Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization
|
|
|
- Blaze Elliott
- 10 years ago
- Views:
Transcription
1 Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico di Milano, Piazza Leonardo da Vinci 3, Milano, Italy [email protected] Abstract The Network Functions Virtualization (NFV) paradig is the ost proising technique to help network providers in the reduction of capital and energy costs. The deployent of virtual network functions (s) running on generic x hardware allows higher flexibility than the classical iddleboxes approach. NFV also reduces the coplexity in the deployent of network services through the concept of service chaining, which defines how ultiple s can be chained together to provide a specific service. As a drawback, hosting ultiple s in the sae hardware can lead to scalability issues, especially in the processing-resource sharing. In this paper, we evaluate the ipact of two different types of costs that ust be taken into account when ultiple chained s share the sae processing resources: the upscaling costs and the context switching costs. Upscaling costs are incurred by s ulticore ipleentations, since they suffer a penalty due to the needs of load balancing aong cores. Context switching costs arise when ultiple s share the sae CPU and thus require the loading/saving of their context. We odel through an ILP proble the evaluation of such costs and we show their ipact in a s consolidation scenario, when the x hardware deployed in the network is iniized. I. INTRODUCTION Current fixed and obile network operators are struggling to reduce capital and energy costs and increase their revenues by sartly upgrading their network infrastructure. In the last years, an innovative network architecture paradig called Network Functions Virtualization (NFV) [1] has eerged as a proising technique to help network operators in achieving this goal. NFV is based on the concept of network function. A network function is an abstract building block whose ai is to process the network traffic to accoplish a specific task. Exaples of network functions are Firewalls, Network Address Translators, Traffic Monitors etc. Nowadays, the network functions are usually ipleented on dedicated hardware, usually referred as iddleboxes. Such iddleboxes are able to handle heavy traffic loads, but they are expensive and inflexible, since they are designed to perfor liited operations on the traffic, and they ust be diensioned at peak loads, leading to waste of resources when the traffic is low, e.g., in off-peak hours. The NFV paradig consists in oving fro an hardware to a software ipleentation of network functions in a virtualized environent. This way, ultiple and heterogeneous virtual network functions (s) can be hosted by the sae generic x hardware. NFV adds flexibility to the network since it allows network operators to efficiently diension and dynaically consolidate the s. Another value added by NFV is the siplicity in the deployent of heterogeneous network services. In fact NFV can exploit the concept of service chaining [], according to which a service (e.g., web browsing, VoIP, video streaing, online gaing etc.) can be provided by one or ore service chains (SCs), i.e., a concatenation of appropriate s that ust be crossed by the traffic associated to that specific service. NFV has also soe drawbacks. Moving fro an hardware to a virtualized software ipleentation can lead to scalability issues in the resource sharing, especially concerning processing. In this paper, we evaluate the ipact of processing-resource sharing aong ultiple s in a consolidation scenario. We show how the size and the nuber of s sharing the sae x hardware influence the hardware processing perforance, and how the deployent in the network of ultiple SCs using such s is affected. Indeed, consolidating ultiple s in the sae hardware leads to inefficiencies due to the need of saving/loading the context (i.e., the state) of the s sharing the processing resources (context switching costs) [3][], as well as to inefficiencies due to the needs of ulti-core ipleentations (upscaling costs) [5]. To the best of our knowledge, this paper is the first study evaluating such processing-related costs in a consolidation scenario. The reainder of the paper is organized as follows. Section II discusses soe related works. In Section III we introduce our syste odel, showing how we odel the physical network, the s, the SCs and the processing-related costs. Section IV introduces our optiization proble for the evaluation of the effects of upscaling and context switching costs in a consolidation scenario. In Section V we show the nuerical results and Section VI draws the conclusion of our work. II. RELATED WORKS In our paper, we develop an optiization proble for SC and placeent that can be seen as an extension of soe well-known Virtual Network Ebedding (VNE) probles, as the ones shown in [][7][]. In our proble, the SCs can be seen as siple-chain virtual graphs, where the chained s are virtual nodes connected together by virtual links. Such SCs ust be ebedded in a physical network, where each virtual link can be apped to a physical path [], ultiple
2 NFV node NFV node SC1 SC n 1 3 s sharing the sae node v 3 shared by different SCs v 5 v 7 NFV node v 1 v Fig. 1. Physical topology where soe nodes are equipped with generic ulti-core x hardware (i.e., NFV nodes) v v v virtual nodes can be apped to the sae physical node [7], and the virtual nodes ust be consolidated []. With respect to Refs. [][7][], in our SCs ebedding proble it ust be also guaranteed that a virtual node (i.e., a ) can be shared aong ultiple virtual networks (i.e., SCs). Ref. [9] is the first work investigating the optial placeent of SCs in the network following a VNE approach. The authors first foralize the concept of SC and, then they forulate a Mixed Integer Quadratically Constrained Proble to evaluate the optial placeent of s and SCs. In our paper, we develop a siilar optiization proble, but we extend the analysis to cover also the processing-related costs for the physical nodes. Soe other studies deal with efficient placing of SCs and s in the network. Ref. [] proposes an efficient algorith for the counication aong different chained s that are hosted by the sae generic hardware, while Ref. [10] introduces an algorith to efficiently handle traffic load variations by dynaically instantiating s. Ref. [11] defines an online algorith for joint Virtual Machine placeent, routing and consolidation with the ai of iniizing traffic costs. Our approach is siilar, but we investigate the iplications of such strategies fro a processing-resource sharing perspective. III. SYSTEM MODEL A. Physical topology and NFV nodes odeling We odel the physical network as a connected directed graph G = (V, E). All the network nodes v V have forwarding capabilities. Then, the links (v, v ) E connecting the nodes are high-capacity fiber links. The network nodes v can also be equipped with standard x hardware (see Fig. 1), that can be used to host different s. The x hardware can have different capabilities in ters of storage and processing, and can potentially be hosted in every powered physical location (e.g., in a cabinet, in a central office, in a core exchange, etc.). In this paper, we focus on the processing aspect and we generally call the nodes hosting generic x hardware NFV nodes. We assue that the NFV nodes are ulti-core systes, and we easure the processing capability of each NFV node in ters of the nuber of CPU cores γ v it is equipped with. Clearly, if γ v = 0 the node v has not processing capability. Fig.. Exaple of SCs that ust be ebedded in the physical network, where different s can share the processing resources of the sae NFV node and ultiple SCs can share the sae B. Virtual network functions odeling In general, a f F can be seen as a black-box perforing soe operations on the network traffic. Every f hosted by a NFV node v ust be assigned a dedicated processing capability c f,v in order to fulfil all the operations it has to perfor on the input traffic. The processing capability c f,v represents the fraction of the overall processing capability γ v of the node v assigned to the f, expressed in ters of nuber of CPU cores. We say that a has a larger size when it is assigned a larger processing capability c f,v. We assue that a f can be shared aong different SCs (e.g., in Fig. ) each requiring a fraction π f of the processing capability c f,v. Note that heterogeneous s require a π f that can largely vary fro one to each other, depending on the coplexity of the operations perfored. In our work we assue that π f has been optially chosen, i.e., for each SC, traffic is queued for a negligible tie before it is processed. In other words, every is designed in such a way it does not introduce additional latency due to a bad or inadequate ipleentation. C. Service chains odeling When a service is required between two end-points, one or ore SCs c C ust be deployed in the network. In general, heterogeneous SCs can be deployed, and soe SCs can be shared aong different services. Without any loss of generality, we consider a one-to-one correspondence between a service and a SC. A SC c can be odelled by a siplechain graph C c = (X c U c, G c ), where X c is the set of start/end points u, U c is the set of requests u and G c is the set of virtual links (u, u ) chaining consecutive requests/end points u and u. Fro a topological point of view, both requests and end points are virtual nodes u X c U c. Note that, siilarly to [9], in our odel we decouple the concepts of f and of request u: for every SC c, every request u U c is apped to a specific f. We then introduce the apping paraeter τ c u F to specify the apping of the request u for the SC c to a specific f. Siilar considerations can be done for the end points u X c.
3 We assue that such end points are fixed in the network, and we introduce the apping paraeter η c u V to specify the apping between the end point u for the SC c to a specific physical node v. In our odel, every single SC c can serve an aggregate set of users. Such aggregate SCs are deployed when ultiple users require the sae service between the sae two end points. Every SC is also associated to soe perforance/qos paraeters such as: The requested bandwidth δu,u c, i.e., the bandwidth that ust be guaranteed between two requests/end points u and u to provide the service offered by the SC c. Note that every virtual link (u, u ) can be associated to a different bandwidth requireent because the chained s can lead to a change in the traffic throughput. The axiu tolerated latency ϕ c, i.e., the axiu delay that can be introduced by the network without affecting the service between the two end points of the SC c. D. Processing-related costs for the NFV nodes The processing-related costs (upscaling and context switching) for a NFV node v are ainly influenced by: The size of the s f hosted by the node v; The nuber of requests u apped to the s f, which share the processing resources of the NFV node v. Upscaling costs: When a f ust process a high quantity of traffic, it ight need ore processing resources than the ones provided by a single CPU core. In this case, a ulti-core ipleentation of the is needed and soe upscaling costs ust be taken into account. These costs arise because of the software architectural challenges that ust be addressed when a ulti-core is ipleented. In fact, the traffic that ust be handled by ulti-core s needs to be balanced aong different CPU cores by a load balancer. The needs of load balancing add a new layer in the syste architecture that can becoe a bottleneck, ust be carefully designed and leads to soe perforance penalties [1]. For this reason, the higher is the nuber of CPU cores used by the ulti-core, the higher are the upscaling costs. We then assue that such costs can be odelled as a step function of the nuber of CPU cores used by the. Context switching costs: When ultiple s are hosted by the sae NFV node, the CPU cores are shared aong such different s. This leads to another kind of costs, i.e., the context switching costs. These costs are related to the effort that ust be taken into account in order to execute ultiple s in the sae CPU, and we assue that they linearly increase with the nuber of requests apped into the s that share the CPU cores γ v of the NFV node v. These costs are strictly related to the needs of cache sharing aong different s and of saving/loading the context (i.e., the state) of a for CPU resource sharing [13][1]. These considerations show how a size/nuber trade-off on the s sharing the sae node exists, since a node TABLE I SUMMARY OF GRAPHS AND SETS CONSIDERED IN THE MODEL Graph/Set G = (V, E) C C c = (X c U c, G c ) F Description Physical network graph, where V is the set of physical nodes v and E is the set of physical links (v, v ) connecting the nodes v and v Set of the service chains c that ust be ebedded in the physical network G Siple-chain graph for the SC c, where X c is the set of fixed start/end point u, U c is the set of requests u, G c is the set of virtual links (u, u ) connecting the request (or start point) u and the request (or end point) u Set of s f that can be requested and deployed in the network TABLE II SUMMARY OF PARAMETERS CONSIDERED IN THE MODEL Paraeter Doain Description τu c c C requested by the request u ηu c u U c c C in the SC c (τu c F ) Physical node where the start/end point u X c u for the SC c is apped to (ηu c V ) π f f F Fraction of the CPU processing required by each request u for the f γ v v V Nuber of the CPU cores hosted by the node v β v,v (v, v ) E Bandwidth capacity of the physical link (v, v ) λ v,v (v, v ) E Latency of the physical link (v, v ) µ v v V Upscaling latency of the node v ω v v V Context switching latency of the node v κ v v V Upscaling processing of the node v ξ v v V Context switching processing of the node v δu,u c c C Requested bandwidth on the virtual link (u, u ) G c (u, u ) for the SC c ϕ c c C Maxiu tolerated latency by the SC c M Big-M paraeter hosting a big nuber of sall s ust deal with big context switching costs and sall upscaling costs, while a node hosting a sall nuber of big s leads to sall context switching costs but big upscaling costs. We assue that the upscaling and context switching costs lead to two different perforance degradation effects: Increase of the latency introduced by the NFV node. In fact, both deciding how to balance traffic aong different CPU cores and saving/loading the s context require soe coputational tie. We call µ v the upscaling latency and ω v the context switching latency for the NFV node v. Decrease of the actual processing capability of the NFV node. In fact, both taking a decision about how to balance traffic aong different cores and saving/loading the s context require soe dedicated processing capability, that in turn cannot be used by the s hosted in that node. We call κ v the upscaling processing and ξ v the context switching processing for the NFV node v.
4 TABLE III DECISION VARIABLES FOR THE ILP MODEL Variable Doain Description c u,v {0, 1} c C Binary variable such that u U c c u,v = 1 iff the v V request u for the SC c is apped to the node v, otherwise c u,v = 0 c f,v [0, γ v] v V f F fraction of the CPU cores in the node v used by the f Real variable indicating the i f,v {0, 1} f F Binary variable such that v V i f,v = 1 iff the f is hosted by the node v, otherwise i f,v = 0 e c v,v,x,y,u,u {0, 1} c C Binary variable such that (v, v ) E e c v,v x V,x,y,u,u = 1 iff the physical link (v, v ) y V belongs to the path between (u, u ) G c the nodes x and y, where the requests u and u for the SC c are apped to, otherwise e c v,v,x,y,u,u = 0 a v {0, 1} v V Binary variable such that a v = 1 iff the node v is active, otherwise a v = 0 IV. OPTIMIZATION PROBLEM FOR S CONSOLIDATION In this Section we forulate an Integer Linear Prograing (ILP) odel for consolidation. A suary of the sets, paraeter and variables used in the odel is reported in Tables I, II, III. Given a physical network topology and soe SCs, we want to optially decide the position and the size of the chained s while iniizing the nuber of active NFV nodes (i.e., the nodes hosting at least one ) in the network. The constraints are grouped in three categories: requests placeent constraints, routing constraints and perforance constraints. The requests placeent constraints ensure a correct apping of the s f on the NFV nodes v as well as a correct apping between the requests u and the s f. The routing constraints guarantee a correct apping of the virtual links (u, u ) on physical paths constituted by different links (v, v ). Finally, the perforance constraints are related to all the perforance requireents that ust be addressed in the network. 1) Objective function: in a v (1) v V The objective function iniizes the nuber of active NFV nodes. This way, we try to consolidate as uch as possible the s. This optiization proble can be useful for network operators to plan the best strategical placeent of the x hardware. The nuber of active nodes in the network is a easure of the cost for NFV ipleentation. ) Requests placeent constraints: c u,η = 1 c C, u u c Xc () c u,v = 0 c C, u X c, v V : v η c u (3) The fixed start/end point u of a SC c is apped to the node v specified by the paraeters η c u (constraint ) and it is not apped to any other node (constraint 3). c u,v = 1 c C, u U c () v V Every request u for each SC c ust be apped to exactly one node v. c C c u,v c f,v π f f F, v V (5) The overall nuber of requests u apped to the f hosted by the node v cannot overcoe c f,v /π f, i.e., the axiu nuber of requests u for the f that can be apped to that node, according to the processing requireent π f per request u and the fraction of CPU cores c f,v of the node v assigned to the f. c f,v M i f,v f F, v V () i f,v c f,v < 1 f F, v V (7) Constraints and 7 ensure that i f,v = 0 if c f,v = 0 and that i f,v = 1 if c f,v > 0. i f,v is a flag variable used to understand if the f is apped to the node v. M is a big-m paraeter, greater than the axiu value taken by c f,v, i.e., M > ax v V {γ v }. i f,v c C c u,v f F, v V () The f is placed on a node v only if there is at least one request u apped to it. c f,v γ v ψ v v V (9) f F For each node v, the overall CPU processing assigned to the s f cannot overcoe the actual processing capability of the node, expressed in ters of CPU cores. The actual CPU processing capability of the node v is the difference between the CPU processing capacity γ v of the node and the overall upscaling/context switching processing costs ψ v. Such costs are taken into account every tie a request u is apped to a f. We define ψ v in the following way: ψ v = c C, f F c u,v ( c f,v κ v + i g,v ξ v ) v V (10) g F The right-hand side of ψ v requires the product between the binary variable c u,v and the real variable c f,v κ v + g F i g,v ξ v. Such product can be linearized, as well as the ceiling function c f,v. 3) Routing constraints: e c v,v,x,y,u,u c u,x c u,y c C, (v, v ) E, x V, y V, (u, u ) G c (11) A physical link (v, v ) can belong to a path between two nodes x and y for a virtual link (u, u ) of the SC c only if the two consecutive requests or start/end points u and u are apped to these nodes. The product c u,x c u,y of binary
5 variables can be linearized. e c x,v,x,y,u,u c u,x c u,y = 1 (x,v) E, x,y V e c v,y,x,y,u,u c u,x c u,y = 1 (v,y) E, x,y V c C, (u, u ) G c (1) c C, (u, u ) G c (13) The virtual link (u, u ) between two consecutive requests or start/end points u and u starts in one of the links connected to the node x, where the request or start point u is apped to (constraint 1), and it ends in one of the links of the node y, where the request or end point u is apped to (constraint 13). These constraints are called source and destination constraints, and the products e c x,v,x,y,u,u c u,x c u,y and e c v,y,x,y,u,u c u,x c u,y of binary variables can be linearized. e c v,x,x,y,u,u = 0 (v,x) E, v V c C, x V, y V, x y, (u, u ) G c (1) e c y,v,x,y,u,u = 0 (y,v) E, v V c C, x V, y V, x y, (u, u ) G c (15) While apping the virtual link (u, u ) for the SC c on a physical path between the nodes x and y where the requests or start/end points u and u are apped to, no incoing link for the node x (constraint 1) and no outgoing link for the node y (constraint 15) is considered. e c v,w,x,y,u,u = (v,w) E, v V (w,v ) E, v V e c w,v,x,y,u,u c C, w V, x V, y V, x w, y w, (u, u ) G c (1) e c v,w,x,y,u,u 1 (v,w) E, v V c C, w V, x V, y V, x w, y w, (u, u ) G c (17) While considering a generic node w (other than the source node x and the destination node y of a virtual link (u, u )), if one of its incoing links belongs to the path between the nodes x and y, then also one of its outgoing links ust belong to the path (constraint 1). Without constraint 17 ultiple incoing/outgoing links could be considered, but we deal with unsplittable flows. Constraints 1 and 17 are called transit constraints. e c v,v,x,y,u,u = 0 c C, v V, x V, y V, x y, (u, u ) G c (1) e c v,v,x,x,u,u = 0 c C, x V, (u, u ) G c, (v, v ) E, v v (19) In the physical network G = (V, E), every node v is connected to a self-loop (v, v) with infinite bandwidth (β v,v = ) and zero latency (λ v,v = 0). This self-loop is used when two consecutive requests or start/end points u and u are apped to the sae node x, and cannot be used otherwise (constraint 1). Moreover, no physical link (v, v ) different TABLE IV REQUIREMENTS FOR THE DEPLOYED SERVICE CHAINS Service Chain Chained s δ ϕ Web Service NAT-FW-TM-WOC-IDPS 100 kbit/s 500 s VoIP NAT-FW-TM-FW-NAT kbit/s 100 s Video Streaing NAT-FW-TM-VOC-IDPS Mbit/s 100 s Online Gaing NAT-FW-VOC-WOC-IDPS 50 kbit/s 0 s NAT: Network Address Translator, FW: Firewall, TM: Traffic Monitor, WOC: WAN Optiization Controller, IDPS: Intrusion Detection Prevention Syste, VOC: Video Optiization Controller fro the self-loop is used when the requests or start/end points u and u are apped to the sae node x (constraint 19). ) Perforance constraints: e c v,v,x,y,u,u δc u,u β v,v (v, v ) E (0) c C, x,y V (u,u ) G c The overall bandwidth δu,u c requested by the virtual links (u, u ) of every SC c and apped to the physical link (v, v ) cannot exceed the capacity of the link β v,v. e c v,v,x,y,u,u l v,v + σc ϕ c c C (1) (v,v ) E, x,y V (u,u ) G c The latency introduced by the network between the start and end point of a SC c cannot overcoe the axiu tolerated latency ϕ c. The first ter of the left-hand side of constraint 1 is related to the latency introduced by all the physical links (v, v ) of the paths to which the virtual links (u, u ) are apped, while the ter σ c is related to the latency introduced by the nodes because of upscaling and context switching. We define σ c in the following way: σ c = c u,v ( c f,v µ v + i g,v ω v ) c C () g F f F, v V The right-hand side of σ c requires the product between the binary variable c u,v and the real variable c f,v µ v + g F i g,v ω v. Such product can be linearized, as well as the ceiling function c f,v. i f,v M a v v V (3) f F a v i f,v v V () f F Constraints 3 and assure that a node is arked as active (i.e., a v = 1) only if at least one f is hosted by that node. The big-m paraeter M ust be chosen such that M > F. V. SIMULATION RESULTS A. Description of the siulation settings We solved the optiization proble shown is Section IV using CPLEX. We consider the physical network topology shown in Fig. 1 with ten physical nodes ( V = 10). This network topology is taken for the Internet network [15], considering only the nodes with advanced layer 3 services. We defined four different types of SCs that can be deployed in the network (see Table IV). Such SCs represent four different services, i.e., Web Service, VoIP, Video Streaing and Online Gaing. For every SC the traffic flows through a given
6 Active NFV nodes SCs: κ/γ = 0% κ/γ = 3% κ/γ = 9% SCs: κ/γ = 0% κ/γ = 3% κ/γ = 9% 500 1,000 1,500,000 Fig. 3. Nuber of active NFV nodes as a function of the nuber of users in the network, while considering the ipact of different upscaling costs and different nubers of deployed SCs in the heterogeneous scenario Active NFV nodes SCs: ξ/γ = 0% ξ/γ = 3% ξ/γ = 9% SCs: ξ/γ = 0% ξ/γ = 3% ξ/γ = 9% 500 1,000 1,500,000 Fig.. Nuber of active NFV nodes as a function of the nuber of users in the network, while considering the ipact of different context switching costs and different nubers of deployed SCs in the heterogeneous scenario sequence of s and two end points; soe s are shared aong the different SCs. Table IV shows also the requireents in ters of bandwidth δ and axiu tolerated latency ϕ for each SC: we assue that every virtual link (u, u ) of a SC requires the sae bandwidth and that all the nodes can be both NFV nodes and start/end points for the SCs. Every SC can serve an aggregate traffic fro ultiple users. We assue that all the nodes can potentially host the sae nuber γ of CPU cores and that they incur in the sae upscaling costs κ and the sae context switching costs ξ. We show our results considering two different scenarios: an heterogeneous scenario and an hoogeneous scenario. In the heterogeneous scenario, we uniforly randoize the choice of start/end points (aong the 10 nodes of the network) and of the deployed SCs (aong the four different types of SCs). In the hoogeneous scenario, we only uniforly randoize the choice of start/end points, while we assue that only one type of SC is deployed in the network. B. Heterogeneous scenario Figure 3 shows the ipact of the upscaling costs κ (noralized to the overall processing capability γ of the node) as a function of the nuber of users and SCs deployed in the network when the context switching costs ξ are negligible. The total nuber of users in the network is equally split aong the nuber of deployed SCs. We consider, for each point in the graph, 50 randoized instances and the deployent of Active NFV nodes 10 WS: κ/γ = 0% κ/γ = 3% κ/γ = 9% OG: κ/γ = 0% κ/γ = 3% κ/γ = 9% Het: κ/γ = 0% κ/γ = 3% κ/γ = 9% 500 1,000 1,500,000 Fig. 5. Nuber of active NFV nodes as a function of the nuber of users in the network, while considering the ipact of different upscaling costs in the hoogeneous scenario, i.e., when only Web Service (WS) chains or Online Gaing (OG) chains are deployed ( SCs in the network) Active NFV nodes 10 WS: ξ/γ = 0% ξ/γ = 3% ξ/γ = 9% OG: ξ/γ = 0% ξ/γ = 3% ξ/γ = 9% Het: ξ/γ = 0% ξ/γ = 3% ξ/γ = 9% 500 1,000 1,500,000 Fig.. Nuber of active NFV nodes as a function of the nuber of users in the network, while considering the ipact of different context switching costs in the hoogeneous scenario, i.e., when only Web Service (WS) chains or Online Gaing (OG) chains are deployed ( SCs in the network) SCs and SCs. Each instance can be solved in few inutes. All the curves show a onotonically increasing trend. In fact, increasing the nuber of users in the network requires an additional processing capability and thus a higher nuber of active NFV nodes. If also the upscaling costs are negligible (κ/γ = 0%), the nuber of NFV nodes in the network is alost the sae as the nuber of SCs in the network. This eans that if no processing costs (upscaling and context switching) are considered, increasing the nuber of deployed SCs does not affect the nuber of active NFV nodes in the network, as long as the overall nuber of users reains the sae. When the upscaling costs are not negligible, increasing the nuber of SCs in the network has always an ipact on the nuber of active NFV nodes (κ/γ = 3%, κ/γ = 9%), but the relative difference, considering the deployent of SCs and SCs, is alost the sae for both κ/γ = 3% and κ/γ = 9% (around one active node). This happens because splitting the nuber of users aong a higher nuber of SCs does not strongly ipact on the size of the hosted s. Note that with upscaling costs κ/γ = 9% soe loads result in infeasible probles and, thus, no points are reported in the graph. Figure shows instead the ipact of the context switching costs ξ when the upscaling costs are negligible. Also in this
7 case, the curves have a onotonically increasing trend. We can see then how an increase in the nuber of SCs deployed in the network has an ipact not only in ters of the absolute nuber of active nodes in the network, but also in ters of the relative difference between the nuber of active nodes in the case of deployent of SCs or SCs. In fact, Fig. shows how the difference in the nuber of active nodes is uch higher for ξ/γ = 3% than for ξ/γ = 9%: for ξ/γ = 3% such difference is around one active node, while for ξ/γ = 9% this difference is around three active nodes. This happens because the nuber of the overall s requests is higher when SCs are deployed than when only SCs are deployed, and this leads to higher context switching costs. C. Hoogeneous scenario For the hoogeneous case, we consider two different cases: in the first case, only Web Service (WS) chains are deployed, in the second only Online Gaing (OG) chains. Figure 5 shows the ipact of the upscaling costs in such cases, in coparison with the heterogeneous (Het) scenario. The nuber of deployed SCs is fixed at SCs. The deployent of an hoogeneous type of SC does not ipact so uch on the nuber of active nodes, in fact the curves of the hoogeneous (WS and OG) and heterogeneous (Het) cases are ore or less overlapped while considering the sae value of κ/γ. In average, the deployent of OG chains ipacts a bit less than the deployent of WS chains, for all the considered values of κ/γ, ainly due to the looser bandwidth requireents. While coparing such hoogeneous cases with the heterogeneous case, we notice that the heterogeneous case behaves siilarly to an average of the different hoogeneous cases. Siilar considerations can also be ade while considering the context switching costs (Fig. ). Note that for both the heterogeneous and the hoogeneous scenarios we siulated also the deployent of 3, and 5 SCs. We do not plot such curves, since the results we got are analogous and do not provide additional insights to the discussion. VI. CONCLUSION In this paper, we investigated the ipact of processingresource sharing aong s and scalability costs in a NFV scenario, when ultiple SCs ust be deployed in the network. The s placeent and distribution on NFV nodes lead to two different types of costs: upscaling costs and context switching costs. Such costs lead to a size/nuber trade-off that ust be investigated. We first focused on the atheatical odeling of the NFV nodes, of the s and of the SCs. Then, we defined an ILP odel aied at the /SC ebedding on a physical network while consolidating the s in the iniu nuber of NFV nodes and taking into account placeent, routing and perforance constraints. Then, we evaluated the ipact of upscaling and context switching costs on the cost for NFV ipleentation. Results show that, as the nuber of SCs grows, the ipact of context switching costs on the cost for NFV ipleentation is aplified. On the other hand, the nuber of SCs does not change how the upscaling costs translate into the cost for NFV ipleentation. We also showed how different latency and bandwidth requireents of the SCs ipact on the network cost. Our odel shows that NFV can handle ultiple SCs with different requireents deployed on the sae network without incurring in significant additional costs with respect to a scenario with hoogeneous requireents. Several issues still reain open for future research. For exaple, ore detailed odels for upscaling and context switching costs can be investigated, including energetic aspects. ACKNOWLEDGMENT The research leading to these results has received funding fro the European Counity Seventh Fraework Prograe FP7/ under grant agreeent no COMBO project. REFERENCES [1] M. Chiosi, D. Clarke, P. Willis, A. Reid, J. Feger, M. Bugenhagen, W. Khan, M. Fargano, C. Cui, H. Deng et al., Network Functions Virtualisation - Introductory White Paper, in SDN and OpenFlow World Congress, Oct. 01. [] W. John, K. Pentikousis, G. Agapiou, E. Jacob, M. Kind, A. Manzalini, F. Risso, D. Staessens, R. Steinert, and C. Meirosu, Research directions in Network Service Chaining, in IEEE Conference on SDN for Future Networks and Services, Nov [3] I. Cerrato, G. Marchetto, F. Risso, R. Sisto, and M. Virgilio, An efficient data exchange algorith for chained network functions, in IEEE International Conference on High Perforance Switching and Routing, Jul. 01. [] I. Cerrato, M. Annarua, and F. Risso, Supporting fine-grained network functions through Intel DPDK, in European Workshop on Software Defined Networks, Sep. 01. [5] J. Wang, H. Cheng, B. Hua, and X. Tang, Practice of parallelizing network applications on ulti-core architectures, in ACM International Conference on Supercoputing, Jun [] J. Botero, X. Hesselbach, M. Duelli, D. Schlosser, A. Fischer, and H. de Meer, Energy efficient virtual network ebedding, IEEE Counications Letters, vol. 1, no. 5, pp , May 01. [7] C. Fuerst, S. Schid, and A. Feldann, Virtual network ebedding with collocation: Benefits and liitations of pre-clustering, in IEEE International Conference on Cloud Networking, Nov [] N. Chowdhury, M. Rahan, and R. Boutaba, Virtual network ebedding with coordinated node and link apping, in IEEE INFOCOM, Apr [9] S. Mehraghda, M. Keller, and H. Karl, Specifying and placing chains of virtual network functions, in IEEE International Conference on Cloud Networking, Oct. 01. [10] H. Moens and F. De Turck, -P: A odel for efficient placeent of virtualized network functions, in International Conference on Network and Service Manageent, Nov. 01. [11] J. Jiang, T. Lan, S. Ha, M. Chen, and M. Chiang, Joint VM placeent and routing for data center traffic engineering, in IEEE INFOCOM, Mar. 01. [1] X. Geng, G. Xu, and Y. Zhang, Dynaic load balancing scheduling odel based on ulti-core processor, in International Conference on Frontier of Coputer Science and Technology, Aug [13] C. Li, C. Ding, and K. Shen, Quantifying the cost of context switch, in ACM Workshop on Experiental Coputer Science, Jun [1] R. Fro and N. Treuhaft, Revisiting the cache interference costs of context switching, 199. [15] Internet network infrastructure topology, Oct. 01. [Online]. Available:
Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]
Resource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]
Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
Searching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
The Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
ASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
Implementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]
Software Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
Real Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
Online Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism
The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu [email protected], [email protected]
An Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
Partitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano
How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
Applying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
Optimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
Lecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
Use of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
Fuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,
Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21
Image restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
Efficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
Method of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
Equivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)
Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National
Data Streaming Algorithms for Estimating Entropy of Network Traffic
Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia
Halloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux
Preference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]
Markovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
Managing Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
The Virtual Spring Mass System
The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a
Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
Factored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
Data Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
Leak detection in open water channels
Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical
A Multi-Core Pipelined Architecture for Parallel Computing
Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Joint Virtual Network Function Placement and Routing of Traffic in Operator Networks
Department of Computer Science University of California Davis 2063 Kemper Hall, One Shields Avenue Davis, CA 95616-5294 USA http://www.cs.ucdavis.edu (530) 752-7004 Joint Virtual Network Function Placement
Binary Embedding: Fundamental Limits and Fast Algorithm
Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin [email protected] Eric Price The University of Texas at Austin [email protected] Constantine Caraanis
Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
Information Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
Energy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?
Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA [email protected] Martin Taáč Industrial and
International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship
Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana
Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses
Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
Workflow Management in Cloud Computing
Workflow Manageent in Cloud Coputing Monika Bharti M.E. student Coputer Science and Engineering Departent Thapar University, Patiala Anju Bala Assistant Professor Coputer Science and Engineering Departent
The Velocities of Gas Molecules
he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes
On Orchestrating Virtual Network Functions
On Orchestrating Virtual Network Functions Presented @ CNSM 2015 Md. Faizul Bari, Shihabur Rahman Chowdhury, and Reaz Ahmed, and Raouf Boutaba David R. Cheriton School of Computer science University of
Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013
Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National
Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus
Advances in Applied Matheatical Biosciences. ISSN 8-998 Volue, Nuber (0), pp. 9- International Research Publication House http://www.irphouse.co Matheatical Model for Glucose-Insulin Regulatory Syste of
2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
Dynamic right-sizing for power-proportional data centers Extended version
1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers
CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:
CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized
A Fast Algorithm for Online Placement and Reorganization of Replicated Data
A Fast Algorith for Online Placeent and Reorganization of Replicated Data R. J. Honicky Storage Systes Research Center University of California, Santa Cruz Ethan L. Miller Storage Systes Research Center
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer
MATHEMATICAL MODELS Vol. III - Mathematical Modeling in Social and Behavioral Sciences - Wei-Bin Zhang
MATHEMATICAL MODELS Vol. III - Matheatical Modeling in Social and Behavioral Sciences - Wei-Bin Zhang MATHEMATICAL MODELING IN SOCIAL AND BEHAVIORAL SCIENCES Wei-Bin Zhang Ritsueikan Asia Pacific University,
Multi-Class Deep Boosting
Multi-Class Deep Boosting Vitaly Kuznetsov Courant Institute 25 Mercer Street New York, NY 002 [email protected] Mehryar Mohri Courant Institute & Google Research 25 Mercer Street New York, NY 002 [email protected]
The Mathematics of Pumping Water
The Matheatics of Puping Water AECOM Design Build Civil, Mechanical Engineering INTRODUCTION Please observe the conversion of units in calculations throughout this exeplar. In any puping syste, the role
A magnetic Rotor to convert vacuum-energy into mechanical energy
A agnetic Rotor to convert vacuu-energy into echanical energy Claus W. Turtur, University of Applied Sciences Braunschweig-Wolfenbüttel Abstract Wolfenbüttel, Mai 21 2008 In previous work it was deonstrated,
