Implementation and Evaluation of Transparent Fault-Tolerant Web Service with Kernel-Level Support

Size: px
Start display at page:

Download "Implementation and Evaluation of Transparent Fault-Tolerant Web Service with Kernel-Level Support"

Transcription

1 Poceedings of the IEEE Intentionl Confeence on Compute Communictions nd Netwoks Mimi, Floid, pp , Octobe Implementtion nd Evlution of Tnspent Fult-Tolent Web Sevice with Kenel-Level Suppot Nvid Aghdie nd Yuvl Tmi Concuent Systems Lbotoy UCLA Compute Science Deptment Los Angeles, Clifoni Abstct Most of the techniques used fo incesing the vilbility of web sevices do not povide fult tolence fo equests being pocessed t the time of seve filue. Othe schemes equie deteministic seves o chnges to the web client. These limittions e uncceptble fo mny cuent nd futue pplictions of the Web. We hve developed n efficient implementtion of client-tnspent mechnism fo poviding fult-tolent web sevice tht does not hve the limittions mentioned bove. The scheme is bsed on hot stndby bckup seve tht mintins logs of equests nd eplies. The implementtion includes modifictions to the Linux kenel nd to the Apche web seve, using thei espective module mechnisms. We descibe the implementtion nd pesent n evlution of the impct of the bckup scheme in tems of thoughput, ltency, nd CPU pocessing cycles ovehed. I. INTRODUCTION Web seves e incesingly used fo citicl pplictions whee outges o eoneous opetion e uncceptble. In most cses citicl sevices e povided using thee tie chitectue, consisting of: client web bowses, one o moe eplicted font-end seves (e.g. Apche), nd one o moe bck-end seves (e.g. dtbse). HTTP ove TCP/IP is the pedominnt potocol used fo communiction between clients nd the web seve. The font-end web seve is the medito between the clients nd the bck-end seve. Fult tolence techniques e often used to incese the elibility nd vilbility of Intenet sevices. Web seves e often stteless they do not mintin stte infomtion fom one client equest to the next. Hence, most existing web seve fult tolence schemes simply detect filues nd oute futue equests to bckup seves. Exmples of such fult tolence techniques include the use of specilized outes nd lod blnces [4, 5, 12, 14] nd dt epliction [6, 28]. These methods e unble to ecove in-pogess equests since, while the web seve is stteless between tnsctions, it does mintin impotnt stte fom the ivl of the fist pcket of equest to the tnsmission of the lst pcket of the eply. With the schemes mentioned bove, the client neve eceives complete eplies to the in-pogess equests nd hs no wy to detemine whethe o not equested opetion hs been pefomed [1, 15, 16] (see Figue 1). Some ecent wok does ddess the need fo hndling inpogess tnsctions. Client-we solutions such s [16, 23, 26] equie modifictions to the clients to chieve thei gols. Since mny vesions of the client softwe, the 1 2 Client Web Seve Bck-end 4 Figue 1: If the web seve fils befoe sending the client eply (step 4), the client cn not detemine whethe the filue ws befoe o fte the web seve communiction with the bck-end (steps 2,3) web bowse, e widely distibuted nd they e typiclly developed independently of the web sevice, it is citicl tht ny fult tolence scheme used be tnspent to the client. Schemes fo tnspent seve epliction [3, 7, 18, 25] sometimes equie deteministic seves fo eply genetion o do not ecove equests whose pocessing ws in pogess t the time of filue. We discuss some of these solutions in moe detil in Sections II nd V. We hve peviously developed scheme fo clienttnspent fult-tolent web sevice tht ovecomes the disdvntges of existing schemes [1]. The scheme is bsed on logging of HTTP equests nd eplies to hot stndby bckup seve. Ou oiginl implementtion ws bsed on use-level poxies, equied non-stndd fetues of the Solis w socket intefce, nd ws neve integted with el web seve. Tht implementtion did not equie ny kenel modifictions but incued high pocessing ovehed. The contibution of this ppe is moe efficient implementtion of the scheme on Linux bsed on kenel modifictions nd its integtion with the Apche web seve using Apche s module mechnism. The smll modifictions to the kenel e used to povide client-tnspent multicst of equests to pimy seve nd bckup seve s well s the bility to continue tnsmission of eply to the client despite seve filue. Ou implementtion is bsed on off-the-shelf hdwe (PC, oute), nd softwe (Linux, Apche). We ely on the stndd elibility fetues of TCP nd do not mke ny chnges to the potocol o its implementtion. In Section II we pesent the chitectue of ou scheme nd key design choices. Section III discusses ou implementtion bsed on kenel nd web seve modules. A detiled nlysis of the pefomnce esults including thoughput, ltency, nd consumed pocessing cycles is pesented in Section IV. Relted wok is discussed in Section V. 3 63

2 II. TRANSPARENT FAULT-TOLERANT WEB SERVICE In ode to povide client-tnspent fult-tolent web sevice, fult-fee client must eceive vlid eply fo evey equest tht is viewed by the client s hving been deliveed. Both the equest nd the eply my consist of multiple TCP pckets. Once equest TCP pcket hs been cknowledged to the client, it must not be lost. All eply TCP pckets sent to the client must fom consistent, coect eplies to pio equests. We ssume tht only single seve host t time my fil. We futhe ssume tht hosts e fil-stop [24]. Hence, host filue is detected using stndd techniques, such s peiodic hetbets. Techniques fo deling with filue modes othe thn fil-stop e impotnt but e beyond the scope of this ppe. We lso ssume tht the locl e netwok connecting the two seves s well s the Intenet connection between the client nd the seve LAN will not suffe ny pemnent fults. The pimy nd bckup hosts e connected on the sme IP subnet. In pctice, the elibility of the netwok connection to tht subnet cn be enhnced using multiple outes unning potocols such s the Vitul Route Redundncy Potocol [19]. This cn pevent the locl LAN oute fom being citicl single point of filue. In ode chieve the fult tolence gols, ctive epliction of the seves my be used, whee evey client equest is pocessed by both seves. While this ppoch will hve the best fil-ove time, it suffes fom sevel dwbcks. Fist, this ppoch hs high cost in tems of pocessing powe, s evey client equest is effectively pocessed twice. A second dwbck is tht this ppoch only woks fo deteministic seves. If the seves genete eplies non-deteministiclly, the bckup my not hve n identicl copy of eply nd thus it cn not lwys continue the tnsmission of eply should the pimy fil in the midst of sending eply. An ltentive ppoch is bsed on logging. Specificlly, equest pckets e cknowledged only fte they e stoed edundntly (logged) so tht they cn be obtined even fte filue of seve host [1, 3]. Since the seve my be nondeteministic, none of the pckets of eply cn be sent to the client unless the entie eply is sfely stoed (logged) so tht its tnsmission cn poceed despite filue of seve host [1]. The logging of equests cn be done t the level of TCP pckets [3] o t the level of HTTP equests [1]. If equest logging is done t the level of HTTP equests, the equests cn be mtched with logged eplies so tht equest will neve be epocessed following filue if the eply hs ledy been logged [1]. This is citicl in ode to ensue tht fo ech equest only one eply will ech the client. If equest logging is done stictly t the level of TCP pckets [3], it is possible fo equest to be eplyed to spe seve following filue despite the fct tht eply hs ledy been sent to the client. Since the spe seve my genete diffeent eply, two diffeent eplies fo the sme equest my ech the client, clely violting the equiement fo tnspent fult tolence. We hve peviously poposed [1] implementing tnspent fult-tolent web sevice using hot stndby bckup seve tht logs HTTP equests nd eplies but does not ctully pocess equests unless the pimy seve fils. The eo contol mechnisms of TCP e used to povide elible multicst of client equests to the pimy nd bckup. All client equest pckets e logged t the bckup befoe iving t the pimy nd the pimy elibly fowds copy of the eply to the bckup befoe sending it to the client. Upon filue of the pimy, the bckup semlessly tkes ove eceiving ptilly eceived equests nd tnsmitting logged eplies. The bckup pocesses logged equests fo which no eply hs been logged nd ny new equests. Since ou scheme is client-tnspent, clients communicte with single seve ddess (the dvetised ddess) nd e unwe of seve epliction [1]. The bckup seve eceives ll the pckets sent to the dvetised ddess nd fowds copy to the pimy seve. Fo client tnspency, the souce ddesses of ll pckets eceived by the client must be the dvetised ddess. Hence, when the pimy sends pckets to the clients, it spoofs the souce ddess, using the sevice s dvetised ddess insted of it s own s the souce ddess. The pimy logs eplies by sending them to the bckup ove elible (TCP) connection nd witing fo n cknowledgment befoe sending them to the client. This ppe uses the sme bsic scheme but the focus hee is on the design nd evlution of moe efficient implementtion bsed on kenel modifictions. III. IMPLEMENTATION Thee e mny diffeent wys to implement the scheme descibed in Section II. As mentioned elie, we hve peviously done this bsed on use-level poxies, without ny kenel modifictions [1]. A poxy-bsed implementtion is simple nd potentilly moe potble thn n implementtion tht equies kenel modifiction but it incus highe pefomnce ovehed (Section IV). It is lso possible to implement the scheme entiely in the kenel in ode to minimize the ovehed [22]. Howeve it is genelly desible to minimize the complexity of the kenel [8, 17]. Futhemoe, the moe modul ppoch descibed in this ppe mkes it esie to pot the implementtion to othe kenels o othe web seves. Ou cuent implementtion consists of combintion of kenel modifictions nd modifictions to the use-level web seve (Figue 2). TCP/IP pcket opetions e pefomed in the kenel nd the HTTP messge opetions e pefomed in the web seves. We hve not implemented the bck-end potion of the thee-tie stuctue. This cn be done s mio imge of the font-end communiction [1]. Futhemoe, since the tnspency of the fult tolence scheme is not citicl between the web seve nd bck-end seves, simple nd less costly schemes e possible fo this section. Fo exmple, the font-end seves my include tnsction ID with ech equest to the bck-end. If equest is etnsmitted, it will include the tnsction ID nd the 64

3 B c k u p Kenel Kenel Module Seve Seve Module Client HTTP Reply Incoming Msg Outgoing Msg Kenel Module Kenel Seve Module Seve Figue 2: Implementtion: epliction using combintion of kenel nd web seve modules. Messge pths e shown. bck-end cn use tht to void pefoming the tnsction multiple times [20]. A. The Kenel Module The kenel module implements the client-tnspent tomic multicst mechnism between the client nd the pimy/bckup seve pi. In ddition it fcilittes the tnsmission of outgoing messges fom the seve pi to the client such tht the bckup cn continue the tnsmission semlessly if the pimy fils. The public ddess of the sevice known to clients is mpped to the bckup seve, so the bckup will eceive the client pckets. Afte n incoming pcket goes though the stndd kenel opetions such s checksum checking, nd just befoe the TCP stte chnge opetions e pefomed, the bckup s kenel module fowds copy of the pcket to the pimy. The bckup s kenel then continues the stndd pocessing of the pcket, s does the pimy s kenel with the fowded pcket. Outgoing pckets to the client e sent by the pimy. Such pckets must be pesented to the client with the sevice public ddess s the souce ddess. Hence, the pimy s kenel module chnges the souce ddess of outgoing pckets to the public ddess of the sevice. On the bckup, the kenel pocesses the outgoing pcket nd updtes the kenel s TCP stte, but the kenel module intecepts nd dops the pcket when it eches the device queue. TCP cknowledgments fo outgoing pckets e, of couse, incoming pckets nd they e multicst to the pimy nd bckup s bove. The key to ou multicst implementtion is tht when the pimy eceives pcket, it is ssued tht the bckup hs n identicl copy of the pcket. The bckup fowds pcket only fte the pcket psses though the kenel code whee pcket my be dopped due to detected eo (e.g., checksum) o hevy lod. If fowded pcket is lost while enoute to the pimy, the client does not eceive n cknowledgment nd thus etnsmits the pcket. This is becuse only the pimy s TCP cknowledgments ech the client. TCP cknowledgments geneted by the bckup e dopped by the bckup s kenel module. P i m y B. The Seve Module The seve module is used to hndle the pts of the scheme tht del with messges t the HTTP level. The Apche module cts s hndle [27] nd genetes the eplies tht e sent to the clients. It is composed of woke, mux, nd demux pocesses. B c k u p To Bckup Kenel Woke Pocs Demux Poc ck eply To Pimy Kenel Woke Pocs Demux Poc Mux Poc Figue 3: Seve Stuctue: The mux/demux pocesses e used to elibly tnsmit copy of the eplies to the bckup befoe they e sent to clients. The seve module implements these pocesses nd the necessy chnges to the stndd woke pocesses. 1) Woke Pocesses: A stndd Apche web seve consists of sevel pocesses hndling client equests. We efe to these stndd pocesses s woke pocesses. In ddition to the stndd hndling of equests, in ou scheme the woke pocesses lso communicte with the mux/demux pocesses descibed in the next subsection. The pimy woke pocesses eceive the client equest, pefom psing nd othe stndd opetions, nd then genete the eply. Othe thn few new bookkeeping opetions, these opetions e exctly wht is done in stndd web seve. Afte geneting the eply, insted of sending the eply diectly to the client, the pimy woke pocesses pss the geneted eply to the pimy mux pocess so tht it cn be sent to the bckup. The pimy woke pocess then wits fo n indiction fom the pimy demux pocess tht n cknowledgment hs been eceived fom the bckup, signling tht it cn now send the eply to the client. The bckup woke pocesses pefom the stndd opetions fo eceiving equest, but do not genete the eply. Upon eceiving equest nd pefoming the stndd opetions, the woke pocess just wits fo eply fom the bckup demux pocess. This is the eply tht is poduced by pimy woke pocess fo the sme client equest. 2) Mux/Demux Pocesses: The mux/demux pocesses ensue tht copy of the eply geneted by the pimy is sent to nd eceived by the bckup befoe the tnsmission of the eply to the client stts. This llows fo the bckup to semlessly tke ove fo the pimy in the event of filue, even if the eplies e geneted non-deteministiclly. The mux/demux pocesses communicte with ech othe ove TCP connection, nd use semphoes nd shed memoy to communicte with woke pocesses on the sme host (figue 3). A connection identifie (client s IP ddess nd TCP pot numbe) is sent long with the eplies nd cknowledgments so tht the demux pocess on the emote host cn identify the woke pocess with the mtching equest. P i m y 65

4 IV. PERFORMANCE EVALUATION The evlution of the scheme ws done on 350 MHz Intel Pentium II PC s inteconnected by 100 Mb/sec switched netwok bsed on Cisco 6509 switch. The seves wee unning ou modified Linux kenel nd the Apche web seve with logging tuned on nd with ou kenel nd seve modules instlled. We used custom clients simil to those of the Wisconsin Poxy Benchmk [2] fo ou mesuements. The clients continuously genete one outstnding HTTP equest t time with no think time. Fo ech expeiment, the equests wee fo files of specific size s pesented in ou esults. Intenet tffic studies [13, 10] indicte tht most web eplies e less thn kbytes in size. Mesuement wee conducted on t lest thee system configutions: uneplicted, simplex, nd duplex. The uneplicted system is the stndd system with no kenel o web seve modifictions. The simplex system includes the kenel nd seve modifictions but thee is only one seve, i.e., incoming pckets e not elly multicst nd outgoing pckets e not sent to bckup befoe tnsmission to the client. The ext ovehed of simplex eltive to uneplicted is due minly to the pcket hede mnipultions nd bookkeeping in the kenel module. The duplex system is the full implementtion of the scheme. L t e n c y Reply Size (Kbytes) Duplex Reply Ovehed Simplex Uneplicted Figue 4: Avege ltency (msec) obseved by client fo diffeent eply sizes nd system modes. The Reply Ovehed line depicts the ltency cused by epliction of the eply in duplex mode. A. Ltency Figue 4 shows the vege ltency on n unloded seve nd netwok fom the tnsmission of equest by the client to the eceipt of the coesponding eply by the client. Thee is only single client on the netwok nd this client hs mximum of one outstnding equest. The esults show tht the ltency ovehed eltive to the uneplicted system inceses with incesing eply size. This is due to pocessing of moe eply pckets. The diffeence between the Reply Ovehed line nd the Uneplicted line is the time to tnsmit the eply fom the pimy to the bckup nd eceive n cknowledgement t the pimy. This time ccounts fo most of the duplex ovehed. Note tht these mesuements exggete the eltive ovehed tht would impct el system since: 1) the client is on the sme locl netwok s the seve, nd 2) the equests e fo (cched) sttic files. In pctice, tking into ccount seve pocessing nd Intenet communiction delys, seve esponse times of hundeds of milliseconds e common. The bsolute ovehed time intoduced by ou scheme emins the sme egdless of seve esponse times nd theefoe ou implementtion ovehed is only smll fction of the ovell esponse time seen by clients. B. Thoughput Figue 5 shows the pek thoughput of single pi of seve hosts fo diffeent eply sizes. The thoughputs of uneplicted nd simplex (in Mbytes/sec) incese until the netwok becomes the bottleneck. Howeve, the duplex mode thoughput peks t less thn hlf of tht mount. This is due to the fct tht on the pimy, the sending of the eply to the bckup by the seve module nd the sending of eply to the clients (figue 2) occu ove the sme physicl link. Hence, the thoughput to the clients is educed by hlf in duplex mode. To void this bottleneck, the tnsmission of the eplies fom the pimy to the bckup cn be pefomed on septe dedicted link. A high-speed Myinet [9] LAN ws vilble to us nd ws used fo this pupose in mesuements denoted by duplex-mi. These mesuements show significnt thoughput impovement ove the duplex esults, s thoughput of bout twice tht of duplex mode with single netwok intefce is chieved. C. Pocessing Ovehed Tble 1 shows the CPU cycles used by the seves to eceive one equest nd genete eply. These mesuements wee done using the pocesso s pefomnce monitoing countes [21]. Fo ech configution the tble pesents the kenel-level, use-level, nd totl cycles used. The cpu% column shows the cpu utiliztion t pek thoughput, nd indictes tht the system becomes CPU bound s the eply size deceses. This explins the thoughput esults, whee lowe thoughputs (in Mbytes/sec) wee eched with smlle eplies. Bsed on Tble 1, the duplex seve (pimy nd bckup combined) cn equie moe thn fou times (fo the 50KB eply) s mny cycles to hndle equest comped with the uneplicted seve. Howeve, s noted in the pevious subsection, these mesuements e fo eplies geneted by eding cched sttic files. In pctice, fo likely pplictions of this technology (dynmic content), eplies e likely to be smlle nd equie significntly moe pocessing. Hence, the ctul eltive pocessing ovehed cn be expected to be much lowe thn the fcto of 4 shown in the tble. D. Compison with Use-Level Implementtion As mentioned elie, ou oiginl implementtion of this fult tolence scheme ws bsed on use-level poxies, without ny kenel modifictions [1]. Tble 2 shows compison of the pocessing ovehed of the use-level poxy ppoch with the implementtion pesented in this ppe. This compison is not pefectly ccute. While both schemes wee implemented on the sme hdwe, the uselevel poxy ppoch uns unde the Solis opeting system nd could not be esily poted to Linux due to diffeence in 66

5 Requests pe Second Uneplicted Simplex Duplex-mi Duplex Mbytes pe Second Uneplicted Simplex Duplex-mi Duplex Reply Size Reply Size Figue 5: System thoughput (in equests nd Mbytes pe second) fo diffeent messge sizes (kbytes) nd system modes. Duplex-mi line denotes setting with multiple netwok intefces fo ech seve - one intefce is used only fo eply epliction. TABLE 1: Bekdown of used CPU cycles (in thousnds) - cpu% column indictes CPU utiliztion duing pek thoughput. 1kbyte eply 10kbyte eply 50kbyte eply System Mode use kenel totl cpu% use kenel totl cpu% use kenel totl cpu% Duplex (pimy) Duplex (bckup) Duplex-mi (pimy) Duplex-mi (bckup) Simplex Uneplicted TABLE 2: Use-level vesus kenel suppot CPU cycles (in thousnds) fo pocessing equest tht genetes 1Kbyte eply. Implementtion Pimy Bckup Totl Use-level Poxies Kenel/Seve Modules the semntics of w sockets. In ddition, the seve pogms e diffeent lthough they do simil pocessing. Howeve, the diffeence of lmost fcto of 5 is clely due mostly to the diffeence in the implementtion of the scheme, not to OS diffeences. The lge ovehed of the poxy ppoch is cused by the extneous system clls nd messge copying tht e necessy fo moving the messges between the two levels of poxies nd the seve. V. RELATED WORK Ely wok in this field, such s Round Robin DNS [11] nd DNS lising methods, focused on detecting fult nd outing futue equests to vilble seves. Centlized schemes, such s the Mgic Route [4] nd Cisco Locl Diecto [12], equie equest pckets to tvel though centl oute whee they e outed to the desied seve. Typiclly the oute detects seve filues nd does not oute pckets to seves tht hve filed. The centl oute is single point of filue nd pefomnce bottleneck since ll pckets must tvel though it. Distibuted Pcket Rewiting [7] voids hving single enty point by llowing the seves to send messges diectly to clients nd by implementing some of the oute logic in the seves so tht they cn fowd the equests to diffeent seves. None of these schemes suppot ecoveing equests tht wee being pocessed when the filue occued, no do they del with non-deteministic nd non-idempotent equests. Thee e vious seve epliction schemes tht e not client tnspent. Most still do not povide ecovey of equests tht wee ptilly pocessed. Folund nd Gueoui [16] do ecove such equests. Howeve, the client must etnsmit the equest to multiple seves upon filue detection nd must be we of the ddess of ll instnces of eplicted seves. A consensus geement potocol is lso equied fo the implementtion of thei wite-once egistes which could be costly, lthough it llows ecovey fom non fil-stop filues. Ou kenel module cn be seen s n ltentive implementtion of the wite-once egistes which lso povides client tnspency. Zho et l [29] descibe CORBA-bsed infstuctue fo epliction in thee-tie systems which del with the sme issues, but gin is not client-tnspent. The wok by Snoeen et l [26] is nothe exmple of solution tht is not tnspent to the client. A tnspot lye potocol with connection migtion cpbilities, such s SCTP o TCP with poposed extensions, is used long with session stte synchoniztion mechnism between seves to chieve connection-level filove. The equiement to use specilized tnspot lye potocol t the client is obviously not tnspent to the client. HydNet-FT [25] uses scheme tht is simil to ous. It is client-tnspent nd cn ecove ptilly pocessed equests. The HydNet-FT scheme ws designed to del with seve eplics tht e geogphiclly distibuted. As esult, it must use specilized outes ( ediectos ) to get pckets to thei destintions. These ediectos intoduces single point of filue simil to the Mgic Route scheme. Ou scheme is bsed on the bility to plce ll seve eplics on the sme subnet [1]. As esult, we cn use off-the-shelf 67

6 outes nd multiple outes cn be connected to the sme subnet nd configued to wok togethe to void single point of filue. Since HydNet-FT uses ctive epliction, it cn only be used with deteministic seves while ou stndby bckup scheme does not hve this limittion. Alvisi et l implemented FT-TCP [3], kenel level TCP wppe tht tnspently msks seve filues fom clients. While this scheme nd its implementtion e simil to ous, thee e impotnt diffeences. Insted of ou hot stndby spe ppoch, logge unning on septe pocesso is used. If used fo web sevice fult tolence, FT-TCP equies deteministic seves (see Section II) nd significntly longe ecovey times. In ddition, they did not evlute thei scheme in the context of web seves. VI. CONCLUSION We hve poposed client-tnspent fult tolence scheme fo web sevices tht coectly hndles ll client equests in spite of web seve filue. Ou scheme is comptible with existing thee-tie chitectues nd cn wok with non-deteministic nd non-idempotent seves. We hve implemented the scheme using combintion of Linux kenel modifictions nd modifiction to the Apche web seve. We hve shown tht this implementtion involves significntly lowe ovehed thn stictly use-level poxy-bsed implementtion of the sme scheme. Ou evlution of the esponse time (ltency) nd pocessing ovehed shows tht the scheme does intoduce significnt ovehed comped to stndd seve with no fult tolence fetues. Howeve, this esult only holds if geneting the eply equies lmost no pocessing. In pctice, fo the tget ppliction of this scheme, eplies e often smll nd e dynmiclly geneted (equiing significnt pocessing). Fo such woklods, ou esults imply low eltive oveheds in tems of both ltency nd pocessing cycles. We hve lso shown tht in ode to chieve mximum thoughput it is citicl to hve dedicted netwok connection between the pimy nd bckup. REFERENCES [1] N. Aghdie nd Y. Tmi, Client-Tnspent Fult-Tolent Web Sevice, Poceedings of the 20th IEEE Intentionl Pefomnce, Computing, nd Communictions Confeence, Phoenix, Aizon, pp (Apil 2001). [2] J. Almeid nd P. Co, Wisconsin Poxy Benchmk, Technicl Repot 1373, Compute Sciences Dept, Univ. of Wisconsin-Mdison (Apil 1998). [3] L. Alvisi, T. C. Bessoud, A. El-Khshb, K. Mzullo, nd D. Zgoodnov, Wpping Seve-Side TCP to Msk Connection Filues, Poceedings of IEEE INFOCOM, Anchoge, Alsk, pp (Apil 2001). [4] E. Andeson, D. Ptteson, nd E. Bewe, The Mgicoute, n Appliction of Fst Pcket Inteposing, Clss Repot, UC Bekeley - endes/pojects/mgicoute/ (My 1996). [5] D. Andesen, T. Yng, V. Holmedhl, nd O. H. Ib, SWEB: Towds Sclble Wold Wide Web Seve on Multicomputes, Poccedings of the 10th Intentionl Pllel Pocessing Symposium, Honolulu, Hwii, pp (Apil 1996). [6] S. M. Bke nd B. Moon, Distibuted Coopetive Web Seves, The Eighth Intentionl Wold Wide Web Confeence, Toonto, Cnd, pp (My 1999). [7] A. Bestvos, M. Covell, J. Liu, nd D. Mtin, Distibuted Pcket Rewiting nd its Appliction to Sclble Seve Achitectues, Poceedings of the Intentionl Confeence on Netwok Potocols, Austin, Texs, pp (Octobe 1998). [8] D. L. Blck, D. B. Golub, D. P. Julin, R. F. Rshid, nd R. P. Dves, Micokenel Opeting System Achitectue nd Mch, Poceedings of the USENIX Wokshop on Mico-Kenels nd Othe Kenel Achitectues, Bekeley, CA, pp (Apil 1992). [9] N. J. Boden, D. Cohen, R. E. Feldemn, A. E. Kulwik, C. L. Seitz, J. N. Seizovic, nd W.-K. Su, Myinet: A Gigbit-pe-Second Locl Ae Netwok, IEEE Mico 15(1), pp (Febuy 1995). [10] L. Beslu, P. Co, L. Fn, G. Phillips, nd S. Shenke, Web Cching nd Zipf-like Distibutions: Evidence nd Implictions, Poceedings of IEEE INFOCOM, New Yok, New Yok (Mch 1999). [11] T. Bisco, DNS Suppot fo Lod Blncing, IETF RFC 1794 (Apil 1995). [12] Cisco Systems Inc, Scling the Intenet Web Seves, Cisco Systems White Ppe /tech/scle_wp.htm. [13] C. Cunh, A. Bestvos, nd M. Covell, Chcteistics of Wold Wide Web Client-bsed Tces, Technicl Repot TR , Boston Univesity, CS Dept, Boston, MA (Apil 1995). [14] D. M. Dis, W. Kish, R. Mukhejee, nd R. Tewi, A sclble nd highly vilble web seve, Poceedings of IEEE COMPCON 96, Sn Jose, Clifoni, pp (1996). [15] S. Folund nd R. Gueoui, CORBA Fult-Tolence: why it does not dd up, Poceedings of the IEEE Wokshop on Futue Tends of Distibuted Systems (Decembe 1999). [16] S. Folund nd R. Gueoui, Implementing e-tnsctions with Asynchonous Repliction, IEEE Intentionl Confeence on Dependble Systems nd Netwoks, New Yok, New Yok, pp (June 2000). [17] D. Golub, R. Den, A. Foin, nd R. Rshid, Unix s n Appliction Pogm, Poceedings of summe USENIX, pp (June 1990). [18] C. T. Kmnolis nd J. N. Mgee, Configuble Highly Avilble Distibuted Sevices, Poceedings of the 14th IEEE Symposium on Relible Distibuted Systems, Bd Neuenh, Gemny, pp (Septembe 1995). [19] S. Knight, D. Weve, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shnd, nd A. Lindem, Vitul Route Redundncy Potocol, RFC 2338, IETF (Apil 1998). [20] Ocle Inc, Ocle8i Distibuted Dtbse Systems - Relese 8.1.5, Ocle Documenttion Liby (1999). [21] M. Pettesson, Linux x86 Pefomnce-Monitoing Countes Dive, mikpe/linux/pefct/. [22] Red Ht Inc, TUX Web Seve, mnuls/tux/. [23] M. Syl, Y. Beitbt, P. Scheuemnn, nd R. Vinglek, Selection Algoithms fo Replicted Web Seves, Pefomnce Evlution Review - Wokshop on Intenet Seve Pefomnce, Mdison, Wisconsin, pp (June 1998). [24] F. B. Schneide, Byzntine Genels in Action: Implementing Fil- Stop Pocessos, ACM Tnsctions on Compute Systems 2(2), pp (My 1984). [25] G. Shenoy, S. K. Stpti, nd R. Bettti, HydNet-FT: Netwok Suppot fo Dependble Sevices, Poceedings of the 20th IEEE Intentionl Confeence on Distibuted Computing Systems, Tipei, Tiwn, pp (Apil 2000). [26] A. C. Snoeen, D. G. Andesen, nd H. Blkishnn, Fine-Gined Filove Using Connection Migtion, Poceedings of the 3d USENIX Symposium on Intenet Technologies nd Systems, Sn Fncisco, Clifoni (Mch 2001). [27] L. Stein nd D. McEchen, Witing Apche Modules with Pel nd C, O Reilly nd Assocites (Mch 1999). [28] R. Vinglek, Y. Beitbt, M. Syl, nd P. Scheuemnn, Web++: A System Fo Fst nd Relible Web Sevice, Poceedings of the USENIX Annul Technicl Confeence, Sydney, Austli, pp (June 1999). [29] W. Zho, L. E. Mose, nd P. M. Melli-Smith, Incesing the Relibility of Thee-Tie Applictions, Poceedings of the 12th Intentionl Symposium on Softwe Relibility Engineeing, Hong Kong, pp (Novembe 2001). 68

Screentrade Car Insurance Policy Summary

Screentrade Car Insurance Policy Summary Sceentde C Insunce Policy Summy This is summy of the policy nd does not contin the full tems nd conditions of the cove, which cn be found in the policy booklet nd schedule. It is impotnt tht you ed the

More information

GFI MilAchive 6 vs H&S Exchnge@PAM GFI Softwe www.gfi.com GFI MilAchive 6 vs H&S Exchnge@PAM GFI MilAchive 6 H&S Exchnge@PAM Who we e Genel fetues Suppots Micosoft Exchnge 2000, 2003 & 2007 Suppots distibuted

More information

GFI MilAchive 6 vs EMC EmilXtende Achive Edition GFI Softwe www.gfi.com GFI MilAchive 6 vs EMC EmilXtende Achive Edition GFI MilAchive 6 EMC EmilXtende Achive Edition Who we e Genel fetues Suppots Micosoft

More information

Highest Pefomnce Lowest Pice PRODUCT COMPARISON GFI MilAchive vs Symntec Entepise Vult GFI Softwe www.gfi.com GFI MilAchive vs Symntec Entepise Vult GFI MilAchive 6 Symntec Entepise Vult Who we e Genel

More information

tools for Web data extraction

tools for Web data extraction HTML-we tools fo Web dt extction Thesis pesenttion 1 Student: Xvie Azg Supeviso: Andes Tho Tble of contents Intoduction Dt Extction Pocess Dt Extction Tools Relized tests Futue Wok 2 Intoduction We e going

More information

GFI MilAchive 6 vs Wtefod Technologies MilMete Achive GFI Softwe www.gfi.com GFI MilAchive 6 vs Wtefod Technologies MilMete Achive Genel fetues Suppots Micosoft Exchnge 2000, 2003 & 2007 Suppots distibuted

More information

GFI EventsMnge vs Netikus.net EventSenty GFI Softwe www.gfi.com GFI EventsMnge vs Netikus.net EventSenty GFI EventsMnge EventSenty Who we e Suppot fo MS SQL Seve Suppot fo MSDE / MS SQL Expess Suppot fo

More information

GFI MilEssentils & GFI MilSecuity vs Bcud Spm Fiewll GFI Softwe www.gfi.com GFIMilEssentils & GFI MilSecuity vs Bcud Spm Fiewll GFI MilEssentils 12 & GFI MilSecuity 10 Bcud Spm Fiewll Who we e Integtes

More information

(1) continuity equation: 0. momentum equation: u v g (2) u x. 1 a

(1) continuity equation: 0. momentum equation: u v g (2) u x. 1 a Comment on The effect of vible viscosity on mied convection het tnsfe long veticl moving sufce by M. Ali [Intentionl Jounl of Theml Sciences, 006, Vol. 45, pp. 60-69] Asteios Pntoktos Associte Pofesso

More information

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge GFI Softwe www.gfi.com GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge Exchnge Seve 2000/2003

More information

N V V L. R a L I. Transformer Equation Notes

N V V L. R a L I. Transformer Equation Notes Tnsfome Eqution otes This file conts moe etile eivtion of the tnsfome equtions thn the notes o the expeiment 3 wite-up. t will help you to unestn wht ssumptions wee neee while eivg the iel tnsfome equtions

More information

Orbits and Kepler s Laws

Orbits and Kepler s Laws Obits nd Keple s Lws This web pge intoduces some of the bsic ides of obitl dynmics. It stts by descibing the bsic foce due to gvity, then consides the ntue nd shpe of obits. The next section consides how

More information

GFI MilEssentils & GFI MilSecuity vs Symntec Bightmil 6 & Anti Vius GFI Softwe www.gfi.com GFI MilEssentils & GFI MilSecuity vs Symntec Bightmil 6 & Anti Vius GFI MilEssentils & GFI MilSecuity Bightmil

More information

Summary: Vectors. This theorem is used to find any points (or position vectors) on a given line (direction vector). Two ways RT can be applied:

Summary: Vectors. This theorem is used to find any points (or position vectors) on a given line (direction vector). Two ways RT can be applied: Summ: Vectos ) Rtio Theoem (RT) This theoem is used to find n points (o position vectos) on given line (diection vecto). Two ws RT cn e pplied: Cse : If the point lies BETWEEN two known position vectos

More information

(Ch. 22.5) 2. What is the magnitude (in pc) of a point charge whose electric field 50 cm away has a magnitude of 2V/m?

(Ch. 22.5) 2. What is the magnitude (in pc) of a point charge whose electric field 50 cm away has a magnitude of 2V/m? Em I Solutions PHY049 Summe 0 (Ch..5). Two smll, positively chged sphees hve combined chge of 50 μc. If ech sphee is epelled fom the othe by n electosttic foce of N when the sphees e.0 m pt, wht is the

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Adaptive Control of a Production and Maintenance System with Unknown Deterioration and Obsolescence Rates

Adaptive Control of a Production and Maintenance System with Unknown Deterioration and Obsolescence Rates Int J of Mthemtic Sciences nd Appictions, Vo, No 3, Septembe Copyight Mind Rede Pubictions wwwjounshubcom Adptive Conto of Poduction nd Mintennce System with Unknown Deteiotion nd Obsoescence Rtes Fwzy

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Random Variables and Distribution Functions

Random Variables and Distribution Functions Topic 7 Rndom Vibles nd Distibution Functions 7.1 Intoduction Fom the univese of possible infomtion, we sk question. To ddess this question, we might collect quntittive dt nd ognize it, fo emple, using

More information

Efficient Implementation of Concurrent Programming Languages

Efficient Implementation of Concurrent Programming Languages Uppsl Dissettions fom the Fculty of Science nd Technology 43 ERIK STENMAN Efficient Implementtion of Concuent Pogmmg Lnguges ACTA UNIVERSITATIS UPSALIENSIS UPPSALA 2002 ACTA UNIVERSITATIS UPSALIENSIS Uppsl

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

In-stope bolting for a safer working environment

In-stope bolting for a safer working environment text:templte Jounl 2/3/10 9:34 AM Pge 47 In-stope bolting fo sfe woking envionment by P. Henning* nd P. Feei* J o u n l Synopsis Rock fll ccidents continue to be the min cuse of ftl nd seious injuies in

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Intro to Circle Geometry By Raymond Cheong

Intro to Circle Geometry By Raymond Cheong Into to Cicle Geomety By Rymond Cheong Mny poblems involving cicles cn be solved by constucting ight tingles then using the Pythgoen Theoem. The min chllenge is identifying whee to constuct the ight tingle.

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Curvature. (Com S 477/577 Notes) Yan-Bin Jia. Oct 8, 2015

Curvature. (Com S 477/577 Notes) Yan-Bin Jia. Oct 8, 2015 Cuvtue Com S 477/577 Notes Yn-Bin Ji Oct 8, 205 We wnt to find mesue of how cuved cuve is. Since this cuvtue should depend only on the shpe of the cuve, it should not be chnged when the cuve is epmetized.

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

for Student Service Members and Veterans in Indiana

for Student Service Members and Veterans in Indiana Apil 2009 The Highe Eduction Lndscpe fo Student Sevice Membes nd Vetens in Indin Mtin Stenbeg, Shelley McDemid Wdswoth, Jo Vughn, nd Ryn Clson Mility Fmily Resech Institute t Pudue Univesity Suppot Len

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

AMB111F Financial Maths Notes

AMB111F Financial Maths Notes AMB111F Financial Maths Notes Compound Inteest and Depeciation Compound Inteest: Inteest computed on the cuent amount that inceases at egula intevals. Simple inteest: Inteest computed on the oiginal fixed

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Marketing Logistics: Opportunities and Limitations

Marketing Logistics: Opportunities and Limitations Mketig Logistics: Oppotuities d Limittios Pethip Vdhsidhu 1, Ugul Lpted 2 1 Gdute School, MBA i Itetiol Busiess, The Uivesity of the Thi Chmbe of Commece Vibhvdee-Rgsit Rod, Dideg, Bgkok, 10400, Thild

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Nice Resource Reservations in Linux

Nice Resource Reservations in Linux Nice Resouce Resevations in Linux Matin Ohlin Depatment of Automatic Contol Lund Univesity Box 118, SE-221 Lund, Sweden Email: Matin.Ohlin@contol.lth.se Matin A. Kjæ Depatment of Automatic Contol Lund

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

r (1+cos(θ)) sin(θ) C θ 2 r cos θ 2

r (1+cos(θ)) sin(θ) C θ 2 r cos θ 2 icles xmple 66: Rounding one ssume we hve cone of ngle θ, nd we ound it off with cuve of dius, how f wy fom the cone does the ound stt? nd wht is the chod length? (1+cos(θ)) sin(θ) θ 2 cos θ 2 xmple 67:

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

DRIVER BEHAVIOR MODELING USING HYBRID DYNAMIC SYSTEMS FOR DRIVER-AWARE ACTIVE VEHICLE SAFETY

DRIVER BEHAVIOR MODELING USING HYBRID DYNAMIC SYSTEMS FOR DRIVER-AWARE ACTIVE VEHICLE SAFETY DRIVER BEHAVIOR MODELING USING HYBRID DYNAMIC SYSTEMS FOR DRIVER-AWARE ACTIVE VEHICLE SAFETY Pin Boyz, Amdeep Sthynyn, John H.L. Hnsen Eik Jonsson School o Engineeing nd Compute Science Univesity o Texs

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

2.016 Hydrodynamics Prof. A.H. Techet

2.016 Hydrodynamics Prof. A.H. Techet .016 Hydodynmics Reding #5.016 Hydodynmics Po. A.H. Techet Fluid Foces on Bodies 1. Stedy Flow In ode to design oshoe stuctues, suce vessels nd undewte vehicles, n undestnding o the bsic luid oces cting

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Unveiling the MPLS Structure on Internet Topology

Unveiling the MPLS Structure on Internet Topology Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Definitions and terminology

Definitions and terminology I love the Case & Fai textbook but it is out of date with how monetay policy woks today. Please use this handout to supplement the chapte on monetay policy. The textbook assumes that the Fedeal Reseve

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT

PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT Daniel A. Menascé Robet Peaino Depatment of Compute Science, MS 4A5 Univesity Computing Geoge Mason Univesity Geoge Mason Univesity Faifax, VA

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

by K.-H. Rutsch*, P.J. Viljoen*, and H. Steyn* The need for systematic project portfolio selection

by K.-H. Rutsch*, P.J. Viljoen*, and H. Steyn* The need for systematic project portfolio selection An investigtion into the cuent pctice of poject potfolio selection in esech nd development division of the South Aficn minels nd enegy industy by K.-H. Rutsch*, P.J. Viljoen*, nd H. Steyn* J o u n l Synopsis

More information