Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks
|
|
|
- Albert Grant
- 10 years ago
- Views:
Transcription
1 Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks Carlos Colman Meixner, Ferhat Dikiyik, Massimo Tornatore, Chen-Nee Chuah, and Biswanath Mukherjee University of California, Davis, USA, Politecnico di Milano, Milano, Italy Astract Today s Internet applications include grid- and cloud-computing services which can e implemented y mapping virtual networks (VNs) over physical infrastructure such as an optical network. VN mapping is a resource-allocation prolem where fractions of the resources (e.g., andwidth and processing) in the physical infrastructure (e.g., optical network and servers/data-centers) are provisioned for specific applications. Researchers have een studying the survivale VN mapping (SVNM) prolem against physical-infrastructure failures (typically y deterministic failure models), ecause this type of failure may disconnect one or more VNs, and/or reduce their capacities. However, disasters can cause multiple link/node failures which may disconnect many VNs and dramatically increase the postdisaster vulneraility to correlated cascading failures. Hence, we investigate the disaster-resilient and post-disaster-survivale VN mapping prolem using a proailistic model to reduce the expected VN disconnections and capacity loss, while providing an adaptation to minimize VN disconnections y any postdisaster single-physical-link failure. We model the prolem as an integer linear program (ILP). Numerical examples show that our approach reduces VN disconnections and the expected capacity loss after a disaster. Index Terms optical network, disaster resiliency, post-disaster survivaility, virtual-network mapping I. INTRODUCTION Virtualization is a new Internet paradigm that allows multiple applications and services from different organization to coexist on a common physical infrastructure, which typically is an optical network, interconnecting servers or data-centers. Two main virtualization services grid and cloud computing are implemented y using virtual networks (VNs) to interconnect virtual machines and/or servers. Service providers can map VNs over a physical infrastructure y providing fractions of resources (e.g., andwidth and processing capacity) for a specific service [1], [2]. Because a single failure in the physical infrastructure may disconnect one or more VNs, many studies have focused on the survivale virtual-network mapping (SVNM) prolem that aims at keeping the VN connected during failures in the physical infrastructure [3-7]. However, a disaster may cause multiple failures in the physical infrastructure [8], [9], disconnecting and/or degrading many VNs. Considering that disaster recovery may take days or even weeks, VNs can ecome vulnerale to post-disaster correlated cascading failures for a relatively long recovery period. Some examples of disasters include: the 2008 Shichuan earthquake which damaged 30,000 kilometers of fier optic cales and 4,000 telecommunication offices [10]; the 2012 hurricane Sandy that shut down most data-centers in New York area [11] and disconnected most of the communication services in the northeastern of US [12]. Given the scale of their impact, network operators should protect network services from such disasters, despite their rare occurrences. The SVNM prolem for a single-physical-link failure was studied in [7], and an extension for IP-over-WDM optical networks for multiple-link failures was presented in [3]. SVNM, in the context of grid- and cloud-computing survivaility over optical networks, was studied in [4], [6], suggesting server capacity relocation and lightpath re-provisioning. A recent survey [13] summarized works on disaster survivaility ut only a few considered VN mapping. For a regional failure, Yu et al [5] proposed a virtual-node restoration approach, and Hai et al [8] presented a model to design a disaster-resilient optical data-center network. Most SVNM approaches are ased on deterministic failure models with over-provisioning of physical capacity, which are economically unsustainale for disaster-resiliency and postdisaster survivaility, ecause they demand huge capacity over-provisioning and investment for ackup resources. We study a disaster-resilient and post-disaster survivale VN mapping y using a proailistic model ased on risk assessment with adaptation to reduce the risk of VN disconnections and capacity loss. Our approach maps an additional virtual-ackup node y exploiting the excess processing capacity of physical nodes (e.g., physical node used y other VNs) to mitigate the processing capacity loss and to recover VNs after a disaster. To reduce VN disconnections in a post-disaster singlephysical-link failure, our approach implements a post-disaster survivale mapping. The physical infrastructure used in our example is ased on a wavelength-division multiplexing (WDM) optical network, ut our approach is also applicale for general mesh networks. We conduct numerical examples for two disaster models: earthquake and weapons of mass destruction (WMD) [9]. Numerical results show that our approach significantly reduces risk of VN disconnection in a disaster and provides survivaility for post-disaster single-physical-link failures. II. PROBLEM STATEMENT AND MODEL single-link, multiple-link and node failures in optical networks have een widely studied in the past. The concept of shared-risk-group (SRG) has een also introduced to represent a generic set of links/nodes that fails together. In particular
2 the prolem of survivale virtual network mapping (SVNM) has een investigated under the assumption of single-link, single-node and SRG failure cases [3-7]. However, a disaster may cause not only multiple failures (i.e.,srg failure) in the physical network, ut it is also followed y post-disaster correlated cascading failures that can cause even more damage and VN disconnections. In this study, we investigate a disaster-resilient and postdisaster survivale VN mapping model (DRM-PDS) that comines four protection approaches; survivale VN mapping (SVNM) for single-physical-link failure; disaster resilient y risk-aware VN mapping (DRM); virtual-ackup-node selection and mapping (VBNM); and post-disaster survivaility (PDS). In PDS approach we focus on survivaility to post-disaster single-link failures. We descrie each approach in the following. A. Survivale VN Mapping (SVNM) As a first approach of our model we deploy SVNM protection for any single-physical-link failure. SVNM ensures that virtual links of the same cut do not share the same physical link [3]. A cut is the set of virtual links whose failures can disconnect the VN. SVNM approach consider all the cuts of each VN to provide survivaility. Fig. 1 shows an example of two VNs: VN1 = { 2, 3, 4, 5} and VN2 = {1, 2, 3} mapped over an optical network {A, B, C, D, E, F, G}, where every virtual link is mapped over a lightpath. Fig. 1(a) shows a nonsurvivale mapping where, if any physical link in circles fails, one or oth VNs will e disconnected. Fig. 1() shows an example of SVNM where any single-physical-link failure will not disconnect any VN. Fig. 1. Non-survivale and survivale VN mapping (SVNM) over a WDM optical network. B. Disaster Resiliency y Risk-Aware VN Mapping (DRM) SRG-disjoint VN mapping is difficult to implement and economically unsustainale, ecause it cannot map a VN, if a disaster affects a virtual node, without increasing the physical network resources for ackup. For instance, in Fig. 1(), for any of two possile disasters (DZ1 and DZ2), SRG-disjoint approach is not feasile. Hence, we implement a disasterresilient VN mapping using a proailistic model ased on the risk assessment introduced in [9] (e.g., risk-aware VN mapping) complementing the SVNM introduced aove. Our ojective is to minimize the risk (i.e., expected loss): min n N (Loss of γ with disaster n) p n (1) γ Γ where the expected loss is the sum of the capacity that can e lost if a disaster n occurs and disconnects virtual links and VNs, N is the set of disaster zones (DZ), Γ is the set of VNs, and p n is the proaility that disaster n will cause a damage. From the example in Fig. 1, Fig. 2 is otained y implementing DRM and SNVM. In this example, oth VNs are resilient in case of single-physical-link failure, and have lower risk of VN disconnections in case of any disaster occurs, compared to the VN mapping in Fig. 1(). Fig. 2. Disaster-resilient VN mapping with two DZs. However, in Fig. 2, DZ1 can still disconnect oth VNs, ecause it affects the physical node C and the virtual node 2 used y oth VNs. To overcome this prolem, we suggest to map a virtual-ackup node for each VN. C. Virtual-Backup-Node Selection and Mapping (VBNM) We develop VBNM approach that maps an additional virtual-ackup node for each VN. The selection of the virtualackup node is among the physical nodes that have enough processing capacity to share and can e used y other VNs (e.g., excess processing capacity). The node selected must e not only more availale ut also safer in case of a disaster. The virtual-ackup node can replace any virtual node in its own VN (including virtual nodes not affected y DZs) and can e shared as a ackup node with another VN. Every virtualackup node is connected using one virtual link to each virtual node in its own VN (Fig. 3(a)). A virtual-ackup node not only reduces VN disconnection during a disaster, ut also offers additional processing capacity to relocate, recover, and replicate virtual machines or servers. Yu et al [5] suggested ackup nodes to protect against physical node failures, ut DRM-PDS differs in the way it selects, maps, and shares the virtual-ackup node among each VN. The comination of these three approaches of DRM-PDS presented so far makes it a powerful tool to map disaster-resilient VNs and useful for grid and cloud computing.
3 D. Post-Disaster Survivale Virtual-Network Mapping (PDS) After a disaster, a single-physical-link failure may disconnect more VNs, ecause the remaining physical network and VNs are more vulnerale to correlated cascading failures during the recovery period, which may take several days [10]. For this reason, we develop PDS to ensure post-disaster survivaility of the VNs. PDS takes all post-disaster cuts into account y considering all possile virtual node replacements y the virtual-ackup node. Figs. 3() to 3(d) show all possile replacements y the virtual-ackup node in the VN in Fig. 3(a). The extended cuts are calculated and added to the prolem in addition to the asic cuts used y SVNM. Fig. 3. Post-disaster cuts including virtual-ackup-node replacement. Fig. 4(a) presents a VN mapped without PDS. In this example, if a disaster in DZ1 occurs, the physical node C and its physical links will fail, ut the VN will not e disconnected, ecause the virtual-ackup node 4 will replace the failed virtual node 2. However, after the disaster, some singlephysical-link failures may disconnect the VN. For example, after the disaster in DZ1, a post-disaster failure in physical link {A, B} will disconnect the VN, ecause virtual links {1, 2} and {1, 4} will e disconnected. By implementing DRM-PDS, we otain the mapping in Fig. 4(), where the VN will not e disconnected y any singlephysical-link failure, disaster failure, or post-disaster singlephysical-link failure, and the expected loss of andwidth and processing capacity will e reduced. Fig. 4. Disaster-resilient virtual-network mapping with virtual-ackup-node and post-disaster survivaility. E. ILP Formulation We formulate the prolem into a mathematical model which turns out to e an ILP given elow. 1) Given: G(V, E): Physical topology, where V is the set of physical nodes and E is the set of physical links. ˆV : Set { of virtual node locations. } Γ = γ = < V γ, E γ, C γ, Êγ, Ĉγ, α γ > : Set of virtual networks (VNs), where V γ, E γ, and C γ are the set of virtual nodes, virtual links, and cuts of the virtual network γ; Ê γ is set of links including the links { in E γ and } links from each node in V γ to each node in ˆV Vγ ; Ĉγ = { ˆV V γ} Ĉγ, where Ĉγ is the set of cuts of the virtual networks formed y replacing { a} node in V γ y a virtual node (i.e., nodes in ˆV Vγ are candidate virtualackup nodes). N = {n = < S n, p n >}: Set of possile disasters with S n, { S n = E }, set of inary valuales s n ij (which is 1 if the physical link {i, j} is disconnected y disaster n), and p n is the proaility of disconnection of a link with disaster n. P u: Maximum processing capacity of physical node u to allocate a virtual-ackup node. P v : Processing capacity required for virtual node v ˆV. Pfree u : Excess processing capacity in physical node u. L γ u: 1 when physical node u is used y topology γ. P u free = P u γ Γ P u L γ u, u E, γ Γ (2) F ij : Physical link (i, j) s free capacity in numer of wavelengths. d: Penalty coefficient for VN disconnection (d 1). e : Bandwidth requirement of virtual link e. c : Total andwidth in cut c. m c : Numer of virtual links in cut c. I: Numer of virtual-ackup nodes availale for mapping. 2) Binary variales: De n : 1 if virtual link e is disconnected y disaster n. Mij e : 1 if virtual link e is mapped on physical link (i, j). Ku,v: γ 1 if virtual link exists from node u to v in γ. : 1 if is assigned as a ackup virtual node to γ. Q n c : 1 if all the virtual links of cut c are disconnected y disaster n. Xγ n : 1 if virtual network γ is disconnected y disaster n. Y γ Tg,h n : is an auxiliary variale. Z : 1 if node is used as a ackup node. 3) Ojective function: The ojective function is: min dq n c c + De n e p n n N γ Γ e Êγ + ɛ Mij e (i,j) E γ Γ e Êγ where the expected loss of γ is the sum of capacity in terms of andwidth that can e lost if VN is disconnected y disaster n with proaility p n in cut c, Q n c c. The disconnections of (3)
4 all links in a cut result in a VN disconnection ecause the VN is divided into two isolated parts. Expected loss also includes the capacity loss due to virtual-link failures with disaster n, De n e regardless of their effect on VN disconnection. e Êγ Note that VN disconnection y a cut failure damages VN more than virtual-link failure, so we multiply loss y cut failure y a penalty coefficient d. The second part of the equation tries to avoid mapping virtual links onto long lightpaths. 4) Constraint to determine if virtual links are affected y a disaster: De n 1 s n M ijmij, e e Êγ, γ Γ, n N (4a) D n e (i,j) E (i,j) E s n ijm e ij, e Êγ, γ Γ, n N (4) where M is a large numer. This constraint captures the possile disconnection of every virtual link e y disaster n. 5) Constraint to determine a cut failure y a disaster: Q n c Q n c e E c D n e m c, c C γ, γ Γ, n N (5a) e E c D n e m c + 1, c C γ, γ Γ, n N (5) Eq. (5) captures the VN disconnections if a disaster disconnects all links in a cut c. 6) Constraint to determine VN disconnection caused y a disaster: Xγ n 1 Q n c, γ Γ, n N (6a) M Xγ n Q n c, γ Γ, n N (6) This constraint chooses the virtual-ackup node outside a region with high risk of disaster. 7) Survivaility constraint: Mij e m c 1, e E c (7) c (Ĉγ + C γ), ( ˆV V γ ), γ Γ, (i, j) E This constraint implements SVNM and PDS. It uses the asic cuts of the VN and the post-disaster cuts that include all possile virtual node replacements y the virtual-ackup node. 8) Flow-conservation constraints: Mis e e Ms e ej = K γ s e,d e, e Êγ, γ Γ (i,s e) E (i,d e) E (k,j) E M e id e M e kj (s e,j) E (d e,j) E (i,k) E M e d ej = K γ s e,d e, e Êγ, γ Γ M e ik = 0, e Êγ, γ Γ, k ˆV {s e, d e } (8a) (8) (8c) These constraints ensure that each lightpath is mapped on a virtual link, and it does not pass the same physical node more than once. 9) Physical-link-capacity constraint: e Êγ M e ij F ij, (i, j) E, γ Γ (9) The next four constraints implement the virtual-ackup-node selection and mapping. 10) Links etween virtual nodes and virtual-ackup node constraint: K γ u,v = 1, u, v V γ, u v, γ Γ K γ u, = Y γ, u V γ, ( ˆV V γ ), γ Γ (10a) (10) This constraint ensures the connectivity to the selected virtualackup node of VN. 11) Virtual-ackup-node selection constraint: ( ˆV V γ) Y γ γ = 1, γ Γ, Y = 0, V γ, γ Γ (11) 12) Virtual-ackup-node sharing constraint: T n g,h X n g, g, h Γ, g h, n N T n g,h X n h, g, h Γ, g h, n N T n g,h X n g + X n h 1, g, h Γ, g h, n N Y g (12a) (12) (12c) + Y h 2 Tg,h, n g, h Γ, g h, n N, [ (12d) ˆV (Vg V h )] This set of constraints is very important for DRM-PDS, ecause they ensure that a virtual-ackup node cannot e shared among VNs that may e disconnected y the same disaster. 13) Constraint of virtual-ackup node: γ Γ Y γ Z M, ˆV (13a) Z Y γ, ˆV (13) γ Γ 14) Processing capacity of virtual-ackup node constraint: Z I, ˆV (14) ˆV where I = 1 means one virtual-ackup node is forced to e shared y all the VNs. The maximum value of I is the numer of VNs to e mapped (e.g., one virtual-ackup node per VN). A. Experimental Setup III. ILLUSTRATIVE EXAMPLES We study our methods on a 24-node US mesh network (Fig. 5()) with 32 wavelengths per link and wavelength conversion. Two types of disasters: one natural disaster (earthquake), and one human-made disaster (weapon of mass destruction (WMD) attacks) were introduced and modeled in [9] and
5 shown in Fig. 5(). We consider five full-mesh virtual networks, each consisting of four virtual nodes distriuted over 16 physical nodes which have processing capacity (Fig. 5(a)) 1. We assume that each virtual link requires full lightpath. Ojective Methods used Approach TABLE I DETAILS OF IMPLEMENTED APPROACHES Resource-aware approaches (RAM-Fixed, RAM, and RAM- PDS) use following ojective function: min Mij e (15) (i,j) E γ Γ e Êγ RAM- Fixed RAM DRM RAM- PDS DRM-PDS (our approach) Min-Res. (Eq. (15) X X X Min-Risk (Eq. (3) X X SVNM X X X X X DRM X X VBNM Fixed Select Select Select Select PDS X X Fig. 5. (a)vns implemented and ()physical topology with disaster zones for earthquake and potential WMD attacks [9]. B. Compared approaches We compare our approach (e.g., DRM-PDS) with the following approaches: Resource-aware mapping with fixed virtual-ackup-node approach (RAM-Fixed), in which one virtual-ackup node is chosen in advance for each VN. Resource-aware VN mapping with VBNM (RAM), which differs from the previous approach in the way to select each virtual-ackup node for each VN. Disaster-resilient VN mapping with VBNM (DRM), is similar to DRM-PDS ut without PDS. Resource-aware mapping with VBNM and PDS (RAM- PDS). These approaches are summarized in Tale I. C. Evaluation Metrics To compare the five approaches, we use four metrics: 2 Note that, for larger VNs with su-wavelength granularity requirements, ILP ecomes intractale. 1) Risk of VN disconnection: De n e + dq n c c p n d (16) n N γ Γ e Êγ 2) Penalty for capacity loss: e Êγ D n e e + dq n c c (17) 3) Post-disaster VN disconnection: Numer of VN disconnections y single-physical-link failure after any of possile disasters. 4) Resources used: Numer of wavelengths provisioned to map VNs: Mij e (18) (i,j) E γ Γ e Êγ D. Results We divide our analysis into three parts: disaster resiliency, post-disaster survivaility, and resource consumption. Fig. 6. Risk of disconnection and penalty for capacity loss. 1) Disaster resiliency: We compare the approaches ased on risk of VN disconnection and penalty for capacity loss. Fig. 6(a) shows the results for the risk of VN disconnection: Risk-aware approaches (DRM and DRM-PDS) have lower risk of disconnection compared to resources-aware (RAM-Fixed, RAM, and RAM-PDS) approaches.
6 Implementation of post-disaster survivaility constraint slightly increases the risk for DRM-PDS vs. DRM, ecause some of the virtual links traverse additional DZs to ensure survivaility in a post-disaster failure. Fig. 6() presents the penalty for capacity loss of two DZs as examples, an earthquake in San Diego and of WMD attack on Washington DC. Note that risk-aware approaches have the lowest penalty. In case of a WMD attack on Washington DC, DRM- PDS will have a little higher penalty compared to DRM ecause it is offering post-disaster survivaility. Thus, the superiority of risk-aware approaches (DRM and DRM-PDS) is demonstrated in terms of disaster resiliency. 2) Post-disaster survivaility: From Fig. 7, we note that: Both post-disaster survivale approaches (DRM-PDS and RAM-PDS) have the lowest numer of VN disconnections in case of a single-physical-link failure. In case of earthquake, RAM-PDS still has high numer of disconnections compared to DRM-PDS that has no disconnection. Fig. 7. Numer of VN disconnections in any post-disaster single-physicallink failure. This evaluation confirms that the comination of four components implemented in DRM-PDS that include risk-assessment and post-disaster survivaility constraint decreases the postdisaster VN disconnections. Fig. 8. Resources used y the mapping in wavelength. 3) Resource consumption: Fig. 8 shows that risk-aware approaches use fewer additional wavelengths to deal with disaster and post-disaster failures compared to resources-aware approaches. and post-disaster survivale virtual-network mapping with virtual-ackup-node selection (DRM-PDS). Our model was formulated as an ILP and compared with four different approaches: resource-aware mapping (RAM- Fixed, RAM, and RAM-PDS) and disaster-resilient mapping (DRM). Results showed that DRM-PDS (our approach) reduces the risk of VN disconnections and capacity loss, and decreases the numer of post-disaster VN disconnections due to any single-link failure in the physical infrastructure (e.g., correlated cascading failures). Thus, our model is suitale for multiple-vn services in cloud and grid computing, ecause they require protection against disaster and survivaility after disasters. By uilding upon the findings of this study, we can further explore the prolem for larger VNs with su-wavelength granularity requirements. REFERENCES [1] C. Develder, M. De Leenheer, B. Dhoedt, M. Pickavet, D. Colle, F. De Turck, and P. Demeester, Optical networks for grid and cloud computing applications, Proceedings of the IEEE, vol. 100, no. 5, pp , May [2] L. Contreras, V. Lopez, O. De Dios, A. Tovar, F. Munoz, A. Azanon, J. Fernandez-Palacios, and J. Folgueira, Toward cloud-ready transport networks, IEEE Commum. Mag., vol. 50, no. 9, pp , Sep [3] K. Lee, E. Modiano, and H. Lee, Cross-layer survivaility in WDM ased networks, IEEE/ACM Trans. Netw., vol. 19, no. 6, pp , Dec [4] C. Develder, J. Buysse, A. Shaikh, B. Jaumard, M. De Leenheer, and B. Dhoedt, Survivale optical grid dimensioning: Anycast routing with server and network failure protection, in Proc., IEEE ICC, June [5] H. Yu, V. Anand, C. Qiao, and G. Sun, Cost efficient design of survivale virtual infrastructure to recover from facility node failures, in Proc., IEEE ICC, June [6] J. Xu, J. Tang, K. Kwiat, W. Zhang, and G. Xue, Survivale virtual infrastructure mapping in virtualized data centers, in Proc., IEEE CLOUD, June [7] M. R. Rahman, I. Ai, and R. Boutaa, Survivale virtual network emedding, in Proc., 9th IFIP NETWORKING, [8] M. Hai, M. Tornatore, M. De Leenheer, F. Dikiyik, and B. Mukherjee, Design of disaster-resilient optical datacenter networks, J. of Lightwave Tech, vol. 30, no. 16, pp , Aug [9] F. Dikiyik, M. D. Leenheer, A. Reaz, and B. Mukherjee, Minimizing the disaster risk in optical telecom networks, in Proc., IEEE/OSA OFC, Mar [10] Y. Ran, Considerations and suggestions on improvement of communication network disaster countermeasures after the Wenchuan Earthquake, IEEE Commun. Mag., vol. 49, no. 1, pp , Jan [11] S. Carew. (2012, Oct.) Hurricane Sandy disrupts northeast U.S. telecom networks. [Online]. Availale: us-storm-sandy-telecommunications-idukbre89t0yu [12] N. Henderson. (2012, Oct.) Noise filter: Hurricane Sandy floods NYC data center, impacts hosts, colocation providers. [Online]. Availale: noise-filter-hurricane-sandy-floods-nyc-data-center-impacts-hosts [13] M. Hai, M. Tornatore, F. Dikiyik, and B. Mukherjee, Disaster survivaility in optical communication networks, Computer Communications, Jan [Online]. Availale: IV. CONCLUSION We studied the disaster-resilient and post-disaster survivale virtual-network mapping and adaptation prolem. Our approach implements a proailistic model ased on risk assessment to offer an economically-sustainale disaster-resilient
Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).
Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network
Post-Disaster Technologies in Network Virtualization. Chen Ma Group Meeting August, 28, 2015
Post-Disaster Technologies in Network Virtualization Chen Ma Group Meeting August, 28, 2015 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with
Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach
Int. J. Communications, Network and System Sciences, 2009, 7, 652-656 doi:10.4236/icns.2009.27074 Published Online October 2009 (http://www.scirp.org/ournal/icns/). Optical Network Traffic Control Algorithm
A Cross-Layer Approach for IP Network Protection
A Cross-Layer Approach for IP Network Protection Qiang Zheng, Jing Zhao, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz13, juz139, gcao}@cse.psu.edu
QUADRATIC EQUATIONS EXPECTED BACKGROUND KNOWLEDGE
MODULE - 1 Quadratic Equations 6 QUADRATIC EQUATIONS In this lesson, you will study aout quadratic equations. You will learn to identify quadratic equations from a collection of given equations and write
DIVIDE AND CONQUER: Partitioning OSPF networks with SDN
DIVIDE AND CONQUER: Partitioning OSPF networks with SDN Marcel Caria, Tamal Das, and Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: {m.caria, t.das, a.jukan} @tu-s.de Marco
What Applications Can be Deployed with Software Defined Elastic Optical Networks?
What Applications Can be Deployed with Software Defined Elastic Optical Networks? Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications
Virtual Network Topology Control with Oja and APEX Learning
Virtual Network Topology Control with Oja and Learning Y. Sinan Hanay, Yuki Koizumi, Shin ichi Arakawa and Masayuki Murata Graduate School of Information Sciences and Technology Osaka University Suita,
Joint Virtual Network Function Placement and Routing of Traffic in Operator Networks
Department of Computer Science University of California Davis 2063 Kemper Hall, One Shields Avenue Davis, CA 95616-5294 USA http://www.cs.ucdavis.edu (530) 752-7004 Joint Virtual Network Function Placement
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information
1 Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Abstract Path protection and link protection schemes are the main
Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC
Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE
WDM Passive Optical Networks: Protection and Restoration
OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive
Additional MBA Information. Business School Faculty of Management Sciences
Additional MBA Information Business School Faculty of Management Sciences MBA Programme Welcome We would like to thank you for your enquiry aout our MBA Program. After sumission of your application, you
CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression
Opening Example CHAPTER 13 SIMPLE LINEAR REGREION SIMPLE LINEAR REGREION! Simple Regression! Linear Regression Simple Regression Definition A regression model is a mathematical equation that descries the
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
Peer-to-Peer Filesharing and the Market for Digital Information Goods
Peer-to-Peer Filesharing and the Market for Digital Information Goods Ramon Casadesus-Masanell Andres Hervas-Drane May 8, 2006 Astract Existing models of peer-to-peer (p2p) filesharing assume that individuals
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University
A DA Serial Multiplier Technique based on 32- Tap FIR Filter for Audio Application
A DA Serial Multiplier Technique ased on 32- Tap FIR Filter for Audio Application K Balraj 1, Ashish Raman 2, Dinesh Chand Gupta 3 Department of ECE Department of ECE Department of ECE Dr. B.R. Amedkar
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
Disaster Recovery & Business Continuity Dell IT Executive Learning Series
Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information
Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
Online Appendix: Bank Competition, Risk Taking and Their Consequences
Online Appendix: Bank Competition, Risk Taking and Their Consequences Xiaochen (Alan) Feng Princeton University - Not for Pulication- This version: Novemer 2014 (Link to the most updated version) OA1.
Scheduling using Optimization Decomposition in Wireless Network with Time Performance Analysis
Scheduling using Optimization Decomposition in Wireless Network with Time Performance Analysis Aparna.C 1, Kavitha.V.kakade 2 M.E Student, Department of Computer Science and Engineering, Sri Shakthi Institute
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar [email protected] Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.
Green Network and Data Centre Virtualization
Green Network and Data Centre Virtualization Leonard Nonde, Taisir El-Gorashi and Jaafar M. H. Elmirghani School of Electronic and Electrical Engineering University of Leeds, UK [email protected]
QoS Provisioning in Mobile Internet Environment
QoS Provisioning in Moile Internet Environment Salem Lepaja ([email protected]), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse
! # % & (!) ( ( # +,% ( +& (. / + 0 + 10 %. 1. 0(2131( 12. 4 56 6!, 4 56 / + & 71 0 8
! # % & (!) ( ( # +,% ( +& (. / + 0 + 10 %. 1. 0(2131( 12. 4 56 6!, 4 56 / + & 71 0 8 9 Energy Efficient Tapered Data Networks for Big Data Processing in IP/WDM Networks Ali M. Al-Salim, Ahmed Q. Lawey,
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
Data Center Network Structure using Hybrid Optoelectronic Routers
Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp
PYTHAGOREAN TRIPLES M. SUNIL R. KOSWATTA HARPER COLLEGE, ILLINOIS
PYTHAGOREAN TRIPLES M. SUNIL R. KOSWATTA HARPER COLLEGE, ILLINOIS Astract. This talk is ased on a three week summer workshop (Los Angeles 2004) conducted y Professor Hung-Hsi Wu, University of California,
Response time analysis in AFDX networks with sub-virtual links and prioritized switches
Response time analysis in AFDX networks with su-virtual links and prioritized switches J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Initiating the CCSF Lifelines Council. Interdependency Study
LAURIE JOHNSON CONSULTING Initiating the CCSF Lifelines Council Urban Planning Risk Management Disaster Recovery Interdependency Study Lifelines Council Meeting #7 November 17, 2011 (Source: JIIRC-UBC)
Handout for three day Learning Curve Workshop
Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, [email protected])
Service Availability Metrics
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
Using Virtual SIP Links to Enable QoS for Signalling
Using Virtual SIP Links to Enale QoS for Signalling Alexander A. Kist and Richard J. Harris RMIT University Melourne BOX 2476V, Victoria 31, Australia Telephone: (+) 61 (3) 9925-5218, Fax: (+) 61 (3) 9925-3748
Number Who Chose This Maximum Amount
1 TASK 3.3.1: MAXIMIZING REVENUE AND PROFIT Solutions Your school is trying to oost interest in its athletic program. It has decided to sell a pass that will allow the holder to attend all athletic events
Dynamic Establishment of All-Optical Connections in Wavelength-Routed Optical Networks Using Genetic Algorithms
D. Bisbal, F. González, I. de Miguel, J. Blas, J. C. Aguado, P. Fernández, R. M. Lorenzo, E. J. Abril, M. López, Dynamic establishment of alloptical connections in wavelength-routed optical networks using
Non-Linear Regression 2006-2008 Samuel L. Baker
NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes
Network Protection with Multiple Availability Guarantees
Network Protection with Multiple Availability Guarantees Greg Kuperman MIT LIDS Cambridge, MA 02139 [email protected] Eytan Modiano MIT LIDS Cambridge, MA 02139 [email protected] Aradhana Narula-Tam MIT Lincoln
A Theoretical Framework for Incorporating Scenarios into Operational Risk Modeling
A Theoretical Framework for Incorporating Scenarios into Operational Risk Modeling Bakhodir A. Ergashev This Draft: January 31, 2011. First Draft: June 7, 2010 Astract In this paper, I introduce a theoretically
10.1 Systems of Linear Equations: Substitution and Elimination
726 CHAPTER 10 Systems of Equations and Inequalities 10.1 Systems of Linear Equations: Sustitution and Elimination PREPARING FOR THIS SECTION Before getting started, review the following: Linear Equations
Shared Backup Network Provision for Virtual Network Embedding
Shared Backup Network Provision for Virtual Network Embedding Tao Guo, Ning Wang, Klaus Moessner, and Rahim Tafazolli Centre for Communication Systems Research, University of Surrey Guildford, GU2 7XH,
Application-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical
Design of Light-Tree Based Optical Inter-Datacenter Networks
Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1443 Design of Light-Tree Based Optical Inter-Datacenter Networks Rongping Lin, Moshe Zukerman, Gangxiang Shen, and Wen-De Zhong Abstract Nowadays,
Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing
Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs Mahdi Ghamkhari and Hamed Mohsenian-Rad Department of Electrical Engineering University of California at Riverside,
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks
Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks TREND Plenary Meeting, Volos-Greece 01-05/10/2012 TD3.3: Energy-efficient service provisioning and content distribution
Forward Dynamics of Flexible Multibody Systems
11 Forward Dynamics of Flexile Multiody Systems So far, several approaches to the solution of the kinematics and dynamics of multiody systems have een presented. It has een assumed in these approaches
Beyond the Stars: Revisiting Virtual Cluster Embeddings
Beyond the Stars: Revisiting Virtual Cluster Embeddings Matthias Rost Technische Universität Berlin September 7th, 2015, Télécom-ParisTech Joint work with Carlo Fuerst, Stefan Schmid Published in ACM SIGCOMM
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
Performance Evaluation in Distributed System using Dynamic Load Balancing
Volume 2 No7, Feruary 2012 wwwiaisorg Performance Evaluation in Distriuted System using Dynamic Load Balancing Rutua Jadhav PG Student KKWIEER, Nasik Snehal Kamlapur Associate professor KKWIEER, NASIK
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Efficient Parallel Distributed Load Balancing in Content Delivery Networks
Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,
Network Planning and Operation Tool
Network Planning and Operation Tool Development progress through the view of 3 EU projects Dimitrios Klonidis C. Kachris, P. Zakynthinos, I. Tomkos Networks and Optical Communications group NOC New challenges
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
Heat transfer in Flow Through Conduits
Heat transfer in Flow Through Conduits R. Shankar Suramanian Department of Chemical and Biomolecular Engineering Clarkson University A common situation encountered y the chemical engineer is heat transfer
Minorities in Higher Education. 2010 2011 Supplement. Young M. Kim
Minorities in Higher Education 2010 Twenty-FOURTH Status Report 2011 Supplement Young M. Kim Minorities in Higher Education 2010 Twenty-FOURTH Status Report 2011 Supplement Young M. Kim PROJECT COORDINATOR:
Algorithms for Assigning Substrate Network Resources to Virtual Network Components
Algorithms for Assigning Substrate Network Resources to Virtual Network Components Yong Zhu and Mostafa Ammar Networking and Telecommunications Group Georgia Institute of Technology, Atlanta, Georgia Email:
