Article Writing & Marketing: The Best of Both Worlds!

Size: px
Start display at page:

Download "Article Writing & Marketing: The Best of Both Worlds!"

Transcription

1 2612 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER 213 C-Cell: A Efficiet ad Scalable Network Structure for Data Ceters Hui Cai Logistical Egieerig Uiversity of PLA, Chogqig, Chia Eail: caihui_cool@126co ShegLi Li Logistical Egieerig Uiversity of PLA, Chogqig, Chia Eail: @qqco Wei Wei Logistical Egieerig Uiversity of PLA, Chogqig, Chia Eail: viviaww@yeahet Abstract Data ceters play a crucial role i curret Iteret architecture supportig cotet-cetric etworkig How to efficietly itercoect a expoetially icreasig uber of servers is a fudaetal challege i data ceters etworkig This paper presets C-Cell, a ew etwork architecture which is desiged o the basis of recursive structure A high-level C-Cell is costructed by low-level C-Cell Ad this structure ot oly has a low-ratio i switch/server, but also provides ultiple parallel short paths betwee ay pair of servers O the preise of low proportio of switches ad servers, C-Cell ca efficietly achieve routig echaiss i shorter ea path legths with less etwork cost Idex Ters Data ceter, etwork, routig, protocol I INTRODUCTION I recet years, data ceter etworkig (DCN) has bee attractig uch attetio of researchers, which desigs both the etwork structure ad associated protocols that itercoect thousads of servers at a data ceter But the developet of DCN ot oly leads to great challeges to the high ad balaced etwork capacity, ad robustess to lik/server faults, but also results i high hardware ifrastructure cost ad power cost Therefore, fault-tolerace, scalability, ad power cosuptio of the distributed storage for a data ceter becoe key parts i order to esure the data availability ad reliability I this paper, the authors focus o a siple techical proble Ca we build a fault-tolerace, scalability ad low-cost etworkig ifrastructure for data ceters, usig oly coodity server with 3 ports ad coodity switch? There are ay potetial beefits to solve this proble Firstly, we do ot use the high-ed ad expesive switch which is widely used today Ad coodity server ca also be available Secodly, the wirig becoes easier if oly 3 ports server is used for itercoectio There is o eed to add additioal hardware or wire o a server Thirdly, ore acadeic research ito data ceters ca be spawed New probles i data ceter etworkig ca be foud ad assessed through soe easy-build tests i istitutio But recet proposals ad curret practice caot solve those probles The tree-based structure eeds expesive ad high-ed switch as the core switch at the top level of the tree Ad the core switch failure ay tear dow thousads of servers The Fat-Tree solutio eeds ore switches, ad the uber of ports at a switch liits the scale of the Fat-Tree[1] DCell[2] ad BCube[3] also require ore ports i a server (typically four), to establish a large server populatio The fudaetal proble is that, we eed to desig a ew data ceter etworkig structure that works for servers with ode degree of oly 3 i order to scale We propose C-Cell, a Efficiet ad Scalable etwork structure for a data ceter C-Cell defies a recursive structure to itercoect servers A high-level C-Cell is costructed by low-level C-Cell Ad this structure ot oly has a low-ratio i switch/server, but also provides ultiple parallel short paths betwee ay pair of servers Therefore, C-Cell has fault tolerace ad load balace The rest of the paper is orgaized as follow Sectio 2 discusses the backgroud Sectio 3 describes the C-Cell structure ad its properties Sectio 4 presets the C-Cell routig ad sectio 5 discusses the solutio to icreetal expasio Sectio 6 uses both siulatios ad experiets to evaluate the C-Cell Sectio 7 cocludes the paper II BACKGROUND I this sectio, we firstly explai the traditioal hierarchy data ceter, ad the discuss the isufficiecy Secodly, we itroduce the curret data ceter ad aalyze their features Traditioal data ceter uses the hierarchy structure As show i Fig 1, a layer of servers at the botto is coected to a Top of Rack (ToR) switch ToR is 213 ACADEMY PUBLISHER doi:1434/jsw

2 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER coected to two L2 switches for redudacy L2 switches further coect to L3 routers At the top of this structure, core routers are very iportat because they aage the traffic ito ad out of the data ceter ad carry all traffic betwee L3 routers But there are soe fudaetal liitatios to this covetioal desig[4-6] INTERNET Data Ceter Layer 3 Layer 2 TOR SERVERS CR CR AR AR AR AR AS AS S S S S TOR TOR SERVERS SERVERS TOR SERVERS Key CR=L3 Core Router AR=L3 Access Router AS=L2 Aggr Switch S=L2 Switch TOR=Top-of-Rack Switch Figure 1 A etwork architecture for traditio data ceters Liited scale: Servers which are coected i the sae access router costitute a sigle layer-2 Because of the covetioal desig, the scale of a sigle layer-2 oly has 4 thousad servers It eas that traditioal data ceter caot afford a scale of illios of servers Liited server-to-server: If we go up the hierarchy, the traffic ovig up the differet layer-2 eeds to go through layer-3 Ad the lik betwee layer-2 to layer-3 is oversubscriptio So, the badwidth i layer-2 is liited by the oversubscriptio ratio For exaple, the upliks fro layer-2 are 1:2 oversubscribed, ad paths through layer-3 ca be 1:24 oversubscribed This large oversubscriptio factor fragets the server pool by prevetig idle servers fro beig assiged to overloaded services, ad it severely liits the etire data ceter s perforace Fragetatio of resources: As the cost ad perforace of couicatio depeds o distace i the hierarchy, the covetioal desig ecourages service plaers to cluster servers earby the hierarchy Moreover, spreadig a service outside a sigle layer-2 doai frequetly requires the oerous task of recofigurig IP addresses ad VLAN truks, sice the IP addresses used by servers are topologically deteried by the access routers above the Collectively, this cotributes to the squaderig of coputig resources across the data ceter The cosequeces are egregious Eve if there is pletiful spare capacity throughout the data ceter, it is ofte effectively reserved by a sigle service (ad ot shared), so that this service ca scale out to earby servers to respod rapidly to dead spikes or to failures I fact, the growig resource eed oe service to have forced data ceter operatios so as to evict other services i the sae layer-2 doai, icurrig sigificat cost ad disruptio Poor reliability ad utilizatio: Above the ToR, the basic resiliece odel is 1:1 For exaple, if a aggregatio switch or access router fails, there ust be sufficiet reaiig idle capacity o the couterpart device to carry the load This forces each device ad lik to ru up to at ost 5% of its axiu utilizatio Iside a layer-2 doai, the use of the Spaig Tree Protocol eas that eve whe ultiple paths betwee switches exist, oly a sigle oe is used I the layer-3 portio, Equal Cost Multipath (ECMP) is typically used: whe ultiple paths of the sae legth are available to a destiatio, each router uses a hash fuctio to spread flows evely across the ext available hops However, the covetioal topology offers at ost two paths High cost of hardware: core-switches ad core-routers which are used i traditioal data ceter etwork are expesive Ad the load balacer i layer-2 ust be used i pairs There are soe requireets ad features i the ew data ceter[7-8]: The data ceter ifrastructure ust be scalable to a large uber of servers ad allow for icreetal expasio The data ceter ust be fault tolerat agaist various types of server failures, lik outages, or server-rack failures The data ceter ust be able to provide high etwork capacity to better support badwidthhugry services The data ceter ust support virtualizatio which is the biggest differece betwee traditioal data ceter ad ew data ceter Curretly, data ceters use coodity-class coputers ad switches istead of specially desiged high-ed servers ad itercoect for better price-perforace ratio There are soe represetative data ceters likig Fat-tree[1,12], DCell[2], BCube[3] ad VL2[11] The Fat-tree is a layered etwork topology with equal lik capacity at every tier ad is cooly ipleeted by buildig a tree with ultiple roots The structure of Fat-tree has k pods, ad each pod has k/2 switches which have k ports The k/2 ports coect k/2 servers, ad aother k/2 ports coect core-switches The core layer has k core-switches which have k ports The Fat-tree has several parallel paths betwee odes, ad reoves the costraits about upper lik throughput But the Scalability of Fat-tree is liited by the uber of port of core-switch, ad Fat-tree is very sesitive to the fault of low-layer switch DCell uses a recursively-defied structure to itercoect servers Each server coects differet levels of DCells via ultiple liks We build high-level DCells recursively fro ay low-level oes, i a way that the low-level DCells for a fully-coected graph Usually, the uber of servers i DCell is 3 to 8 Whe a DCell has 6 servers, the uber of servers i a DCell 3 is 326- illio But there are soe defects i DCell The fullycoected graph used i DCell is too coplex to aage ad aitai Ad the flow of DCell at differet level is ueve BCube is the odular versio of DCell A BCube is siply servers coectig to a -port switch A BCube 1 is costructed fro BCube s ad -port 213 ACADEMY PUBLISHER

3 2614 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER 213 switches Geerically, a BCube k (k 1) is costructed fro BCube k-1 s ad k -port switches Each server i a BCube k has k+1 ports, which are ubered fro level- to level-k BCube ca sigificatly accelerate oe-to-x traffic patters ad provides high etwork capacity for all-to-all traffic The BCube Source Routig (BSR) further eables graceful perforace degradatio But the weakess of BCube is a relatively poor scalability Whe k=3ad =8 (k is the degree of BCube, is the uber of servers i a BCube ), BCube 3 oly has 496 servers VL2 is a scalable ad flexible data ceter etwork VL2 uses flat addressig to allow service istaces to be placed aywhere i the etwork, Valiat Load Balacig to spread traffic uiforly across etwork paths, ad ed syste-based address resolutio to scale to large server pools without itroducig coplexity to the etwork cotrol plae Figure 2 (a) A Cell of C-Cell with k=3 (b) A C-Cell with k=3 III THE C-CELL NETWORK STRUCTURE I this sectio, we firstly preset the C-Cell structure ad the aalyze its efficiecy ad soe properties Sectios 3-5 describe these copoets i detail A C-Cell Physical Structure ad the Way to Build C- Cell There are two types of devices i C-Cell: Servers with ultiple ports, ad switches that coect a costat uber of servers We kow that DCell ad BCube are a recursively defied structure I C-Cell, we also use a recursive way to defie its structure The C-Cell is costructed by a C-Cell -1 ad several C-Cell s This structure has soe advatages Firstly, the odularized ad recursive structure is good for coectio Secodly, it is easy to expad C-Cell +1 whe C-Cell is icoplete A C-Cell which is the buildig block to costruct larger C-Cell is siply k servers coectig to a -port ( > k) switch The followig exaple i Fig 2(a) illustrates a C-Cell (k=3) 3 servers are coected to a switch We the equally adjust each server to the circle which has the switch as the ceter, ad a arc of the circle betwee every two servers bridges the coectio of two servers, as illustrated i Fig 2(b) I order to distiguish the differece betwee Fig 2(a) ad Fig 2(b), the structure of Fig 1(b) we called C-Cell (k=3), ad the structure of Fig 1(a) we called Cell O the basis, a C- Cell 1 is structured fro a C-Cell ad k Cells The ethod is to break k arcs which coect two adjacet servers ad addig a Cell A C-Cell 1 (k=3) is illustrated i Fig 3(a) More geerically, a C-Cell ( 1) is costructed fro a C-Cell -1 ad k +1 Cell I our desig, each server i a C-Cell has 3 ports ad the uber of ax-port i each switch is k+2 Fig 3(b) illustrated a C- Cell 2 (k=3) The costructio of a C-Cell is as follows Firstly, we break k -1 arcs which coect adjacet two servers o the circle -1 Secodly, we add a Cell i each broke arc This eas that the two adjacet servers of C-Cell -1 o the circle -1 are coected by a Cell Thirdly, we equally adjust each ewly-joied server to the circle ad coect the ewly-joied servers which are adjacet o the circle Figure 3 (a) A C-Cell 1 with k=3 (b) A C-Cell 2 with k=3 The recursive C-Cell costructio procedure BulidC- Cells: /* stads for the level of C-Cell k is the uber of servers i a C-Cell */ 1 BuildC-Cells (k,) 2 if (= =) /* build C-Cell */ 3 for (it ; i<k; i++) 4 {coect i-th server to switch; 5 if (i+1<k) 6 coect ith server to i+1-th sever; 7 else 8 coect th server to i-th sever; 9 put each pair of servers i a queue; 1 } 11 record the legth of queue (queue_le); /* queue_le is the uber of Cell to add i the ext C-Cell k+1 */ 12 retur; 13 else while (!=) 14 {it = =; 15 while (queue_le!=) 16 {take a pair of servers fro queue, break they coectio ad add a Cell; 17 =+3; /* record the ew-servers */ 18 queue_le--; 19 } 213 ACADEMY PUBLISHER

4 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER for (it ; i<; i++) 21 {if (i+1<) 22 coect i-th ew-server to i+1-th ew-server; 23 else 24 coect -th ew-server to i-th ew-sever; 25 put each pair of ew-servers i a queue; 26 } 27 record the legth of queue (queue_ew_le); 28 queue_le=queue_ew_le; 29 --; /* whe =, fiish */ 3 } Figure 4 The procedure to build a C-Cell etwork B Properties of the C-Cell The followig theore describes ad bouds the properties of C-Cell The uber of the servers i a C-Cell is V ad the uber of the switches i a C-Cell is S Theore 1 V = S k (1) = (2) V k + for, where k is the uber of servers i C-Cell ad Cell Proof of Theore 1 A C-Cell is structured by addig Cells i a C-Cell -1 So, the first equatio ca directly derive fro the defiitios The, we use atheatical iductio to prove Theore 1 (2) Whe =, V =k, k + =k, V = k + Whe =1, V =k+k k, k + =k1 +k 2, V = k + If =, V = k + Whe =+1, V +1 = V +k (the uber of servers i circle ) The uber of servers i circle = V V 1 1 i + 1 i + 1 = k k =k+1 So V +1 = V +k k +1 = k + +k+2 = k + The coclusio V = k Theore 1 shows that, the uber of servers i a C- Cell rapidly scales as the circle degree icreases A larger etwork size ca be lead by a sall circle degree For exaple, whe k=6 ad =4, a C-Cell ca have as ay as 933 servers, ad oly 1555 switches A ratio of switch/server is 167 Copare with BCube, the uber of servers is 7776 whe k=6 ad =4, ad the uber of switches is 285 A ratio of switch/server is 367 Through above copariso, we ca draw a coclusio that the C-Cell has ore servers ad lower ratio of switch/server tha the BCube i the sae scale Whe k=3 ad =4, the ratio of switch/server i a BCube is 1667 This coditio is disadvatageous because the cost of refrigeratio facilities ad switches is expesive i a large data ceter But whe k=3( ), the ratio of switch/server i a C-Cell is also 333 C Bottleeck lik of the C-Cell The bottleeck lik of C-Cell ca be divided ito 2 aspects, ode-bottleeck ad path-bottleeck The ode-bottleeck eas that a ode ca t afford whe its data flow is too large I a C-Cell, the lower circle a ode (server/switch) is o, the ore probability it becoes the ode-bottleeck So we use high-ed switch istead of the ode (server/switch) o low circle This way ca reduce data trasissio pressure I sectio 5, this questio will be discuss i detail There is oly oe path to coect A subet ad B subet Whe this path is broke, the coectio betwee A ad B is lost This path ca be called path-bottleeck But i a C-Cell, we cosider that two arbitrary servers have several parallel paths (this ca be proof i theore 5) So, a coclusio ca be draw that C-Cell does ot have path-bottleeck i theory IV ROUTING IN A C-CELL Our goal is to itercoect up to illios of servers i a C-Cell Whe k=8 ad =6, 2 illios of servers are coected i a C-Cell 6 The routig i a C-Cell should be able to fully utilize the high capacity ad autoatically load-balace the traffic i our desig So, existig routig protocol such as OSPF is ot suitable sice it eeds a backboe area to itercoect all the other areas Badwidth bottleeck ad sigle poit failure are OSPF s biggest defect I this sectio, we firstly itroduce the routig without failure i C-Cell Secodly, we propose the routig protocol of C-Cell called C-CellRoutig Fially,a exaple is used to illustrate C-CellRoutig A Routig without Failure We assue two servers src ad des Theore 2 The haig distace of two rado servers i a C- Cell is oe I a C-Cell, each server is coected to the sae switch i Fig 1(b) So theore 2 is easy to be proved Theore 3 Whe k=3, the shortest distace of two rado servers i a C-Cell 1 is at ost 2 Ad whe k>3, the shortest distace of two rado servers i a C-Cell 1 is at ost 3 Proof of Theore 3 Whe k=3, there are 5 cases i a C-Cell 1 ( Fig 2(a)) 1 {server i C-Cell, server i C-Cell 1 }, ACADEMY PUBLISHER

5 2616 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER {server i C-Cell 1, server i C-Cell }, 1 3 {server i C-Cell, server i C-Cell }, {server i C- Cell, server i C-Cell 1 }, 2 4 {server i C-Cell 1, server i C-Cell }, {server i C- Cell, server i C-Cell 1 }, 2 5 {server i C-Cell 1, server i C-Cell }, {server i C- Cell, server i C-Cell }, 2 The haig distace of two rado servers i a C- Cell is oe (show i theore 2) So, whe k>3, there is aother case i a C-Cell 1 {server i C-Cell 1, server i C-Cell }, {server i C- Cell, server i C-Cell }, {server i C-Cell, server i C- Cell 1 }, 3 Therefore, theore 3 is proved Theore 4 I a C-Cell, the logest shortest distace of two rado servers is at ost 2+1 Proof of Theore 4 If src is a server o circly i (i ) i a C-Cell, des is a server o circly j (j ) i a C-Cell Accordig to theore 2 ad 3, we kow that there are i steps whe src jup to a server o circly (o circly i-1, circly i-2, circly ) I the sae way, there are j steps whe des jup to a server o circly Ad the distace of two rado servers i a C-Cell is oe (theore 2) So, the logest shortest distace fro src to des is i+j+1 (i, j ) Whe j=, the logest shortest distace fro src to des is 2+1 Therefore, we ca draw the coclusio that the logest shortest distace of two rado servers is at ost 2+1 i a C-Cell Theore 5 The parallel paths of two rado servers i a C-Cell are at least 3, ad at ost 3 2 Proof of theore 5 Fro the Physical Structure of C-Cell i sectio 31, it ca be see that each server is coected by 3 odes (server/switch) So, it is easy to prove that the parallel paths of two rado servers i a C-Cell are at least 3 Ad i theore 4, we kow that there are i steps whe src jup to a server o circly It eas that there are at ost 3 i parallel paths fro src to a server o circly Therefore, there are at ost 3 i+j parallel paths fro src to des (i, j ) Whe j=, there are at ost 3 2 parallel paths fro src to des Cosequetly, the parallel paths of two rado servers i a C-Cell are at least 3, ad at ost 3 2 B Protocol Naig rule I a C-Cell (k is the uber of servers i a Cell), we deote a server usig the 3-tuples which is [i, j, p] (circle, uber, agle) i eas that a server is i circle i ( i ) j eas that a server is the j-th server i circle i ( j k i+1-1) p eas the agle of a server i circle i ( p 36 )This aig rule ot oly uique idetify a server, but also ark the positio of a server by usig agle Likewise, we deote a switch usig the for [ i, j, p, S ] The letter S eas the ode is a switch, ot a server There is a special switch which is located i the ceter of a C-Cell We deote it usig [, S] A C-Cell whe k=3 is structured i sectio 31 (Fig 2(b)) Now, we use the aig rule to deote each server ad switch i Fig 5(a) We rule the ode O[,S] ad A[,,] Accordig to clockwise directio, we ode the server-b[,1,12] ad server-c[,2,24] Fig 5(b) illustrated the aig rule i a C-Cell 1 (k=3) Figure 5 (a) The aig rule i a C-Cell with k=3 (b) The aig rule i a C-Cell 1 with k=3 C-CellRoutig C-CellRoutig uses a efficiet ad siple sigle-path routig algorith for uicast by exploitig the recursive structure of C-Cell, is show i Fig 5 We follow a (recursive ethod) divide ad coquer approach to desig the C-CellRoutig We assue two servers src[s i, s j, s p ] ad des[d i, d j, d p ] that are i differet circle (I s I d ) Whe coputig the path fro src to des i a C-Cell, we first calculate the server id k [ i, j, p ] which ust satisfy the followig coditios: 1 i = d i -1 2 p <d p < p,( id [ i, j +1, p ]) The coditios ea that id ad des are coected by the sae switch Routig is the chage how to coputig the path fro src to id Followig the recursive ethod, we ca calculate the id o circle after d i steps The fial path of C- CellRoutig is the cobiatio of path(src, id )+path(id, id 1 )+ path(id 1, id 2 )+ + path(id k- 1, id k )+path(id k, des) /* src=[s i, s j, s p ] des=[d i, d j, d p ]*/ 1 C-CellRoutig (src, des ) 2 for (it k= d i ; k ; k--) 3 {calculate a server id k /* id k ad des are coected i the sae switch*/ 4 record the path(id k, des) 5 des= id k 6 if (k= =) 7 record the path(src, id k ) 8 } 9 retur path= path(src, id )+path(id, id 1 ) + + path(id k-1, id k )+path(id k, des) Figure 6 Pseudocode for routig i a C-Cell 213 ACADEMY PUBLISHER

6 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER Traffic Distributio i C-CellRoutig I this sectio, we discuss the oe-to-ay ad all-toall couicatio odel i C-CellRoutig Uder the couicatio odels, high badwidth ca be achieved So C-Cell ca provide the high badwidth for servers such as GFS ad MapReduce Oe-to-ay eas oe server trasfer the sae data to several servers It is useful for servers such as GFS Ad the beefit of this is to iprove reliability of the syste Whe a ew data is writte i the syste, it eeds to be siultaeously replicated to the several servers (typically three) We kow that each server has 3 ports i a C-Cell So, a C-Cell server ca utilize its ultiple liks to achieve high throughput All-to-all eas every server trasits data to all the other servers MapReduce is the represetative exaple of all-to-all traffic I all-to-all couicatio odel, every server establishes a flow with all other servers We assue that there is oe flow betwee ay two servers So, the total uber of flows are t (t +1), t is the uber of servers i C-Cell Fro the structure of C-Cell (Fig 2), lik at differet circle carry a differet uber of flows Lik at circle carry ore uber of flows tha lik at other circle We ca draw the coclusio that the bottleeck lik is at the lowest-circle liks rather tha at the highest-circle liks V INCREMENTAL EXPANSION With the expasio of the scale, a C-Cell has ore ad ore servers ad lik o circle ust carry ore ad ore uber of flows So, there are two questios we should discuss Firstly, we deote a server usig the 3-tuples which is [i, j, p] (circle, uber, agle) i sectio 421 But whe servers becoe huge i a C-Cell, the servers o the highest-circle are too ay to ark these agles Therefore, if several servers o the highest-circle are coected i the sae switch, we ark the agle of these servers to use the agle of the switch Fig 7 shows the iproved aig rule i a C-Cell 2 with k=3 Thirdly, we kow the C-Cell is costructed by a C- Cell -1 ad several C-Cell s i sectio 3 If the switch of ewly added C-Cell is broke, the servers which are coected by this switch caot work So, to avoid this situatio, we rule the ew addig servers sed a essage to the switch every 3s Whe the servers caot coect, it eas that the switch does t work properly We ust check the switch Figure 8 The iproved C-Cell VI SIMULATION AND IMPLEMENTATION I this sectio, we use siulatios to evaluate the perforace of C-Cell by java laguage ad NetBeas developet tools A Node without Failure I table 1, we ca see the average shortest distace whe there is ot ode failure (k=3) Because of ode without failure, the iaccessible ode is Ad whe =4, the average shortest distace is i 3 steps The coclusio is cosistet with the theore 4 TABLE 1 THE AVERAGE SHORTEST DISTANCE WHEN THERE IS NOT NODE FAILURE B Node Failure I our siulatio, ode failure eas server failure Firstly, we set the ode failure ratio Ad with the ode failure ratio icrease, we test the average path legth chages i C-Cell 4 (k=3) I Fig 9, whe the ode failure ratio is fro 6 to 16, the fluctuatio of average path legth is sall, ad i 27~28 Figure 7 The iproved aig rule i a C-Cell 1 with k=3 Secodly, we kow that lik at circle carry ore uber of flows tha lik at other circle i sectio 432 If the scale of C-Cell is too large, the lik at circle ay becoe bottleeck lik So, we odify the structure of C- Cell by usig switches istead of the servers which are o circle Fig 8 shows the iproved C-Cell structure 213 ACADEMY PUBLISHER

7 2618 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER 213 k=3 Ad we copare the test results with DCell 4 (k=3) I fig 12, the path failure ratio of C-Cell 4 is ore stable tha the path failure ratio of DCell 4 ad also i 1~5 Figure 9 The fluctuatio of average path legth whe the ode failure ratio icreases The we study the path failure ratio for the foud path with the ode failure I this sectio, we vary the ode failure ratio fro 2%~2% ad the etworks are a C- Cell4 with k=3 Fially, we copare the test results with DCell4 (k=3) Fig 1 shows the path failure ratio of both C-Cell4 ad DCell4 versus the path failure ratio uder ode failures icreasig We observe that, the path failure ratio of C-Cell fluctuates with DCell chages,ad C- Cell results are very close to DCell results Figure 1 The path failure ratio of DCell ad C-Cell whe the ode failure ratio icreases Figure 12 The fluctuatio of average path legth whe the lik failure ratio icreases D Fault-tolerace The experiet is coposed by a C-Cell 1 with over 12 server odes Each C-Cell has 3 servers (see Fig 5(b) for the topology) Each server is a desktop with Iter 33GHz dual-core CPU, 4GB DRAM, ad 5GB hard disk The Etheret switches used to for the C-Cell s are D-Lik 8- port Gigabit switches DGS-18A I this experiet, we set up a TCP coectio betwee servers [1,,2] ad [1,5,22] The path betwee the two servers is [1,,2], [,,], [,1,12], [1,5,22] To study the perforace uder lik failure, we aually uplugged the lik ([,,], [,1,12]) at tie 3s ad replugged it at tie 4s The, we shutdow the server [,1,12] at tie 7s to estiate the ipact of ode failure After the failures, the ew path is chaged to [1,,2], [,,], [,2,24], [1,5,22] After re-pluggig, the path returs to the origial oe C Lik Failure Lik failure eas the path break betwee server ad switch or switch failure So, we have studied the effect of lik failure Fig 11 shows that, the average path legth is i 26~29 whe the lik failure ratio is lower tha 2 Figure 13 TCP throughput with lik ad ode failure Figure 11 The fluctuatio of average path legth whe the lik failure ratio icreases Therefore, ext we study the path failure ratio for the foud path with the lik failure We vary the lik failure ratio fro 2%~2% ad the etworks are a C-Cell 4 with There are two coclusios fro the experiet i Fig 13 Firstly, the TCP throughput of C-Cell is quickly recovered to its best value fro both failures after a few secods Secodly, the resiliece speed of lik failure is faster tha ode failure The lik failure occurs, the TCP throughput takes oly 1-secod to recover, while the ode failure occurs, the TCP throughput takes 4-secod to recover 213 ACADEMY PUBLISHER

8 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER E Network Capacity I this experiet, we copare the total throughput of C-Cell ad the tree structure Each server established a TCP coectio to all other 11 servers Each server seds 1GB data ad therefore each TCP coectio seds 833MB This is to eulate the reduce-phase operatios i MapReduce I the reduce phase, each Reduce worker fetches data fro all other workers, resultig i a all-toall traffic patter Figure 14 Total throughput uder C-Cell ad Tree Fig 14 plots both the total throughput of C-Cell ad the tree structure The data trasfer copletes at ties 167 ad 337 secods for C-Cell ad the tree structure, respectively C-Cell is about 2 ties faster tha the tree structure The per-server throughput i C-Cell is 517Mb/s, but it was oly 256Mb/s The iitial throughput of the tree is due to the TCP coectios aog the servers coectig to the sae switches After the coectio teriate, all the coectios have to go through the root switch So, the total throughput decreases But there are o such bottleeck liks i C-Cell VII CONCLUSION I this paper, we firstly aalyze the isufficiecy of traditioal hierarchy data ceter, ad propose soe features of ew data ceter Secodly, we preset the desig, aalysis ad ipleetatio of C-Cell which is a ew data ceter etwork Fially, through the siulatio test, o the preise of low proportio of switches ad servers, C-Cell ca efficietly achieve routig echaiss i shorter ea path legths with less etwork cost ACKNOWLEDGMENT Fud project: the ary logistics key scietific research progra fuded projects of PLA (BS211R99) REFERENCES [1] Leiserso C E Fat-trees: Uiversal etworks for hardware-efficiet supercoputig IEEE Trasactios o Coputers 1985 C34(1): [2] Chuaxiog Guo DCell: A scalable ad fault-tolerat etwork structure for data ceters//proceedigs of the SIG-COMM 28 Seattle WA, USA 28: [3] Chuaxiog Guo BCube: A high perforace, servercetric etwork architecture for odular data ceter//proceedigs of the SIGCOMM 29 Barceloa Spai, 29: [4] Da Li ESM: Efficiet ad Scalable Data Ceter Multicast Routig IEEE/ACM Trasactios o Networkig, Vol 2, No 3, Jue 212: [5] A Shieh, S Kadula, A Greeberg, ad C Ki Seawall: Perforace Isolatio for Cloud Dataceter Networks I HotCloud, 21 [6] Greeberg A, Hailto J, Mahz D A, Patel P Cost of cloud ACM SIGCOMM Coputer Couicatio Review, 29 39(1) [7] D Li, J Yu, J Yu, ad J Wu, Explorig efficiet ad scalable ulticast routig i future data ceter etworks, i Proc IEEE INFOCOM, Apr 211, pp [8] Kai Che DAC: Geeric ad Autoatic Address Cofiguratio for Data Ceter Networks IEEE/ACM Trasactios o Networkig, Vol 2, No 1, FEBRUARY 212:84-99 [9] Xidog You ARAS-M: Autoatic Resource Allocatio Strategy based o Market Mechais i Cloud Coputig Joural of Coputers, Vol 6, No 7, 211: [1] Tog Yag Mass Data Aalysis ad Forecastig Based o Cloud Coputig Joural of Software, Vol 7, No 1, 212: [11] Albert Greeberg VL2: A scalable ad flexible data ceter etwork//proceedigs of the SIGCOMM 28 Seattle, WA USA 28: [12] B Bogdaski sftree: A Fully Coected ad Deadlock- Free Switch-to-Switch Routig Algorith for Fat-Trees ACM Trasactios o Architecture ad Code Optiizatio, Vol 8, No 4, Article 55, Jauary 212 CAI Hui, bor 983, PhD His research orietatios are cloud ad P2P coputig LI Sheli, bor 964, professor, PhD His research iterests iclude Logistic Iforatioizatio ad cloud coputig WEI Wei, bor 977, PhD Her research directio icludes cloud ad grid coputig 213 ACADEMY PUBLISHER

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling : A Global -based Redistributio Approach to Accelerate RAID-5 Scalig Chetao Wu ad Xubi He Departet of Electrical & Coputer Egieerig Virgiia Coowealth Uiversity {wuc4,xhe2}@vcu.edu Abstract Uder the severe

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

ECONOMICS. Calculating loan interest no. 3.758

ECONOMICS. Calculating loan interest no. 3.758 F A M & A N H S E E S EONOMS alculatig loa iterest o. 3.758 y Nora L. Dalsted ad Paul H. Gutierrez Quick Facts... The aual percetage rate provides a coo basis to copare iterest charges associated with

More information

How To Calculate Stretch Factor Of Outig I Wireless Network

How To Calculate Stretch Factor Of Outig I Wireless Network Stretch Factor of urveball outig i Wireless Network: ost of Load Balacig Fa Li Yu Wag The Uiversity of North arolia at harlotte, USA Eail: {fli, yu.wag}@ucc.edu Abstract outig i wireless etworks has bee

More information

CHAPTER 4: NET PRESENT VALUE

CHAPTER 4: NET PRESENT VALUE EMBA 807 Corporate Fiace Dr. Rodey Boehe CHAPTER 4: NET PRESENT VALUE (Assiged probles are, 2, 7, 8,, 6, 23, 25, 28, 29, 3, 33, 36, 4, 42, 46, 50, ad 52) The title of this chapter ay be Net Preset Value,

More information

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay At Coloy Algorith Based Schedulig for Hadlig Software Project Delay Wei Zhag 1,2, Yu Yag 3, Juchao Xiao 4, Xiao Liu 5, Muhaad Ali Babar 6 1 School of Coputer Sciece ad Techology, Ahui Uiversity, Hefei,

More information

The Binomial Multi- Section Transformer

The Binomial Multi- Section Transformer 4/15/21 The Bioial Multisectio Matchig Trasforer.doc 1/17 The Bioial Multi- Sectio Trasforer Recall that a ulti-sectio atchig etwork ca be described usig the theory of sall reflectios as: where: Γ ( ω

More information

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks This paper was preseted as part of the ai techical progra at IEEE INFOCOM 0 Throughput ad Delay Aalysis of Hybrid Wireless Networks with Multi-Hop Upliks Devu Maikata Shila, Yu Cheg ad Tricha Ajali Dept.

More information

Controller Area Network (CAN) Schedulability Analysis with FIFO queues

Controller Area Network (CAN) Schedulability Analysis with FIFO queues Cotroller Area Network (CAN) Schedulability Aalysis with FIFO queues Robert I. Davis Real-Tie Systes Research Group, Departet of Coputer Sciece, Uiversity of York, YO10 5DD, York, UK rob.davis@cs.york.ac.uk

More information

CDAS: A Crowdsourcing Data Analytics System

CDAS: A Crowdsourcing Data Analytics System CDAS: A Crowdsourcig Data Aalytics Syste Xua Liu,MeiyuLu, Beg Chi Ooi, Yaya She,SaiWu, Meihui Zhag School of Coputig, Natioal Uiversity of Sigapore, Sigapore College of Coputer Sciece, Zhejiag Uiversity,

More information

arxiv:0903.5136v2 [math.pr] 13 Oct 2009

arxiv:0903.5136v2 [math.pr] 13 Oct 2009 First passage percolatio o rado graphs with fiite ea degrees Shakar Bhaidi Reco va der Hofstad Gerard Hooghiestra October 3, 2009 arxiv:0903.536v2 [ath.pr 3 Oct 2009 Abstract We study first passage percolatio

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Distributed Storage Allocations for Optimal Delay

Distributed Storage Allocations for Optimal Delay Distributed Storage Allocatios for Optial Delay Derek Leog Departet of Electrical Egieerig Califoria Istitute of echology Pasadea, Califoria 925, USA derekleog@caltechedu Alexadros G Diakis Departet of

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING Joural of Theoretical ad Applied Iforatio Techology 5 th Deceber 202. Vol. 46 No. 2005-202 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 GOAL PROGRAMMING BASED MASTER PLAN

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class A Electroic Tool for Measurig Learig ad Teachig Perforace of a Egieerig Class T.H. Nguye, Ph.D., P.E. Abstract Creatig a egieerig course to eet the predefied learig objectives requires a appropriate ad

More information

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Over a Computer Network

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Over a Computer Network sig a Packet Siffer to Aalyze the Efficiecy ad Power of Ecryptio Techiques sed to Protect Data Over a Coputer Network Seyo Litviov Statistics Departet/MCS Progra St. Cloud State iversity slitviov@stcloudstate.edu

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology Coputatioal Water, Eergy, ad Eviroetal Egieerig, 2013, 2, 26-30 doi:10.4236/cweee.2013.23b005 Published Olie July 2013 (http://www.scirp.org/joural/cweee) Digital Iteractive Kaba Advertiseet Syste Usig

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

How to use what you OWN to reduce what you OWE

How to use what you OWN to reduce what you OWE How to use what you OWN to reduce what you OWE Maulife Oe A Overview Most Caadias maage their fiaces by doig two thigs: 1. Depositig their icome ad other short-term assets ito chequig ad savigs accouts.

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Controller Area Network (CAN) Schedulability Analysis: Refuted, Revisited and Revised

Controller Area Network (CAN) Schedulability Analysis: Refuted, Revisited and Revised Cotroller Area Networ (CAN) Schedulability Aalysis: Refuted, Revisited ad Revised Robert. Davis ad Ala Burs Real-ie Systes Research Group, Departet of Coputer Sciece, Uiversity of Yor, YO1 5DD, Yor (UK)

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Gie robust Operatios Ad Adersarial Strategies

Gie robust Operatios Ad Adersarial Strategies Perforace ealuatio of large-scale dyaic systes Eauelle ceaue, Roaric Ludiard, Bruo ericola To cite this ersio: Eauelle ceaue, Roaric Ludiard, Bruo ericola. Perforace ealuatio of largescale dyaic systes.

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Computer Networks 56 (2012) 2132 2147. Contents lists available at SciVerse ScienceDirect. Computer Networks

Computer Networks 56 (2012) 2132 2147. Contents lists available at SciVerse ScienceDirect. Computer Networks Computer etworks 56 (01) 13 147 Cotets lists available at SciVerse ScieceDirect Computer etworks joural homepage: www.elsevier.com/locate/comet DPillar: Dual-port server itercoectio etwork for large scale

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

A Load Balancing Algorithm for High Speed Intrusion Detection

A Load Balancing Algorithm for High Speed Intrusion Detection A Load Balacig Algorith for High Seed Itrusio Detectio LU Sheg, GONG Jia, RUI Suyig Deartet of Couter Sciece ad Egieerig, Southeast Uiversity, Naig, Chia Easter Chia (North) Network Ceter of CERNET (0096)

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Through its open standards, the Internet set the foundation for

Through its open standards, the Internet set the foundation for F E A T U R E Secure itraets are fouded o the protectio of logical resources accessible i corporate eterprises. A ROLE- BASED ACCESS CONTROL FOR INTRANET SECURITY The proposed I-RBAC, ZAHIR TARI AND SHUN-WU

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

A Constant-Factor Approximation Algorithm for the Link Building Problem

A Constant-Factor Approximation Algorithm for the Link Building Problem A Costat-Factor Approximatio Algorithm for the Lik Buildig Problem Marti Olse 1, Aastasios Viglas 2, ad Ilia Zvedeiouk 2 1 Ceter for Iovatio ad Busiess Developmet, Istitute of Busiess ad Techology, Aarhus

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions Chapter 5 Uit Aual Amout ad Gradiet Fuctios IET 350 Egieerig Ecoomics Learig Objectives Chapter 5 Upo completio of this chapter you should uderstad: Calculatig future values from aual amouts. Calculatig

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

A Churn-prevented Bandwidth Allocation Algorithm for Dynamic Demands In IaaS Cloud

A Churn-prevented Bandwidth Allocation Algorithm for Dynamic Demands In IaaS Cloud A Chur-preveted Badwidth Allocatio Algorithm for Dyamic Demads I IaaS Cloud Jilei Yag, Hui Xie ad Jiayu Li Departmet of Computer Sciece ad Techology, Tsighua Uiversity, Beijig, P.R. Chia Tsighua Natioal

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Investigation of Atwood s machines as Series and Parallel networks

Investigation of Atwood s machines as Series and Parallel networks Ivestiatio of Atwood s achies as Series ad Parallel etworks Jafari Matehkolaee, Mehdi; Bavad, Air Ahad Islaic Azad uiversity of Shahrood, Shahid Beheshti hih school i Sari, Mazadara, Ira ehdisaraviaria@yahoo.co

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

A Cyclical Nurse Schedule Using Goal Programming

A Cyclical Nurse Schedule Using Goal Programming ITB J. Sci., Vol. 43 A, No. 3, 2011, 151-164 151 A Cyclical Nurse Schedule Usig Goal Prograig Ruzzaiah Jeal 1,*, Wa Rosaira Isail 2, Liog Choog Yeu 3 & Ahed Oughalie 4 1 School of Iforatio Techology, Faculty

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Online Banking. Internet of Things

Online Banking. Internet of Things Olie Bakig & The Iteret of Thigs Our icreasigly iteretcoected future will mea better bakig ad added security resposibilities for all of us. FROM DESKTOPS TO SMARTWATCHS Just a few years ago, Americas coducted

More information

Is there employment discrimination against the disabled? Melanie K Jones i. University of Wales, Swansea

Is there employment discrimination against the disabled? Melanie K Jones i. University of Wales, Swansea Is there employmet discrimiatio agaist the disabled? Melaie K Joes i Uiversity of Wales, Swasea Abstract Whilst cotrollig for uobserved productivity differeces, the gap i employmet probabilities betwee

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability A Supply Chai Gae Theory Fraework for Cybersecurity Ivestets Uder Network Vulerability Aa Nagurey, Ladier S. Nagurey, ad Shivai Shukla I Coputatio, Cryptography, ad Network Security, N.J. Daras ad M.T.

More information

A zero one programming model for RNA structures with arc length 4

A zero one programming model for RNA structures with arc length 4 Iraia Joural of Matheatical Cheistry, Vol. 3, No.2, Septeber 22, pp. 85 93 IJMC A zero oe prograig odel for RNA structures with arc legth 4 G. H. SHIRDEL AND N. KAHKESHANI Departet of Matheatics, Faculty

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

WindWise Education. 2 nd. T ransforming the Energy of Wind into Powerful Minds. editi. A Curriculum for Grades 6 12

WindWise Education. 2 nd. T ransforming the Energy of Wind into Powerful Minds. editi. A Curriculum for Grades 6 12 WidWise Educatio T rasformig the Eergy of Wid ito Powerful Mids A Curriculum for Grades 6 12 Notice Except for educatioal use by a idividual teacher i a classroom settig this work may ot be reproduced

More information

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life TIAA-CREF Wealth Maagemet Persoalized, objective fiacial advice for every stage of life A persoalized team approach for a trusted lifelog relatioship No matter who you are, you ca t be a expert i all aspects

More information

Impacts of the Collocation Window on the Accuracy of Altimeter/Buoy Wind Speed Comparison A Simulation Study. Ge Chen 1,2

Impacts of the Collocation Window on the Accuracy of Altimeter/Buoy Wind Speed Comparison A Simulation Study. Ge Chen 1,2 Ge Che Ipacts of the Collocatio Widow o the ccuracy of ltieter/uoy Wid Speed Copariso Siulatio Study Ge Che, Ocea Reote Sesig Istitute, Ocea Uiversity of Qigdao 5 Yusha Road, Qigdao 66003, Chia E-ail:

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Shared Memory with Caching

Shared Memory with Caching Vorlesug Recherarchitektur 2 Seite 164 Cachig i MIMD-Architectures ] MIMD-Architekture Programmiermodell Behadlug der Kommuikatioslatez Nachrichteorietiert globaler Adressraum Latez miimiere Latez verstecke

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

France caters to innovative companies and offers the best research tax credit in Europe

France caters to innovative companies and offers the best research tax credit in Europe 1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find 1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Jural Mekaikal Jue 2009, No. 28, 1-15 SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Chow Ki Paw, Reugath Varatharajoo* Departet of Aerospace Egieerig Uiversiti Putra Malaysia 43400 Serdag,

More information

The Computational Rise and Fall of Fairness

The Computational Rise and Fall of Fairness Proceedigs of the Twety-Eighth AAAI Coferece o Artificial Itelligece The Coputatioal Rise ad Fall of Fairess Joh P Dickerso Caregie Mello Uiversity dickerso@cscuedu Joatha Golda Caregie Mello Uiversity

More information