An Approach to Optimizations Links Utilization in MPLS Networks

Size: px
Start display at page:

Download "An Approach to Optimizations Links Utilization in MPLS Networks"

Transcription

1 An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC. 8 Barcelona Sain xavier.hesselbach@entel.uc.es Deartment of electronics an Circuits, Universia Simón Bolívar, Aartao Postal 89, Caracas 8-A, Venezuela mhuerta@usb.ve Institut Informàtica i Alicacions Universitat e Girona EPS P. Camus Montilivi, 77 Girona Sain ramon@silver.ug.es Abstract In this aer we resent a stuy for the otimization of the links utilization in several MPLS network toologies. This information hels in etermining the maximum link utilization require, which is a valuable knowlege in balancing loa strategies in the network. We resent mathematical moels that tune the otimal arameters for strategically routing traffic in an MPLS network. We resent the Otimal Link Utilization Moel () for ifferent toologies. rovies an aroach that woul result in otimally balance link utilization. Finally we comare the results of the moel with the interior oint an simlex algorithms. Results show that the maximum link utilization require is minimize.. INTRODUCTION In recent years there has been active research in the fiel of MultiProtocol Label Switching (MPLS) an an increasing number of networks are suorting MPLS. The remise of MPLS is to attach a short fixe-length label to the ackets at the ingress router of the MPLS omain. These ege routers are calle Label Ege Routers (LERs), while routers caable of forwaring both MPLS an IP ackets are calle Label Switching Routers (LSRs). The ackets are then route base on the assigne label rather than the original acket IP heaer. The label assignments are base on the Forwaring Equivalent Class (FEC), where ackets belonging to the same FEC are assigne the same label an traverse through the same ath across the MPLS network. A ath traverse by an FEC is calle a Label Switche Path (LSP). The Label Distribution Protocol (LDP) an an extension to the Resource reservation Protocol (RSVP) are use to establish, maintain, an tearown LSPs []. One of the most attractive alications of MPLS is Traffic Engineering (TE) []. A TE roblem in the Internet consists of setting u aths between the eges routers in a network to meet traffic emans while achieving low congestion an otimizing the utilization of network resources. In ractice, the usual key objective of traffic engineering is to minimize the utilization of the most heavily use link in the network, or the maximum of link utilization. As the maximum link utilization qualitatively exresses that congestion sets in when link utilization increases higher, it is imortant to minimize the link utilization throughout the network so that no bottleneck link exists. It is known that this roblem of minimizing the maximum link utilization can be solve by the multicommoity network flow formulation of otimal routing, which leas to slitting traffic over multile aths between source-estination airs []. The objectives of this aer are twofol. First of all, the aer aresses in etermine otimal flow allocations to alternative aths for MPLS networks, which we call the Otimal Link Utilization Moel (), consists of minimizing the loa in each link, maximize the utilization of links, subject to caacity an flow constraints. In orer to minimize the average acket elay, a common aroach has been the maximum link utilization require is minimize. The secon goal of the aer is to allocate traffic loa from source noes to target ones, in such a way that backbone resources are utilize in a balance manner. Our mathematical moel is base on ifferent MPLS networks toologies: Mesh, Ring an Tree. We assume that all links are biirectional an consier the maximum link utilization within the network as the relevant network QoS measure. In this aer we consier Interior Point Methos () an Simlex Metho (SM) for the comarison with the. The remainer of the aer is organize as follows. In Section II, we roose, escribe an analyze the Otimal Link Utilization Moel (). Section III we resent ifferent toological MPLS networks with. Section IV rovies the simulation results for evaluation urose. Finally, we resent some conclusions in Section V.

2 . THE OPTIMAL LINK UTILIZATION MODEL () The roblem consists of minimizing the loa in each link, maximize the global utilization of links, subject to caacity an flow constraints. We nee to efine a esign objective function. In orer to minimize the average acket elay, a common aroach has been to minimize the maximum link utilization. In [] enote the metric of link e which takes non - negative or ositive integer values, eening on the unerlying routing rotocol boune above. Thus, the link metric system w = (w, w,,w e ) will inuce traffic flow each eman base on the rule of the routing rotocol. In the case of OSPF/IS-IS, this is governe by the shortest ath routing. If multile shortest aths are available for a eman then flow is equally slit among all shortest aths accoring to the rule know as the equal-cost multiath (ECMP) rule[]. Suose that we can etermine a set of ossible/allowable aths =,, for eman (instea of assuming which one woul be the shortest). We enote the flow on ath for eman inuce by the link metric system w by x (w) this relation is imortant to oint out ie to the eenency of the flows x (w) on ath. The link utilization on each link e is enote by Le( w) / c e.where Le is link loa of the link e. Then the maximum utilization over all links is reresente by the eenent variable r an reresent function objective. The goal of the maximum link utilization requires is minimize can be formulate as follows: Minimize r = max ( L ( w) / c ) e e e x = h =,,.D () δ e x = Le e=,,..., E () Le ce e=,,..., E () we non-negative integers Where: h is eman constraint volumes, δ e is link ath inicator, meaning it takes the value if the route for eman uses the link e, Otherwise it is an c e is caacity of link e.. IN MPLS NETWORKS.. in Mesh MPLS network A mesh network is a local area network that emloys one of two connection arrangements, full mesh toology or artial mesh toology. The Fig. shows a full mesh network with five noes. Mesh networks work well when the noes are locate at scattere oints that o not lie near a common line. The chief rawback of the mesh toology is exense, because of the large number of connections require. In some scenarios, a ring network may rove more cost effective than a mesh network. Alying link utilization an maximum throughut analysis for each link of this network we obtain (). Consiering "all with all", the total number of connections is the ouble of the number of combinations of N noes, taken from to, the number of connections can be efine as: N = N( N ) Minimize r = max e( N( N ) / ce) () x = h =,,.D (5) δ ex = N( N ) e=,,..., E (6) NN ( ) c e=,,..., E (7) f e x f f x x x 5 x7 f x5 x6 x8 x x9 Figure : Mesh MPLS networks. in Ring MPLS network The ring toology may rove otimum when system requirements are moest an noes are at scattere oints. A break in the cable of a ring network may result in egrae ata see between airs of noes for which the ata ath is increase as a result of the break. If two breaks occur an they are not both in the same section of link, some noes will be cut off from some of the others. When system reliability is a critical concern, a bus network or star network may rove suerior to a ring network. If reunancy is require, the mesh network toology may be referable. Fig. illustrates a ring network with 5 noes an 5 links. Alying link utilization an maximum throughut for each link of this network we obtain (8). For ring network the number of connections can be efine as: N(N-)/. N N Minimize r = max e / ce (8) x = h =,,.D (9) N N δex = e=,,..., E () N N ce e=,,..., E f 5 ()

3 f L5 L f 5 5 f L L f L f Where n are noes in tree network, n are noes number below the noe where it is calculate F an h is height tree. In Fig., F enotes throughout noe. A Height = Root noe Deth F Deth Figure : Ring MPLS Network. in Tree MPLS network Deth Deth Clearly the tree structure reresenting such a comutation usually grows ynamically uring the rocess of the comutation in an unreictable way. Efficient execution of these comutations on a arallel comuter requires assigning their rocesses (tree noes) to the rocessors of the unerlying arallel comuter such that every rocessor gets aroximately an equal amount of comutation loa an communicating rocesses are assigne to rocessors that are as close as ossible. This roblem is known as ynamic tree embeing roblem [5-7]. A comlete m-ary tree in which all leaves have the same eth () an all internal noes have egree m is shows in Fig.. Thus, the number of leaves at height h is m h, consequently, h of a comlete m-ary tree with n leaves is log m n [8]. The number of internal noes if a comlete m-ary tree of height h is: h h i + m+ m m = m i= To calculate utilization of links first we calculate the throughut in each noe, for it we ivie the roblem in two arts. The first art is to calculate whole loa that exists over each noe an the secon art is the loa of noes that are below lus the loa of internal connections. This gives us the result of all the ossible connections in network, which is reresente for A in the Fig. an formulate by (). The equation is multilies for taking into account that links are biirectional; this roceure is vali only for h >. In orer to calculate all the internal connections between chilren noes to the target noe where F is calculate an reresente for B in the Fig. an formulate by (). We roose the next equation for the total utilization: n F = ( n n) n + ( m ) m () A B Where: n h i = m i= Figure : Tree MPLS Network By means of this moel we can calculate the comlete loa that asses for each of the noes. Nevertheless it is necessary to otimize the loa in each links. The links utilization in each branch may be formulate as follows: Minimize n F = maxe ( n n) n + ( m ) / ce m () x = B =,,.D () n δex = ( n n) n + ( m ) e =,,,E m n ( n n) n + ( m ) ce e =,,,E m. RESULTS In this section, we rovie some numerical examles that illustrate the link utilization on three networks toologies. Those results are obtaine from simulations or from exact analysis. The first moel is base on the mesh network shown in the Fig., which consists of 5 noes, with links; the caacity of each link is limite between an i, j. Ingress flows f, f an f, are resectively:,, an egress flows f, f5 will be: -, -. We want to otimize the link utilization. To get it we aly the equations resente in section III, an we comare the results using well known solvers for otimization: CPLEX [9] an LIPSOL []. First we analyze link maximum utilization eening of number of noes in the network. The Fig. shows the results maximum link utilization require in function of the number of noes for ring an mesh networks acquire the () an (8) B

4 resectively. We can see that the link utilization ecreases accoring to the amount of noes in the network. Secifically, this iminish is inversely to square of the number of noes, this behaviour is similar for both tyes of networks. The Fig. 5 shows the obtaine results using three otimization methos: SM, an in Mesh network. We can see the flow istribution in each link. The loa balance is similar in all cases. The link X is aroximately saturate whereas links X, X6, X8, X9 an X are ractically free of traffic loa. In this case the moel minimizes the loa in % of the link X, istributing the loa in the links X9 an X, but it continues maintaining the loa of the links X, X6 an X8 ractically in zero. The Fig.6 shows the obtaine results consiering for a ring network which consists of 5 noes, with 5 connections; the caacity of each connection is limite between an i, j. The ingress flows f, f an f, will be resectively: 5,, an the egress flows f, f5 will be: -5, -5. We want to otimize the link utilization. To get it we aly equations, like we exlain reviously, an we will verify the results by solvers commercials of otimization CPLEX an LIPSOL,6,5,,,, Noes Mesh Ring Figure : Maximum link utilization require in function noes grown in mesh an ring network. Maximun Utilization,,8,6,, X X X X X5 X6 X7 X8 X9 X SIMPLEX Figure 5: Maximum link utilization in mesh network. In for this tye of network the roose moel is more efficiently than SM an, it istributes the traffic more uniformly in each network link. Also in this grah we can observe that in SM there is only one link at maximum loa (X5) an another without loa (X), balancing the loa in the rest of the links. For the case of the some links on t have loa, it is the case of X, X5, X8 an X. But it suorts the rest of the links with fair loa. This behaviour is smoothe by the roose moel ().,,8,6,, X X X X X5 X6 X7 X8 X9 X Figure 6: Maximum link utilization in ring network. SIMPLEX The table shows how the network grows eening on the number of branches an of the eth of the tree network, in articular for,,, 5 an 6 branches. We can observe that the growth is exonential resect to eth. For number of noes calculation in tree network, we assume that it s symmetric; in other wors, the root noe slit in m branches, an the chilren noes also woul slit in others m noes. For examle, we consier the tree toology resente in figure with four height an m = in each noe, also we consiere others networks with m = an m = an height 5. For the analysis of the utilization of the links in a network tree, is consiere a toology with noes an biirectional connections; the caacity of each connection is limite between an (i, j). We want to otimize link utilization. To get it we will aly equations, like we exlain reviously, an we will verify the results by solvers commercials of otimization CPLEX an LIPSOL. The results are shown in Fig 7. There we can see the istribution of the loa in each of network links using the three methos in evaluation. In general the behaviour is similar in the neighbourhoo of the root noe links, but as we move to the inferior branches of the network where the loa is smaller than in the suerior ones we see that link utilization is aroaching to zero an therefore they are less congeste. Nevertheless the roose moel has a better balance of loa than an SM in the inferior branches of the network. If esigning an otimal tree is a comlex roblem, maintaining this tree otimality after changes in the noes grou may be even more comlex. The table shows the results obtaine for function objective. The evaluation was one for the three network toologies using 7, 5, an 6 noes. It is necessary to highlight that this function is ientical when evaluate three methos (SM, an ).

5 TABLE GROWNING OF TREE NETWORK h m= m= m= N N F N N F N N F 7 8 D 6 D 5 D 6 D 7 85 D 86 D 5 D D 65 D 56 D 9 7 D 8 8 D 6 6 D 688 D D D 78 D D 7 6 D D 78 D D D 8 D 6 69 D 85 D 56 D D 66 D 89,8,7,6,5,,,, X X X7 X X X6 X9 X X5 X8 X Figure. 7 Maximum link utilization in tree network TABLE OBJECTIVE FUNCTIONS OF THE THREE ALGORITHMS 7-Noe Network 5-Noe Network OUL SM OUL SM Mesh Ring Tree -Noe Network 6-Noe Network OUL SM OUL SM Mesh Ring Tree ACKNOWLEDGMENTS This work was suorte by the National roject CICYT TIC-89-C uner a grant from the Sanish Eucational Ministry, an the COST Action 9 Graal. 5. CONCLUSIONS A mathematical moel to etermine the otimal arameters for strategically routing traffic in an MPLS network has been resente. We have roose an aroach for otimal link utilization moel () for three toologies: ring, mesh an tree. The aroach rovies a solution that woul result in otimally balance link utilization. The behaviour we get using this algorithm is similar to what we get with the X X7 X X X6 X9 X5 X55 SM X58 solver. Finally we comare the results of theoretical moel with the interior oint an simlex algorithms using the GAMS an CPLEX solvers. The results show that minimize maximum require link utilization with resect to an SM. But, the resulting function objective is the same for the three algorithms in the toologies evaluate. As a future work, we want to use the moel in others network toologies, traffic istribution, an routing constraints on network caacity. We will consier ho count restriction in this moel. 7. REFERENCES [] E. C. Rosen, A. Viswanathan, an R. Callon, "Multirotocol label witching architecture." RFC, January. [] M. Huerta an X. Hesselbach, "Alication of the theory of the multicommoity for the flows istribution in MPLS networks,". LANMAN. The th IEEE Worksho on,,. 9-. [] M. Pioro an D. Mehi, Routing, flow an Caacity Design in Communications an Comuter Networks. San Francisco: Morgan Kaufmann Elsevier,. [] A. Iselt, A. Kirstater, A. Parigon an T. Schwabe, "Resilient routing using MPLS an ECMP," High Performance Switching an Routing, HPSR-. [5] K. Li, "On ynamic tree growing in hyercubes " in Proceeings of the 997 ACM symosium on Alie comuting San Jose, California, Unite States ACM Press, [6] K. Li, "Asymtotically otimal ranomize tree embeing in static networks," resente at Parallel Processing Symosium, IPPS/SPDP,998. [7] H. Shen, K. Li, Y. Pan, G. H. Young, an S. Q. Zheng, "Performance analysis for ynamic tree embeing in k-artite networks by ranom walk," 997. I-SPAN '97 [8] T. H. Cormen, C. E. Leiserson, an R. L. Rivest, Introuction to algorithms, secon e,. [9] CPLEX, "CPLEX User's Manual," ILOG, 999. [] Y. Zhang, "Solving Large-Scale Linear Programs by Interior-Point Methos Uner the MATLAB Environment," Technical Reort TR96-, Deartment of Mathematics an Statistics, University of Marylan, Baltimore County, July 995.

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an

More information

Power analysis of static VAr compensators

Power analysis of static VAr compensators Available online at www.scienceirect.com Electrical Power an Energy ystems 0 (008) 7 8 www.elsevier.com/locate/ijees Power analysis of static VAr comensators F.. Quintela *, J.M.G. Arévalo,.. eono Escuela

More information

Application of Improved SSL in Data Security Transmission of Mobile Database System

Application of Improved SSL in Data Security Transmission of Mobile Database System Alication of Imrove SSL in Data Security Transmission of Mobile Database System RUIFENG WANG, XIAOHUA ZHANG, DECHAO XU College of Automation & Electrical Engineering Lanzhou Jiaotong University Lanzhou,

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Double Integrals in Polar Coordinates

Double Integrals in Polar Coordinates Double Integrals in Polar Coorinates Part : The Area Di erential in Polar Coorinates We can also aly the change of variable formula to the olar coorinate transformation x = r cos () ; y = r sin () However,

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks Tra Coverage: Allowing Coverage Holes of Boune Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memhis The Ohio State University {balistr,santosh.kumar}@memhis.eu

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES

PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES JIONG GONG AND R. PRESTON MCAFEE* We moel the ciil isute resolution rocess as a two-stage game with the arties bargaining to reach a settlement in

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Contingent Fees, Signaling and Settlement Authority

Contingent Fees, Signaling and Settlement Authority Contingent Fees, Signaling an Settlement Authority SHMUEL LESHEM USC Law School Conventional wisom suggests that uner contingent fee contracts, attorneys have an excessive incentive to settle the case;

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Energy consumption in pumps friction losses

Energy consumption in pumps friction losses Energy consumtion in ums friction losses In this secon article in a series on energy savings in ums, Hans Vogelesang, irector of Netherlans-base esign consultancy PumSuort, eals with some ractical asects

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

Text Analytics. Modeling Information Retrieval 2. Ulf Leser

Text Analytics. Modeling Information Retrieval 2. Ulf Leser Text Analytics Moeling Information etrieval 2 Ulf Leser Content of this Lecture I Moels Boolean Moel Vector Sace Moel elevance Feebac in the VSM Probabilistic Moel Latent Semantic Inexing Other I Moels

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

George G. Burba, Dayle K. McDermitt, and Dan J. Anderson. Open-path infrared gas analyzers are widely used around the world for measuring CO 2

George G. Burba, Dayle K. McDermitt, and Dan J. Anderson. Open-path infrared gas analyzers are widely used around the world for measuring CO 2 1 Influence of instrument surface heat exchange on CO 2 flux from oen-ath gas analyzers George G. Burba, Dayle K. McDermitt, an Dan J. Anerson LI-COR Biosciences, 4421 Suerior Street, Lincoln, Nebraska

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

An Analysis Model of Botnet Tracking based on Ant Colony Optimization Algorithm

An Analysis Model of Botnet Tracking based on Ant Colony Optimization Algorithm An Analysis Model of Botnet Tracing based on Ant Colony Otimization Algorithm Ping Wang Tzu Chia Wang* Pu-Tsun Kuo Chin Pin Wang Deartment of Information Management Kun Shan University, Taiwan TEL: 886+6-05-0545

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

Synchronization for a DVB-T Receiver in Presence of Strong Interference

Synchronization for a DVB-T Receiver in Presence of Strong Interference Synchronization for a DVB-T Receiver in resence of Strong Interference R. Mhiri, D. Masse, D. Schafhuber TDF-CR,, Rue Marconi, Technoôle Metz 5778 Metz Ceex 3, France Tel: +33 3 87 75 8, email: en.masse@tf.fr

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Outsourcing Information Security: Contracting Issues and Security Implications

Outsourcing Information Security: Contracting Issues and Security Implications Outsourcing Information Security: Contracting Issues an Security Imlications Asunur Cezar Mile East Technical University Northern Cyress Camus Kalkanlı, Güzelyurt, KKTC, Mersin 10, Turkey asunur@metu.eu.tr

More information

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network Saturation Throughut in a Heterogeneous Multi-channel Cognitive Radio Network Vicent Pla, Stijn De Vuyst, Koen De Turck, Elena Bernal-Mor, Jorge Martinez-Bauset and Sabine Wittevrongel ITACA research institute,

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Managing Sales Return in Dual Sales Channel: Common Return versus Cross-Channel Return Analysis

Managing Sales Return in Dual Sales Channel: Common Return versus Cross-Channel Return Analysis Managing ales Return in ual ales Channel: Common Return versus Cross-Channel Return Analysis Erwin Wioo, atsuhiko Takahashi, atsumi Morikawa, I Nyoman Pujawan, an Bui antosa Abstract This work examines

More information

price elasticity of demand; cross-price elasticity of demand; income elasticity of demand; price elasticity of supply.

price elasticity of demand; cross-price elasticity of demand; income elasticity of demand; price elasticity of supply. Unit 3: Elasticity In accorance with the APT rogramme the objective of the lecture is to hel You to comrehen an aly the concets of elasticity, incluing calculating: rice elasticity of eman; cross-rice

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

Computing the Most Probable String with a Probabilistic Finite State Machine

Computing the Most Probable String with a Probabilistic Finite State Machine Comuting the Most Probable String with a Probabilistic Finite State Machine Colin de la Higuera Université de Nantes, CNRS, LINA, UMR6241, F-44000, France cdlh@univ-nantesfr Jose Oncina De de Lenguajes

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

An effective multi-objective approach to prioritisation of sewer pipe inspection

An effective multi-objective approach to prioritisation of sewer pipe inspection An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering

More information

Complex Conjugation and Polynomial Factorization

Complex Conjugation and Polynomial Factorization Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.

More information

Price Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W

Price Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W Price Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W The rice elasticity of demand (which is often shortened to demand elasticity) is defined to be the

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts

More information

Enhanced Security Key Management Scheme for MANETS

Enhanced Security Key Management Scheme for MANETS Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

VoIP versus VoMPLS Performance Evaluation

VoIP versus VoMPLS Performance Evaluation www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

arxiv:0711.4143v1 [hep-th] 26 Nov 2007

arxiv:0711.4143v1 [hep-th] 26 Nov 2007 Exonentially localized solutions of the Klein-Gordon equation arxiv:711.4143v1 [he-th] 26 Nov 27 M. V. Perel and I. V. Fialkovsky Deartment of Theoretical Physics, State University of Saint-Petersburg,

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA hhussei1@gmu.edu

More information

LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING

LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING Ranjan Kumar 1 and G Sahoo 2 1 Deartment of Comuter Science & Engineering, C.I.T Tatisilwai, Ranchi, India 2 Deartment of Information Technology, B.I.T

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

A Certification Authority for Elliptic Curve X.509v3 Certificates

A Certification Authority for Elliptic Curve X.509v3 Certificates A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information