An Approach to Optimizations Links Utilization in MPLS Networks
|
|
- Doris Ball
- 8 years ago
- Views:
Transcription
1 An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC. 8 Barcelona Sain xavier.hesselbach@entel.uc.es Deartment of electronics an Circuits, Universia Simón Bolívar, Aartao Postal 89, Caracas 8-A, Venezuela mhuerta@usb.ve Institut Informàtica i Alicacions Universitat e Girona EPS P. Camus Montilivi, 77 Girona Sain ramon@silver.ug.es Abstract In this aer we resent a stuy for the otimization of the links utilization in several MPLS network toologies. This information hels in etermining the maximum link utilization require, which is a valuable knowlege in balancing loa strategies in the network. We resent mathematical moels that tune the otimal arameters for strategically routing traffic in an MPLS network. We resent the Otimal Link Utilization Moel () for ifferent toologies. rovies an aroach that woul result in otimally balance link utilization. Finally we comare the results of the moel with the interior oint an simlex algorithms. Results show that the maximum link utilization require is minimize.. INTRODUCTION In recent years there has been active research in the fiel of MultiProtocol Label Switching (MPLS) an an increasing number of networks are suorting MPLS. The remise of MPLS is to attach a short fixe-length label to the ackets at the ingress router of the MPLS omain. These ege routers are calle Label Ege Routers (LERs), while routers caable of forwaring both MPLS an IP ackets are calle Label Switching Routers (LSRs). The ackets are then route base on the assigne label rather than the original acket IP heaer. The label assignments are base on the Forwaring Equivalent Class (FEC), where ackets belonging to the same FEC are assigne the same label an traverse through the same ath across the MPLS network. A ath traverse by an FEC is calle a Label Switche Path (LSP). The Label Distribution Protocol (LDP) an an extension to the Resource reservation Protocol (RSVP) are use to establish, maintain, an tearown LSPs []. One of the most attractive alications of MPLS is Traffic Engineering (TE) []. A TE roblem in the Internet consists of setting u aths between the eges routers in a network to meet traffic emans while achieving low congestion an otimizing the utilization of network resources. In ractice, the usual key objective of traffic engineering is to minimize the utilization of the most heavily use link in the network, or the maximum of link utilization. As the maximum link utilization qualitatively exresses that congestion sets in when link utilization increases higher, it is imortant to minimize the link utilization throughout the network so that no bottleneck link exists. It is known that this roblem of minimizing the maximum link utilization can be solve by the multicommoity network flow formulation of otimal routing, which leas to slitting traffic over multile aths between source-estination airs []. The objectives of this aer are twofol. First of all, the aer aresses in etermine otimal flow allocations to alternative aths for MPLS networks, which we call the Otimal Link Utilization Moel (), consists of minimizing the loa in each link, maximize the utilization of links, subject to caacity an flow constraints. In orer to minimize the average acket elay, a common aroach has been the maximum link utilization require is minimize. The secon goal of the aer is to allocate traffic loa from source noes to target ones, in such a way that backbone resources are utilize in a balance manner. Our mathematical moel is base on ifferent MPLS networks toologies: Mesh, Ring an Tree. We assume that all links are biirectional an consier the maximum link utilization within the network as the relevant network QoS measure. In this aer we consier Interior Point Methos () an Simlex Metho (SM) for the comarison with the. The remainer of the aer is organize as follows. In Section II, we roose, escribe an analyze the Otimal Link Utilization Moel (). Section III we resent ifferent toological MPLS networks with. Section IV rovies the simulation results for evaluation urose. Finally, we resent some conclusions in Section V.
2 . THE OPTIMAL LINK UTILIZATION MODEL () The roblem consists of minimizing the loa in each link, maximize the global utilization of links, subject to caacity an flow constraints. We nee to efine a esign objective function. In orer to minimize the average acket elay, a common aroach has been to minimize the maximum link utilization. In [] enote the metric of link e which takes non - negative or ositive integer values, eening on the unerlying routing rotocol boune above. Thus, the link metric system w = (w, w,,w e ) will inuce traffic flow each eman base on the rule of the routing rotocol. In the case of OSPF/IS-IS, this is governe by the shortest ath routing. If multile shortest aths are available for a eman then flow is equally slit among all shortest aths accoring to the rule know as the equal-cost multiath (ECMP) rule[]. Suose that we can etermine a set of ossible/allowable aths =,, for eman (instea of assuming which one woul be the shortest). We enote the flow on ath for eman inuce by the link metric system w by x (w) this relation is imortant to oint out ie to the eenency of the flows x (w) on ath. The link utilization on each link e is enote by Le( w) / c e.where Le is link loa of the link e. Then the maximum utilization over all links is reresente by the eenent variable r an reresent function objective. The goal of the maximum link utilization requires is minimize can be formulate as follows: Minimize r = max ( L ( w) / c ) e e e x = h =,,.D () δ e x = Le e=,,..., E () Le ce e=,,..., E () we non-negative integers Where: h is eman constraint volumes, δ e is link ath inicator, meaning it takes the value if the route for eman uses the link e, Otherwise it is an c e is caacity of link e.. IN MPLS NETWORKS.. in Mesh MPLS network A mesh network is a local area network that emloys one of two connection arrangements, full mesh toology or artial mesh toology. The Fig. shows a full mesh network with five noes. Mesh networks work well when the noes are locate at scattere oints that o not lie near a common line. The chief rawback of the mesh toology is exense, because of the large number of connections require. In some scenarios, a ring network may rove more cost effective than a mesh network. Alying link utilization an maximum throughut analysis for each link of this network we obtain (). Consiering "all with all", the total number of connections is the ouble of the number of combinations of N noes, taken from to, the number of connections can be efine as: N = N( N ) Minimize r = max e( N( N ) / ce) () x = h =,,.D (5) δ ex = N( N ) e=,,..., E (6) NN ( ) c e=,,..., E (7) f e x f f x x x 5 x7 f x5 x6 x8 x x9 Figure : Mesh MPLS networks. in Ring MPLS network The ring toology may rove otimum when system requirements are moest an noes are at scattere oints. A break in the cable of a ring network may result in egrae ata see between airs of noes for which the ata ath is increase as a result of the break. If two breaks occur an they are not both in the same section of link, some noes will be cut off from some of the others. When system reliability is a critical concern, a bus network or star network may rove suerior to a ring network. If reunancy is require, the mesh network toology may be referable. Fig. illustrates a ring network with 5 noes an 5 links. Alying link utilization an maximum throughut for each link of this network we obtain (8). For ring network the number of connections can be efine as: N(N-)/. N N Minimize r = max e / ce (8) x = h =,,.D (9) N N δex = e=,,..., E () N N ce e=,,..., E f 5 ()
3 f L5 L f 5 5 f L L f L f Where n are noes in tree network, n are noes number below the noe where it is calculate F an h is height tree. In Fig., F enotes throughout noe. A Height = Root noe Deth F Deth Figure : Ring MPLS Network. in Tree MPLS network Deth Deth Clearly the tree structure reresenting such a comutation usually grows ynamically uring the rocess of the comutation in an unreictable way. Efficient execution of these comutations on a arallel comuter requires assigning their rocesses (tree noes) to the rocessors of the unerlying arallel comuter such that every rocessor gets aroximately an equal amount of comutation loa an communicating rocesses are assigne to rocessors that are as close as ossible. This roblem is known as ynamic tree embeing roblem [5-7]. A comlete m-ary tree in which all leaves have the same eth () an all internal noes have egree m is shows in Fig.. Thus, the number of leaves at height h is m h, consequently, h of a comlete m-ary tree with n leaves is log m n [8]. The number of internal noes if a comlete m-ary tree of height h is: h h i + m+ m m = m i= To calculate utilization of links first we calculate the throughut in each noe, for it we ivie the roblem in two arts. The first art is to calculate whole loa that exists over each noe an the secon art is the loa of noes that are below lus the loa of internal connections. This gives us the result of all the ossible connections in network, which is reresente for A in the Fig. an formulate by (). The equation is multilies for taking into account that links are biirectional; this roceure is vali only for h >. In orer to calculate all the internal connections between chilren noes to the target noe where F is calculate an reresente for B in the Fig. an formulate by (). We roose the next equation for the total utilization: n F = ( n n) n + ( m ) m () A B Where: n h i = m i= Figure : Tree MPLS Network By means of this moel we can calculate the comlete loa that asses for each of the noes. Nevertheless it is necessary to otimize the loa in each links. The links utilization in each branch may be formulate as follows: Minimize n F = maxe ( n n) n + ( m ) / ce m () x = B =,,.D () n δex = ( n n) n + ( m ) e =,,,E m n ( n n) n + ( m ) ce e =,,,E m. RESULTS In this section, we rovie some numerical examles that illustrate the link utilization on three networks toologies. Those results are obtaine from simulations or from exact analysis. The first moel is base on the mesh network shown in the Fig., which consists of 5 noes, with links; the caacity of each link is limite between an i, j. Ingress flows f, f an f, are resectively:,, an egress flows f, f5 will be: -, -. We want to otimize the link utilization. To get it we aly the equations resente in section III, an we comare the results using well known solvers for otimization: CPLEX [9] an LIPSOL []. First we analyze link maximum utilization eening of number of noes in the network. The Fig. shows the results maximum link utilization require in function of the number of noes for ring an mesh networks acquire the () an (8) B
4 resectively. We can see that the link utilization ecreases accoring to the amount of noes in the network. Secifically, this iminish is inversely to square of the number of noes, this behaviour is similar for both tyes of networks. The Fig. 5 shows the obtaine results using three otimization methos: SM, an in Mesh network. We can see the flow istribution in each link. The loa balance is similar in all cases. The link X is aroximately saturate whereas links X, X6, X8, X9 an X are ractically free of traffic loa. In this case the moel minimizes the loa in % of the link X, istributing the loa in the links X9 an X, but it continues maintaining the loa of the links X, X6 an X8 ractically in zero. The Fig.6 shows the obtaine results consiering for a ring network which consists of 5 noes, with 5 connections; the caacity of each connection is limite between an i, j. The ingress flows f, f an f, will be resectively: 5,, an the egress flows f, f5 will be: -5, -5. We want to otimize the link utilization. To get it we aly equations, like we exlain reviously, an we will verify the results by solvers commercials of otimization CPLEX an LIPSOL,6,5,,,, Noes Mesh Ring Figure : Maximum link utilization require in function noes grown in mesh an ring network. Maximun Utilization,,8,6,, X X X X X5 X6 X7 X8 X9 X SIMPLEX Figure 5: Maximum link utilization in mesh network. In for this tye of network the roose moel is more efficiently than SM an, it istributes the traffic more uniformly in each network link. Also in this grah we can observe that in SM there is only one link at maximum loa (X5) an another without loa (X), balancing the loa in the rest of the links. For the case of the some links on t have loa, it is the case of X, X5, X8 an X. But it suorts the rest of the links with fair loa. This behaviour is smoothe by the roose moel ().,,8,6,, X X X X X5 X6 X7 X8 X9 X Figure 6: Maximum link utilization in ring network. SIMPLEX The table shows how the network grows eening on the number of branches an of the eth of the tree network, in articular for,,, 5 an 6 branches. We can observe that the growth is exonential resect to eth. For number of noes calculation in tree network, we assume that it s symmetric; in other wors, the root noe slit in m branches, an the chilren noes also woul slit in others m noes. For examle, we consier the tree toology resente in figure with four height an m = in each noe, also we consiere others networks with m = an m = an height 5. For the analysis of the utilization of the links in a network tree, is consiere a toology with noes an biirectional connections; the caacity of each connection is limite between an (i, j). We want to otimize link utilization. To get it we will aly equations, like we exlain reviously, an we will verify the results by solvers commercials of otimization CPLEX an LIPSOL. The results are shown in Fig 7. There we can see the istribution of the loa in each of network links using the three methos in evaluation. In general the behaviour is similar in the neighbourhoo of the root noe links, but as we move to the inferior branches of the network where the loa is smaller than in the suerior ones we see that link utilization is aroaching to zero an therefore they are less congeste. Nevertheless the roose moel has a better balance of loa than an SM in the inferior branches of the network. If esigning an otimal tree is a comlex roblem, maintaining this tree otimality after changes in the noes grou may be even more comlex. The table shows the results obtaine for function objective. The evaluation was one for the three network toologies using 7, 5, an 6 noes. It is necessary to highlight that this function is ientical when evaluate three methos (SM, an ).
5 TABLE GROWNING OF TREE NETWORK h m= m= m= N N F N N F N N F 7 8 D 6 D 5 D 6 D 7 85 D 86 D 5 D D 65 D 56 D 9 7 D 8 8 D 6 6 D 688 D D D 78 D D 7 6 D D 78 D D D 8 D 6 69 D 85 D 56 D D 66 D 89,8,7,6,5,,,, X X X7 X X X6 X9 X X5 X8 X Figure. 7 Maximum link utilization in tree network TABLE OBJECTIVE FUNCTIONS OF THE THREE ALGORITHMS 7-Noe Network 5-Noe Network OUL SM OUL SM Mesh Ring Tree -Noe Network 6-Noe Network OUL SM OUL SM Mesh Ring Tree ACKNOWLEDGMENTS This work was suorte by the National roject CICYT TIC-89-C uner a grant from the Sanish Eucational Ministry, an the COST Action 9 Graal. 5. CONCLUSIONS A mathematical moel to etermine the otimal arameters for strategically routing traffic in an MPLS network has been resente. We have roose an aroach for otimal link utilization moel () for three toologies: ring, mesh an tree. The aroach rovies a solution that woul result in otimally balance link utilization. The behaviour we get using this algorithm is similar to what we get with the X X7 X X X6 X9 X5 X55 SM X58 solver. Finally we comare the results of theoretical moel with the interior oint an simlex algorithms using the GAMS an CPLEX solvers. The results show that minimize maximum require link utilization with resect to an SM. But, the resulting function objective is the same for the three algorithms in the toologies evaluate. As a future work, we want to use the moel in others network toologies, traffic istribution, an routing constraints on network caacity. We will consier ho count restriction in this moel. 7. REFERENCES [] E. C. Rosen, A. Viswanathan, an R. Callon, "Multirotocol label witching architecture." RFC, January. [] M. Huerta an X. Hesselbach, "Alication of the theory of the multicommoity for the flows istribution in MPLS networks,". LANMAN. The th IEEE Worksho on,,. 9-. [] M. Pioro an D. Mehi, Routing, flow an Caacity Design in Communications an Comuter Networks. San Francisco: Morgan Kaufmann Elsevier,. [] A. Iselt, A. Kirstater, A. Parigon an T. Schwabe, "Resilient routing using MPLS an ECMP," High Performance Switching an Routing, HPSR-. [5] K. Li, "On ynamic tree growing in hyercubes " in Proceeings of the 997 ACM symosium on Alie comuting San Jose, California, Unite States ACM Press, [6] K. Li, "Asymtotically otimal ranomize tree embeing in static networks," resente at Parallel Processing Symosium, IPPS/SPDP,998. [7] H. Shen, K. Li, Y. Pan, G. H. Young, an S. Q. Zheng, "Performance analysis for ynamic tree embeing in k-artite networks by ranom walk," 997. I-SPAN '97 [8] T. H. Cormen, C. E. Leiserson, an R. L. Rivest, Introuction to algorithms, secon e,. [9] CPLEX, "CPLEX User's Manual," ILOG, 999. [] Y. Zhang, "Solving Large-Scale Linear Programs by Interior-Point Methos Uner the MATLAB Environment," Technical Reort TR96-, Deartment of Mathematics an Statistics, University of Marylan, Baltimore County, July 995.
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
More informationThe Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management
The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an
More informationPower analysis of static VAr compensators
Available online at www.scienceirect.com Electrical Power an Energy ystems 0 (008) 7 8 www.elsevier.com/locate/ijees Power analysis of static VAr comensators F.. Quintela *, J.M.G. Arévalo,.. eono Escuela
More informationApplication of Improved SSL in Data Security Transmission of Mobile Database System
Alication of Imrove SSL in Data Security Transmission of Mobile Database System RUIFENG WANG, XIAOHUA ZHANG, DECHAO XU College of Automation & Electrical Engineering Lanzhou Jiaotong University Lanzhou,
More informationStatic and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
More informationLarge-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationDouble Integrals in Polar Coordinates
Double Integrals in Polar Coorinates Part : The Area Di erential in Polar Coorinates We can also aly the change of variable formula to the olar coorinate transformation x = r cos () ; y = r sin () However,
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationTrap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
Tra Coverage: Allowing Coverage Holes of Boune Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memhis The Ohio State University {balistr,santosh.kumar}@memhis.eu
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationWeb Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationOn Traffic Fairness in Data Center Fabrics
On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr
More informationOn the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks
On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington
More informationLoad Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More informationA MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
More informationANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE
AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
More informationAutomatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
More informationAn Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems
The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco
More informationMulti-Channel Opportunistic Routing in Multi-Hop Wireless Networks
Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de
More informationPRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES
PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES JIONG GONG AND R. PRESTON MCAFEE* We moel the ciil isute resolution rocess as a two-stage game with the arties bargaining to reach a settlement in
More informationA Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
More informationContingent Fees, Signaling and Settlement Authority
Contingent Fees, Signaling an Settlement Authority SHMUEL LESHEM USC Law School Conventional wisom suggests that uner contingent fee contracts, attorneys have an excessive incentive to settle the case;
More informationBranch-and-Price for Service Network Design with Asset Management Constraints
Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationEnergy consumption in pumps friction losses
Energy consumtion in ums friction losses In this secon article in a series on energy savings in ums, Hans Vogelesang, irector of Netherlans-base esign consultancy PumSuort, eals with some ractical asects
More informationSQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
More informationText Analytics. Modeling Information Retrieval 2. Ulf Leser
Text Analytics Moeling Information etrieval 2 Ulf Leser Content of this Lecture I Moels Boolean Moel Vector Sace Moel elevance Feebac in the VSM Probabilistic Moel Latent Semantic Inexing Other I Moels
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationDesign of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
More informationTRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks
On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources
More informationMonitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
More informationGeorge G. Burba, Dayle K. McDermitt, and Dan J. Anderson. Open-path infrared gas analyzers are widely used around the world for measuring CO 2
1 Influence of instrument surface heat exchange on CO 2 flux from oen-ath gas analyzers George G. Burba, Dayle K. McDermitt, an Dan J. Anerson LI-COR Biosciences, 4421 Suerior Street, Lincoln, Nebraska
More informationA Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
More informationOptimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems
By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical
More informationMultiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei
More informationComparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
More informationRed vs. Blue - Aneue of TCP congestion Control Model
In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6
More informationFirewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
More informationThe fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
More informationAn Analysis Model of Botnet Tracking based on Ant Colony Optimization Algorithm
An Analysis Model of Botnet Tracing based on Ant Colony Otimization Algorithm Ping Wang Tzu Chia Wang* Pu-Tsun Kuo Chin Pin Wang Deartment of Information Management Kun Shan University, Taiwan TEL: 886+6-05-0545
More informationDAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
More informationMoving Objects Tracking in Video by Graph Cuts and Parameter Motion Model
International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationOn Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
More informationNew QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
More informationForensic Science International
Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection
More informationSynchronization for a DVB-T Receiver in Presence of Strong Interference
Synchronization for a DVB-T Receiver in resence of Strong Interference R. Mhiri, D. Masse, D. Schafhuber TDF-CR,, Rue Marconi, Technoôle Metz 5778 Metz Ceex 3, France Tel: +33 3 87 75 8, email: en.masse@tf.fr
More informationStorage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
More informationStochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
More informationEvaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk
More informationOutsourcing Information Security: Contracting Issues and Security Implications
Outsourcing Information Security: Contracting Issues an Security Imlications Asunur Cezar Mile East Technical University Northern Cyress Camus Kalkanlı, Güzelyurt, KKTC, Mersin 10, Turkey asunur@metu.eu.tr
More informationDynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing
Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina
More informationFrom Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,
More informationSaturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network
Saturation Throughut in a Heterogeneous Multi-channel Cognitive Radio Network Vicent Pla, Stijn De Vuyst, Koen De Turck, Elena Bernal-Mor, Jorge Martinez-Bauset and Sabine Wittevrongel ITACA research institute,
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationTOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
More informationRummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
More informationSoftmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting
Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar
More informationManaging Sales Return in Dual Sales Channel: Common Return versus Cross-Channel Return Analysis
Managing ales Return in ual ales Channel: Common Return versus Cross-Channel Return Analysis Erwin Wioo, atsuhiko Takahashi, atsumi Morikawa, I Nyoman Pujawan, an Bui antosa Abstract This work examines
More informationprice elasticity of demand; cross-price elasticity of demand; income elasticity of demand; price elasticity of supply.
Unit 3: Elasticity In accorance with the APT rogramme the objective of the lecture is to hel You to comrehen an aly the concets of elasticity, incluing calculating: rice elasticity of eman; cross-rice
More informationSynopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
More informationComputing the Most Probable String with a Probabilistic Finite State Machine
Comuting the Most Probable String with a Probabilistic Finite State Machine Colin de la Higuera Université de Nantes, CNRS, LINA, UMR6241, F-44000, France cdlh@univ-nantesfr Jose Oncina De de Lenguajes
More informationThe Magnus-Derek Game
The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.
More informationProvable Ownership of File in De-duplication Cloud Storage
1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment
More informationAnalysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
More informationAn effective multi-objective approach to prioritisation of sewer pipe inspection
An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering
More informationComplex Conjugation and Polynomial Factorization
Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.
More informationPrice Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W
Price Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W The rice elasticity of demand (which is often shortened to demand elasticity) is defined to be the
More informationAn Introduction to Risk Parity Hossein Kazemi
An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation
More informationMSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION
MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the
More informationTwo-resource stochastic capacity planning employing a Bayesian methodology
Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning
More informationTime-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
More informationEffect Sizes Based on Means
CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred
More informationX How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
More informationCharacterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
More informationSOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
More informationEnhanced Security Key Management Scheme for MANETS
Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,
More informationCompensating Fund Managers for Risk-Adjusted Performance
Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast
More informationGame Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments
2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit
More informationQuality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland
More informationVoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
More informationOn Adaboost and Optimal Betting Strategies
On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore
More informationarxiv:0711.4143v1 [hep-th] 26 Nov 2007
Exonentially localized solutions of the Klein-Gordon equation arxiv:711.4143v1 [he-th] 26 Nov 27 M. V. Perel and I. V. Fialkovsky Deartment of Theoretical Physics, State University of Saint-Petersburg,
More informationAn inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods
An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,
More informationAnalysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
More informationRisk in Revenue Management and Dynamic Pricing
OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri
More informationSimulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
More informationADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA hhussei1@gmu.edu
More informationLOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING
LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING Ranjan Kumar 1 and G Sahoo 2 1 Deartment of Comuter Science & Engineering, C.I.T Tatisilwai, Ranchi, India 2 Deartment of Information Technology, B.I.T
More informationFailure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
More informationA Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
More informationF inding the optimal, or value-maximizing, capital
Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital
More information