-port commoity PCs. The salient feature of DPillar is that it expans to any number of servers without requiring to physically upgrae the existing servers. We present simple yet efficient routing schemes for DPillar an evaluate the routing performance via simulations. I. INTRODUCTION Data centers with a cluster of commoity servers become common places for ata storage, ata analysis, an running large-scale network services [1,]. Such a ata center infrastructure is riven by the eman of petabyte of ata storage an high computation power require for processing the ata. It is commonly projecte that the eman for ata storage an processing will grow rapily as more ata are available for applications such as web searching, meical image processing, social network mining, an scientific computing. To meet the eman of the growth, one of the essential requirements for ata center infrastructure is that it must scale to hunres of thousans or millions of servers. While inexpensive commoity PCs make it possible to expan a ata center to millions of servers, interconnecting these servers in a scalable an cost-efficient fashion can be challenging. With a ata center of increasing server number an storage size, the communication banwith has to scale more than linearly (or squarely) to meet the banwith eman of frequent ata accessing an shuffling in istribute ata processing an storage. In orer to keep the interconnection cost low, one natural choice for interconnecting these servers is to leverage commoity harware such as inexpensive Ethernet switches an the existing network cars in commoity servers. So far, there are two approaches for interconnecting servers with commoity switches. The first approach is switch centric where the switch functionality is extene to accommoate the nee of the interconnection, while requiring no moification to the servers [3] [5]. The secon approach is server centric where each server acts as both ata processing/storage an ata relay noe while requiring no change to the switches [6] [8]. In this paper, we take a server centric approach an propose a server interconnection structure calle DPillar. Each server in a DPillar network is a computation workstation as well as an intermeiate noe relaying ata between other servers. A server centric esign offers several attractive avantages as compare to a switch centric esign. First, shifting the networking functionalities from a separate switching fabric to the servers provies much higher egree of programming capability, which facilitates the esign of intelligent routing schemes. Secon, a server centric esign is much more costefficient because it uses only low-en layer- ummy switches. The network structure of DPillar resembles existing multistage interconnection schemes [9,]. owever, DPillar offers several practical avantages in builing large size an scalable ata centers. DPillar aims to leverage plug-an-play commoity Ethernet switches with only layer- switching capability. Ethernet switches with moerate number of ports (e.g., 4 or 48 ports) an with the ability to switch at line spee are wiely available an relatively inexpensive. Layer- Ethernet switches also have the avantage of requiring minimal configuration effort as they are basically plug-an-play evices. Further, DPillar requires only two network interfaces for each server. As most off-the-shelf PC servers an servers in existing ata centers alreay have two high-spee Gbit Ethernet ports, one primary port an one backup port, there is no nee to physically upgrae the servers when using new commoity servers or reusing servers in existing ata centers to buil a DPillar ata center. When expaning an existing DPillar network with aitional servers, it is not require to upgrae existing servers in the ata center either (note that although upgraing servers like installing aitional NICs is cheap in terms of the equipment cost, but the time an human power neee to upgrae tens or hunres of thousans servers are very expensive). Therefore, DPillar can scale to any number of servers with minimal eployment overhea. Despite the fact that each server has only two network interfaces, DPillar offers rich connections between servers an the aggregate banwith can facilitate ata-intensive applications. A DPillar network structure is totally symmetric, so that it removes any network bottleneck at the architecture level. We have esigne a simple yet highly efficient routing scheme

2 for DPillar network. One salient feature of the propose routing scheme is that it eliminates the nee of oing table lookup in packet forwaring. Our prototyping implementation using commoity PC shows that the PC servers can perform ata forwaring in line spee without consuming significant resources at the servers [11]. Therefore, such an interconnection structure is feasible for the server centric approach. Furthermore, we propose routing schemes that can efficiently hanle a wie range of failures in DPillar network. The rest of this paper is organize as follows. Section II presents the topological structure of the DPillar network. Section III an section IV are evote to the iscussion of routing in DPillar network. Section V presents the performance evaluation of DPillar. Section VI conclues this paper. II. INTERCONNECTION OF DPILLAR In this section, we first present the interconnection structure of DPillar. Then we iscuss the topological properties of DPillar an the cost of builing such a network. We also iscuss the ifferences between DPillar an a closely relate multi-stage interconnection network. A. DPillar Network Structure A DPillar network is built of two kins of evices, ual-port servers an n-port switches. The servers are arrange into k columns an so are the switches. ence, a DPillar network is uniquely efine by two parameters, n an k. We call such a DPillar network an (n, k) DPillar network. We use k 1 to represent the k server columns an S S k 1 to represent the k switch columns. The k server columns an k switch columns are alternately place along a cycle, as shown in Fig. 1. Visually, it looks like thek columns of servers an switches are attache to the cylinrical surface of a pillar. Using its two ports, a server in each server column is connecte to two switches in its two neighboring switch columns. In other wors, for a server in column i, one of its ports is connecte to a switch in column S i an the other port is connecte to a switch in column S (i+k 1)%k. For a switch in column S i, half of its n ports are connecte to n/ servers in i an the other half are connecte to n/ servers in (i+1)%k. For easy escription, in the rest we call server column (i+1)%k a clockwise neighboring column of i an (i+k 1)%k a counter-clockwise neighboring column of i.... S 1 Si -1 1 counter- clockwise clockwise S i Si... k-1 Sk-1 Fig. 1. The vertical view of a DPillar network. In a DPillar network with k columns of servers, each server column has (n/) k servers; each switch column has (n/) k 1 switches. For the(n/) k servers in any server column i, each of them is assigne with a unique k-symbol label (ν k 1...ν ), where ν i [,n/ 1] ( i k 1). Uner this naming scheme, one server in DPillar can be uniquely ientifie as (C,ν k 1...ν ), which means a server with label (ν k 1...ν ) in server column C. We call (C,ν k 1...ν ) the ID or the aress of the server. Given the IDs of the servers in a DPillar network, the interconnection between the servers an the switches is as follows. For all the (n/) k servers in any server column C an its clockwise neighboring server column (C+1)%k, they can be ivie into (n/) k 1 groups, with each group having n servers. The labels of the n servers in the same group have the following property. That is, their labels are the same if the Cth symbol (i.e., symbol ν C ) is remove. It is easy to see that among the n servers within the same group, half of them are from C an the other half are from (C+1)%k. The n servers in the same group are connecte to the same switch in switch column S C. In other wors, given any label (ν k 1...ν C...ν ), there are n/ servers in C whose labels are (ν k 1...ν C...ν ) where ν C n/ 1; there are n/ such servers in (C+1)%k too. Those n servers are connecte to the same n-port switch in S C. label Fig S 1 S Two-imension view of a DPillar network. Fig. shows an (8,) DPillar network (note that we uplicate server column ). Each server column has ( 8 ) = 16 servers. The label of each server has two symbols. The first row of servers in Fig. have label () an the last row of servers have label(33). If we select a label(ν 1 ν )=(), there are four servers in 1 whose labels are (ν 1 ) with ν 1 3, i.e., (), (), (), an (3). There are four servers in whose labels are (), (), (), an (3) too. Those eight servers are connecte to the same switch in switch column S 1. B. DPillar Topological Properties After presenting the interconnection of DPillar, we procee to stuy the basic topological properties of DPillar. 1) Number of servers: Since each server column has (n/) k servers, there are k(n/) k servers in an (n,k) DPillar network. Let N represent the total number of servers in an (n,k) DPillar network, we have N = k(n/) k. Consiering that 48-port Gbit Ethernet switches are wiely available now an relatively inexpensive, a (48, 3) DPillar network has 41,47 servers. The number of servers will be about 1.3 million for a (48,4) DPillar network. If we buil a (48, 5) DPillar network, it has about 4 million servers. ) Number of switches: As we have mentione, each switch column has (n/) k 1 switches in an (n,k) DPillar network. As there are k switch columns, the total number

3 of switches is k(n/) k 1. Actually, there is an explanation why there are (n/) k 1 switches in each switch column. If we change all other symbols in label (ν k 1...ν C...ν ) except symbol ν C, there are (n/) k 1 ifferent combinations. Each of those (n/) k 1 combinations requires one switch to connect n servers whose labels are (ν k 1...ν C...ν ) where ν C n/ 1. Therefore, the number of switches in each switch column is (n/) k 1 an the total number of switches in an (n,k) DPillar network is k(n/) k 1. 3) Bisection with: Bisection with is an important criterion to quantify the performance of an inter-connection network. It is efine as the smallest number of eges removal of which ivies the noes in the network into two parts of equal size. Larger bisection with means the network can sustain more communications between noes, which is important for running communication intensive applications like MapReuce [1]. The bisection with of an (n, k) DPillar network is (n/) k, as state in Proposition II.1. The proof is presente in [11]. Proposition II.1 The bisection with of an (n, k) DPillar network is close to (n/) k. C. Builing Cost DPillar network is cost-efficient as it uses inexpensive commoity harware. ere we provie some example bugets of builing DPillar networks. We ignore the cost of servers an focus on the networking evices (switches an Ethernet cables). As most off-the-shelf servers alreay integrate ualport interfaces, there is no nee to invest on NICs. TABLE I shows the total cost an the per-server cost of builing DPillar networks with four servers columns, when ifferent types of switches are use. The prices for the four types of switches are gotten from an online retailing store ( an we assume each cable costs $1. We expect their wholesale price woul be even lower. In general, letting U s be the unit price of a n-port switch an U c be the unit price of an Ethernet cable, the average cost of connecting one server in the DPillar network is (U s /n+u c ). TABLE I TE COST OF TE NETWORKING DEVICES WEN USING FOUR TYPES OF SWITCES TO BUILD DPILLAR NETWORKS WIT FOUR SERVER COLUMNS. switch type 8-port 16-port 4-port 48-port switch unit price $5 $15 $18 $6 # of servers 1,4 16,384 8,944 1,37,4 networking cost $14,848 $339,968 $1,4,48 $35,831,88 per-server cost $14.5 $.75 $17 $7 D. Contrasting DPillar an Existing Network Structure Our DPillar network is closely relate to wrappe butterfly network [9], which is one of the multi-stage interconnection networks extensively stuie before. owever, the servers in a wrappe butterfly network must have four ports. Because most commoity servers an servers in existing ata centers integrate only two ports, we have to physically upgrae the servers if using a wrappe butterfly network to interconnect them. Although the cost of investing aitional network interfaces is not an issue, installing those interfaces in a large number of servers can be quite time an manpower consuming. By connecting the servers via switches, DPillar can use offthe-shelf an existing ual-port servers to buil a scalable ata center network. The bisection with or an (n,k) DPillar network is equal to the number of servers in each server column. A wrappe butterfly network also has this property [9]. owever, a wrappe butterfly network uses egree 4 noes, but DPillar achieves the same bisection with using egree noes. III. ROUTING IN DPILLAR NETWORK Because of its symmetric structure, routing in DPillar network can be simple an efficient. In this section, we first escribe the packet forwaring process in DPillar, base on which we esign an efficient DPillar routing algorithm. We also briefly iscuss the performance of the routing algorithm. A. Two-Phase Packet Forwaring in DPillar The packet forwaring process in DPillar can be ivie into two phases. In the first phase, the packet is forware from the source server to an intermeiate server whose label is the same as the estination s label. In the secon phase, the packet is sent from that intermeiate server to the estination. We consier a source server s sens a packet to estination server. The aresses of those two servers are (C s,l s ) an (C,L ), where L s an L are the k-symbol labels of s an, i.e., L s =(ν k 1 s...ν s), L =(ν k 1...ν ), an L s L. 1) Phase one helix phase: From server s in column Cs, the packet can be sent to a server s 1 in column (Cs+1)%k. The labels of s an s 1 are the same except the C s th symbol of s 1 s label can be any number in [,n/ 1]. If s 1 sens the packet to s in column (Cs+)%k, the labels of s 1 an s s are the same except that the ((C s + 1)%k)th symbol of s s label can be any number in [,n/ 1]. We see that forwaring a packet one hop can change one symbol in the label of the server receiving that packet. When a packet is always forware from one server column to its clockwise neighboring server column, the packet can reach a server with any given label in k hops. For example, in an (n,k) DPillar network, the trace of a packet forware from (,...) to (k 1,1...1) is (,...) (1,...1) (,...11) (k 1,1...1). As this path resembles a helix, we call this packet forwaring phase the helix phase. Note that in the helix phase, we can sen the packet to either a server in the clockwise neighboring column or a server in the counter-clockwise neighboring column. owever, the irection of forwaring a packet shoul not be change back an forth in orer to avoi loops. Some fiel in the packet heaer can be use to recor the forwaring irection information of this packet. In DPillar routing, the efault irection of forwaring a packet in the helix phase is the clockwise irection. ) Phase two ring phase: After the packet is forware to server, whose label is the same as the label of estination, one can forwar the packet to by always sening it to the server in the clockwise neighboring column whose label is L too, or sening along the counter-clockwise irection. We select the shorter one among those two paths in our DPillar routing. In other wors, suppose server is in column C,

4 sens the packet to a server in column (C +1)%k if(c + k C )%k k ; otherwise server sens the packet to a server in column (C +k 1)%k. In either case, the label of the nexthop server shoul be L. As the trace of the packet forwaring in this phase is like a segment in a ring, we call it the ring phase. B. Routing Algorithm Algorithm 1 shows the pseuocoe of the routing algorithm. This algorithm takes the aress of the server running this algorithm (C s,l s ), the estination server s aress (C,L ), an the forwaring irection D as input parameters. D=1 means the irection is clockwise;d= 1 inicates the counterclockwise irection. The efault value of D shoul be 1. The output is the aress of the nexthop server (C u,l u ). Algorithm 1: SRoute(C s,l s,c,l,d) input : (C s,l s) is the aress of the server running this algorithm. (C,L ) is the estination. D is the forwaring irection recore in the packet heaer (either 1 or 1). L s=(νs k 1...νs), L =(ν k 1...ν). output : Aress of the nexthop server (C u,l u). /* L s νs Cs means removing the C sth symbol from label L s */ 1 if {(C +k-c s)%k 1 an L s-νs Cs == L -ν Cs } or {(C s+k-c )%k 1 an L -ν C ==Ls-νC s } then C u C ; L u L ; 3 else /* s cannot irectly reach */ 4 if L s == L then /* the ring phase */ 5 L u L ; 6 if (C +k C s)%k k then Cu (Cs +1)%k; 7 else C u (C s +k 1)%k; 8 else /* the helix phase */ 9 L u (νs k 1...ν...ν s s); C u (C s +D +k)%k; return (C u,l u); The DPillar routing presente in Algorithm 1 oes not compute the shortest path between two servers. owever, the paths compute by Algorithm 1 have boune length. ere we stuy what is the length of the longest path in a DPillar network. In counting the path length, we treat the istance between two servers connecting to the same switch as one hop, because the switches are ummy layer- connection meia. From source server s, a packet nees to be forware at most k times to reach a server, whose label is the same as estination server s label. After that, from server, the packet still nees to be forware at most k/ hops to reach server. Therefore, in an (n, k) DPillar network, the longest path compute by Algorithm 1 is k + k/. IV. ANDLING FAILURES IN DPILLAR The rich connections in DPillar facilitate the esign of simple yet efficient fault-tolerant routing scheme. In this section, we present the esign of a fault-tolerant routing algorithm which can bypass a wie range of failures in DPillar. A. Discovering Failures To bypass failures in DPillar network, the first step woul be etecting the failures. Each server in DPillar runs a lightweight ello protocol to report the reachability to other servers connecte to the same switches. If a server a oes not hear ello message from server b for a certain perio of time, a assumes b is not irectly reachable. Servers shoul not forwar any ello messages. After iscovering the failures, the next question woul be how to bypass those failures. In the following, we iscuss how to bypass failures when the packet forwaring is in the helix phase an the ring phase, respectively. B. Bypassing Failures in elix Phase In bypassing failures in the helix phase, our goal is to etour a packet so that it can still reach a server whose label is the same as the estination of that packet. After that, the packet is forware in the ring phase an section IV-C iscusses how to bypass failures in the ring phase. Our fault-tolerant routing scheme works in the following three steps in the helix phase: (1) if a nexthop server in the clockwise neighboring column is not reachable, we first try to sen the packet to another irectly reachable server in the clockwise neighboring column; () if none of the servers in the clockwise neighboring column is irectly reachable, the packet takes a u-turn an be forware to a server in the counter-clockwise neighboring column; (3) after the u-turn, the packet shoul be forware along the counter-clockwise irection throughout the helix phase. label Fig. 3. A (4, 3) DPillar network example. 1) Bypassing a faile clockwise server: Suppose server s sens a packet to estination. Accoring to Algorithm 1, s shoul sen the packet to nexthop u. If s fins that u is not irectly reachable any longer, s shoul try to bypass the faile server u. owever, simply forwaring the packet to an alternative clockwise nexthop can cause loops in some scenarios. For example, in Fig. 3, when server (,) sens a packet to (,1), Algorithm 1 tells us the ID of the nexthop shoul be (1,1). If server (1,1) has faile an server (,) tries to bypass that failure by sening the packet to server (1,), the path taken by the packet will be (,) (1,) (,) (,), which is a loop. The reason for the loop to occur is that, server s tries to bypass u an sens the packet to server v, but s is in the path (compute by Algorithm 1) from v to a server whose label is the same as estination. To avoi this loop, we can let v sen the packet to a clockwise neighbor w, so that neither s nor u is in the path from w to a server whose label is the same as estination. For example, if (1,) forwars the packet to (,), the path taken by the packet will be (,) (1,) (,) (,) (1,11) (,1)

5 We use tunneling to ensure the packet is forware from s to w (they are two hops away) without using the faile server u. In the above example, server (,) encapsulates the packet with another heaer, whose estination is set to (,). Tunneling the packet between (,) an (,) makes sure the path of the encapsulate packet is (,) (1,) (,). Therefore, the faile server (1,1) is bypasse. We conclue the iscussion into Proposition IV.1. Note that we omit the %k in presenting the inexes for clarity. Proposition IV.1 When sening a packet to estination (C,ν k 1...ν ), server (C s,νs k 1...νs) can bypass server (C s + 1,νs k 1...ν Cs...ν s) by tunneling the packet to (C s +,νs k 1...νw Cs+1 νw Cs...νs), if νw Cs ν Cs an νw Cs+1 νs Cs+1. Proof: Due to the symmetry of DPillar, without losing generality, we consier servers(,νs k 1...νs), bypasses server (1,νs k 1...νsν 1 ) in reaching estination (C,ν k 1...ν ). Server s tunnels the packet to server w, whose aress is (,νs k 1...νwν 1 w), where νw ν an ν1 w νs 1. To tunnel the packet from s to w, the nexthop is (1,νs k 1...νsν 1 w). Because νw ν, that nexthop is not the faile server (1,νs k 1...νsν 1 ). After the packet is forware from w to server s in column, the aress of s is (,ν k 1...νwν 1 w). As νw ν 1 s 1, s is not s. Server s forwars the packet to server s 1 in column 1 whose aress is (,ν k 1...νwν 1 ). Because ν1 w νs 1, s 1 is not the faile server (1,νs k 1...νsν 1 ). After s 1 forwars the packet, it reaches a server in whose label is the same as the estination. ) Making a packet u-turn : Proposition IV.1 assumes a server can always forwar a packet to another server in its clockwise neighboring column in the helix phase. owever, it is possible that server s cannot sen the packet to any servers in its clockwise neighboring column, e.g., the server (,) in Fig. 3 has a link failure so it is isconnecte from the top switch between an 1, or the top switch between an 1 has faile. In that case, server s nees to change the packet forwaring irection (make a u-turn ) to bypass the failure, i.e., if a packet cannot be forware to a server in the clockwise irection, it shoul be forware to a server in the counter-clockwise neighboring column. The forwaring irection information shoul be recore in the packet heaer, so that other servers will forwar this packet along the new irection. Similar to the rationale behin Proposition IV.1, we can prove the following Proposition IV.. Again, the %k is omitte in presenting the inexes for clarity. Proposition IV. When sening a packet to estination (C,ν k 1...ν ), if server (C s,νs k 1...νs) cannot reach any server in Cs+1, it can bypass the failure by changing the packet forwaring irection an sening the packet to server (C s 1, νs k 1...νw Cs 1...νs), where νw Cs 1 νs Cs 1. Proof: We consier that server s, whose ID is (,νs k 1...νs), sens a packet to estination (C,ν k 1...ν ) but s cannot reach any server in 1. To bypass the failure, server s changes the forwaring irection of the packet an sens it to nexthop w, whose ID is (k 1,νw k 1...νs), where νw k 1 νs k 1. After the packet is forware along the counter-clockwise irection from w to some server s 1 in 1, the aress of s 1 is (1,νw k 1...ν ν1 ν s). Because νw k 1 νs k 1, s 1 is not connecte to server s by the same switch. After s 1 forwars the packet to some server s in, s s aress is (,νw k 1...ν ). Because νw k 1 νs k 1, s is not s so no loop occurs. After s forwars the packet to server s k 1 in column k 1, the packet reaches a server whose label is the same as estination server. 3) Bypassing a faile counter-clockwise server: Once the forwaring irection of a packet is change, it is recore in the packet heaer an all servers shoul forwar the packet along the new irection. To avoi potential forwaring loops, if the forwaring irection of a packet was change before, we shoul not change its forwaring irection again. Suppose server s selects a counter-clockwise neighbor u as the nexthop accoring to Algorithm 1, if u is unreachable an there are other reachable counter-clockwise neighbors, s can bypass the failure accoring to the following Proposition IV.3. For a packet whose irection was change from clockwise to counter-clockwise an it cannot be forware along the new irection (no server in the counter-clockwise neighboring column is irectly reachable), the packet shoul be roppe. Proposition IV.3 When sening a packet to estination (C,ν k 1...ν ), server (C s,νs k 1...νs) can bypass server (C s 1,νs k 1...ν Cs 1...νs) by tunneling the packet to (C s,νs k 1...νw Cs 1 νw Cs...νs), if νw Cs 1 ν Cs 1 an ν Cs w νs Cs. The proof of Proposition IV.3 is similar to the proof of Proposition IV.1. We omit it here to save space. C. Bypassing Failures in Ring Phase Bypassing a faile server in the ring phase is relatively straightforwar. As there are two ways to forwar a packet to the estination in the ring phase, the clockwise irection or the counter-clockwise irection, if it cannot be forware along one irection, a packet shoul be forware along the other irection. To avoi forwaring loops, the forwaring irection of a packet shoul not be change more than once. If a packet has change its forwaring irection in the ring phase an it encounters a faile server again, we rop that packet. D. Fault-tolerant Routing Algorithm Base on the above iscussions, we esign the DPillar fault tolerant routing algorithm as shown in Algorithm. FTRoute first calls SRoute to compute a nexthop (C w,l w ). Then FTRoute tests whether (C w,l w ) is reachable. If it is, FTRoute oes nothing; otherwise it tries to fin a new nexthop accoring to the basic ieas specifie in Proposition IV.1 IV.3. If the new nexthop is null, the packet shoul be roppe to prevent forwaring loops. V. EVALUATIONS In this section, we stuy the macroscopic behavior of DPillar by simulating the packet routing an forwaring in a large scale DPillar network, using a simulation tool evelope by ourselves. Please refer to [11] for the microscopic experiments in measuring the forwaring performance of DPillar.

6 Algorithm : FTRoute(C s,l s,c,l,d) input : (C s,l s) is the aress of the server running this algorithm. (C,L ) is the aress of the estination. D is the forwaring irection, either 1 or -1. output : Aress of the nexthop server (C w,l w). (C w,l w) = SRoute(C s,l s,c,l,d); if (C w,l w) is reachable then return (C w,l w); if L s==l then /* the ring phase */ if the packet irection was change then C w null; L w null; 6 else 7 if (C s +k C )%k k then Cw (Cs +1)%k; 8 else C w (C s +k 1)%k; 9 else /* the helix phase */ if the packet irection was change then 11 apply P roposition IV.3 to get new nexthop; 1 if nexthop exists then set C w an L w; 13 else C w null; L w null; else apply P roposition IV.1 to get new nexthop; if nexthop exists then set C w an L w; else change packet irection accoring to P roposition IV.; if nexthop exists then set C w an L w; else C w null; L w null; return (C w,l w); Average path length: In our simulations, we focus on a scenario where the DPillar network is built from 1-port switches, i.e., n = 1, an the number of server columns k varies. For each network, we ranomly select, sourceestination pairs an simulate packet routing an forwaring in the network. Fig. 4 plots the results of the average path lengths. As expecte, the average path length is proportional to the number of server columns in a DPillar network. For all server column k, the simulate average path length is always about % shorter than the maximum path length k+ k/. path length k: number of server columns Fig. 4. Average path length in DPillar routing. Average path length in failure-tolerant routing: We also stuy the fault-tolerant behavior of DPillar routing. In this simulation, we use a (1,4) DPillar network to conuct our experiments. In each simulation instance, we first ranomly fail a certain number of servers. Then we ranomly select, source-estination pairs an simulate the fault-tolerant routing scheme in Algorithm. We range the number of faile servers from 1 to 3 an plot the average path length as a function of the number of faile hosts. Our simulation results show that the average path length increases as there are more faile servers in the DPillar path length number of faile servers Fig. 5. Path length in fault-tolerant routing. network. owever, no packet rop occurs in our simulations, even when 3 servers in the DPillar network have faile. As a (1, 4) DPillar network has about 5, servers, 3 server failures mean 6% of the servers are faile. VI. CONCLUSION In this paper, we present DPillar, a scalable ata center network architecture which uses only commoity off-the-shelf harware. DPillar can easily scale to huge number of servers without imposing any aitional requirements to the evices, such as installing aitional NICs in the servers. The topology of DPillar is totally symmetric an a DPillar network has balance network capacity. DPillar is server centric an the networking intelligence is place in the servers. The switches use in DPillar are merely ummy layer- evices connecting the servers. We esigne simple yet efficient routing schemes for DPillar. Our experiment stuies show that the routing schemes are high-performance an efficient in bypassing failures in the network. ACKNOWLEDGMENT This work is partially supporte by NSF grants CNS an CNS Dong Yin was a visiting stuent at UMass, supporte by China State Scholarship Fun CSC-8698, when this work was performe. REFERENCES [1] Amazon elastic compute clou, [] L. Rabbe, Powering the Yahoo! network, Nov. 6. [Online]. Available: [3] M. Al-Fares, A. Loukissas, an A. Vahat, A scalable, commoity ata center network architecture, in Proceeings of SIGCOMM 8, 8. [4] R. N. Mysore an et al., Portlan: A scalable fault-tolerant layer ata center network fabric, in Proceeings of SIGCOMM 9, 9. [5] Cisco ata center infrastructure.5 esign guie, Dec. 7. [Online]. Available: ns7/c649/ccmigration 9186a pf [6] C. Guo,. Wu, K. Tan, L. Shi, Y. Zhang, an S. Lu, Dcell: a scalable an fault-tolerant network structure for ata centers, in Proceeings of SIGCOMM 8, 8. [7] D. Li, C. Guo,. Wu, K. Tan, Y. Zhang, an S. Lu, FiConn: Using backup port for server interconnection in ata centers, in Proceeings of INFOCOM 9, 9. [8] C. Guo, G. Lu, D. Li,. Wu, X. Zhang, Y. Shi, T. Chen, Y. Zhang, an S. Lu, BCube: A high performance, server-centric network architecture for moular ata centers, in Proceeings of SIGCOMM 9, 9. [9] F. T. Leighton, Introuction to Parallel Algorithms an Architectures: Arrays. Trees. ypercubes. Morgan Kaufmann, 199. [] M. Jeng an. Siegel, A fault-tolerant multistage interconnection network for multiprocessor systems using ynamic reunancy, in Proceeings of ICDCS 86, [11] Y. Liao, D. Yin, an L. Gao, Dpillar: Scalable ual-port server interconnection for ata center networks, Tech. Rep., 9. [Online]. Available: [1] J. Dean an S. Ghemawat, MapReuce: Simplifie ata processing on large clusters, in Proceeings OSDI 4, 4.

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Generalized DCell Structure for Load-Balanced Data Center Networks

Generalized DCell Structure for Load-Balanced Data Center Networks Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee,JunLi, Xinchao Zhang, Chuanxiong Guo,DavidRincón Swarthmore College, Duke University, Fudan University, Shanghai

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011

102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Dan Li, Member, IEEE, Chuanxiong Guo, Haitao

More information

Scalable live video streaming to cooperative clients using time shifting and video patching

Scalable live video streaming to cooperative clients using time shifting and video patching calable live vieo streaming to cooperative clients using time shifting an vieo patching Meng Guo, Mostafa H. Ammar {mguo, ammar}@cc.gatech.eu Networking an Telecommunication Group ollege of omputing, Georgia

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

zupdate: Updating Data Center Networks with Zero Loss

zupdate: Updating Data Center Networks with Zero Loss zupate: Upating Data Center Networks with Zero Loss Hongqiang Harry Liu Yale University hongqiang.liu@yale.eu Lihua Yuan Microsoft lyuan@microsoft.com Xin Wu Duke University xinwu@cs.uke.eu Roger Wattenhofer

More information

Data Center Network Topologies: FatTree

Data Center Network Topologies: FatTree Data Center Network Topologies: FatTree Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 22, 2014 Slides used and adapted judiciously

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

How To Build A Low Cost Data Center Network With Two Ports And A Backup Port

How To Build A Low Cost Data Center Network With Two Ports And A Backup Port 1 FiConn: Using Backup Port for Server Interconnection in Data Centers Dan Li, Chuanxiong Guo, Haitao Wu, Kun Tan, Yongguang Zhang, Songwu Lu Microsoft Research, Asia, University of California, Los Angeles

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Diamond: An Improved Fat-tree Architecture for Largescale

Diamond: An Improved Fat-tree Architecture for Largescale Diamond: An Improved Fat-tree Architecture for Largescale Data Centers Yantao Sun, Jing Chen, Qiang Liu, and Weiwei Fang School of Computer and Information Technology, Beijing Jiaotong University, Beijng

More information

SCADA (Supervisory Control and Data Acquisition) systems

SCADA (Supervisory Control and Data Acquisition) systems Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1423 1428 Improving security in SCADA systems through firewall policy analysis Onrej Rysavy Jaroslav Rab Miroslav

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

A Reliability Analysis of Datacenter Topologies

A Reliability Analysis of Datacenter Topologies A Reliability Analysis of Datacenter Topologies Rodrigo S. Couto, Miguel Elias M. Campista, and Luís Henrique M. K. Costa Universidade Federal do Rio de Janeiro - PEE/COPPE/GTA - DEL/POLI Email:{souza,miguel,luish}@gta.ufrj.br

More information

MEGA data centers have emerged as infrastructures for

MEGA data centers have emerged as infrastructures for IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 7, JULY 2013 1303 Expandable and Cost-Effective Network Structures for Data Centers Using Dual-Port Servers Deke Guo, Member, IEEE, Tao Chen, Member, IEEE,

More information

Static IP Routing and Aggregation Exercises

Static IP Routing and Aggregation Exercises Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................

More information

Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization

Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization Michele Mangili, Fabio Martignon an Antonio Capone LRI, Université Paris-Su {michele.mangili, fabio.martignon}@lri.fr

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

Dual-Centric Data Center Network Architectures

Dual-Centric Data Center Network Architectures Dual-Centric Data Center Network Architectures Dawei Li, Jie Wu Department of Computer and Information Sciences, Temple University, Philadelphia, USA {dawei.li, jiewu}@temple.edu Zhiyong Liu, Fa Zhang

More information

How To Predict A Call Capacity In A Voip System

How To Predict A Call Capacity In A Voip System Paper Preictive Moeling in a VoIP System Ana-Maria Simionovici a, Alexanru-Arian Tantar a, Pascal Bouvry a, an Loic Dielot b a Computer Science an Communications University of Luxembourg, Luxembourg b

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

NETWORK CODING OVERHEAD

NETWORK CODING OVERHEAD NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Scafida: A Scale-Free Network Inspired Data Center Architecture

Scafida: A Scale-Free Network Inspired Data Center Architecture Scafida: A Scale-Free Network Inspired Data Center Architecture László Gyarmati, Tuan Anh Trinh Network Economics Group Department of Telecommunications and Media Informatics Budapest University of Technology

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

Resolving Packet Loss in a Computer Centre Applications

Resolving Packet Loss in a Computer Centre Applications International Journal of Computer Applications (975 8887) olume 74 No., July 3 Resolving Packet Loss in a Computer Centre Applications M. Rajalakshmi C.Angel K. M. Brindha Shree ABSTRACT The modern data

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

SCDA: SLA-aware Cloud Datacenter Architecture for Efficient Content. Storage and Retrieval

SCDA: SLA-aware Cloud Datacenter Architecture for Efficient Content. Storage and Retrieval : SLA-aware Clou Datacenter Architecture for Efficient Content Storage an Retrieval Debessay Fesehaye an Klara Nahrstet Department of Computer Science University of Illinois at Urbana-Champaign {kassa2,klara}@illinois.eu

More information

Performance Analysis of Bandwidth Allocations for Multi-Services Mobile Wireless Cellular Networks *

Performance Analysis of Bandwidth Allocations for Multi-Services Mobile Wireless Cellular Networks * erformance Analysis of Banwith Allocations for Multi-Serices Mobile Wireless Cellular Networs * Lizhong Li Bin Li Bo Li Xi-Ren Cao Department of Computer Science Department of Electrical an Electronic

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Autonomous Fault Detection and Recovery System in Large-scale Networks

Autonomous Fault Detection and Recovery System in Large-scale Networks Autonomous Fault Detection and Recovery System in Large-scale Networks Raheel Ahmed Memon 1, Yeonseung Ryu, Abdul Qadir Rahimoo Abstract In networks like Combat ship data network, the Ethernet is required

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN

ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN Chung-Ping Liu Caniate for octor's egree Department of Shipping an Transportation Management National Taiwan Ocean University 2, Pei-Ning

More information

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis. The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

hurni@ieee.org 1. INTRODUCTION ABSTRACT

hurni@ieee.org 1. INTRODUCTION ABSTRACT Deployment Issues of a VoIP Conferencing System in a Virtual Conferencing Environment R. Venkatesha Prasa i Richar Hurni ii H.S. Jamaagni iii H.N. Shankar iv i, iii {vprasa, hsjam}@cet.iisc.ernet.in i,

More information

Efficient Estimation of More Detailed Internet IP Maps

Efficient Estimation of More Detailed Internet IP Maps Efficient Estimation of More Detaile Internet IP Maps Sangmin Kim an Khale Harfoush Department of Computer Science North Carolina State University E-mail: {skim2, harfoush}@cs.ncsu.eu Abstract -level maps

More information

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE No.107 Guie to the calibration an testing of torque transucers Goo Practice Guie 107 Measurement Goo Practice Guie No.107 Guie to the calibration an testing of

More information

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis iqui Pricing for Digital Infrastructure Services Subhajyoti Banyopahyay * an sing Kenneth Cheng Department of Decision an Information Sciences Warrington College of Business Aministration University of

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Compare Authentication Algorithms for Mobile Systems in Order to Introduce the Successful Characteristics of these Algorithms against Attacks

Compare Authentication Algorithms for Mobile Systems in Order to Introduce the Successful Characteristics of these Algorithms against Attacks Compare Authentication Algorithms for Mobile Systems in Orer to Introuce the Successful Characteristics of these Algorithms against Attacks Shahriar Mohammai Assistant Professor of Inustrial Engineering

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Aon Retiree Health Exchange

Aon Retiree Health Exchange 2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements. WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the

More information

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman

More information

Enabling Flow-based Routing Control in Data Center Networks using Probe and ECMP

Enabling Flow-based Routing Control in Data Center Networks using Probe and ECMP IEEE INFOCOM 2011 Workshop on Cloud Computing Enabling Flow-based Routing Control in Data Center Networks using Probe and ECMP Kang Xi, Yulei Liu and H. Jonathan Chao Polytechnic Institute of New York

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,

More information

PCube: Improving Power Efficiency in Data Center Networks

PCube: Improving Power Efficiency in Data Center Networks PCube: Improving Power Efficiency in Data Center Networks Lei Huang, Qin Jia, Xin Wang Fudan University Shanghai, China 08300240053@fudan.edu.cn 08300240080@fudan.edu.cn xinw@fudan.edu.cn Shuang Yang Stanford

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

S & C E L E C T R I C C O M P A N Y

S & C E L E C T R I C C O M P A N Y Descriptive Bulletin 811-30 September 11, 2006 Supersees Descriptive Bulletin 811-30 ate 5-12-03 2006 Here Are Five Reasons Why Loabuster Is the Better Way: 1 Range S&C s Loabuster unlike loabreak cutouts

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Optimal Data Distribution for Heterogeneous Parallel Storage Servers Streaming Media Files

Optimal Data Distribution for Heterogeneous Parallel Storage Servers Streaming Media Files Optimal Data Distribution or Heterogeneous Parallel Storage Servers Streaming Meia Files Christian Ortol Department o Computer Science, University o Freiburg, Georges-Koehler-Allee 5, 79 Freiburg, Germany

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information

Advanced Computer Networks. Datacenter Network Fabric

Advanced Computer Networks. Datacenter Network Fabric Advanced Computer Networks 263 3501 00 Datacenter Network Fabric Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week Today Supercomputer networking

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Axon: A Flexible Substrate for Source- routed Ethernet. Jeffrey Shafer Brent Stephens Michael Foss Sco6 Rixner Alan L. Cox

Axon: A Flexible Substrate for Source- routed Ethernet. Jeffrey Shafer Brent Stephens Michael Foss Sco6 Rixner Alan L. Cox Axon: A Flexible Substrate for Source- routed Ethernet Jeffrey Shafer Brent Stephens Michael Foss Sco6 Rixner Alan L. Cox 2 Ethernet Tradeoffs Strengths Weaknesses Cheap Simple High data rate Ubiquitous

More information

Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages

Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages 998 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER 2000 Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages Chenggong Charles Fan, Student Member, IEEE,

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org Large-Scale Distributed Systems Datacenter Networks COMP6511A Spring 2014 HKUST Lin Gu lingu@ieee.org Datacenter Networking Major Components of a Datacenter Computing hardware (equipment racks) Power supply

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information