Advantages of Parallel Processing and the Effects of Communications Time
|
|
|
- Shon Cameron
- 9 years ago
- Views:
Transcription
1 Advantages of Parallel Processing and the Effects of Communications Time Wesley M. Eddy 1 Ohio University [email protected] Mark Allman NASA GRC / BBN Technologies [email protected] NASA Glenn Research Center Report Number CR Abstract Many computing tasks involve heavy mathematical calculations, or analyzing large amounts of data. These operations can take a long time to complete using only one computer. Networks such as the Internet provide many computers with the ability to communicate with each other. Parallel or distributed computing takes advantage of these networked computers by arranging them to work together on a problem, thereby reducing the time needed to obtain the solution. The drawback to using a network of computers to solve a problem is the time wasted in communicating between the various hosts. The application of distributed computing techniques to a space environment or to use over a satellite network would therefore be limited by the amount of time needed to send data across the network, which would typically take much longer than on a terrestrial network. This experiment shows how much faster a large job can be performed by adding more computers to the task, what role communications time plays in the total execution time, and the impact a long-delay network has on a distributed computing system. 1. Introduction Distributed computing provides a way to speed up the time it takes to perform a large task by dividing the task between multiple computers that can work simultaneously to complete the job in less time than a single machine requires. The goal of this project was to discover what relationship exists between the number of computers working on a task and the time they take to complete it, and also what effect the communications time between those computers has upon the overall time required to complete the task. 1 This work was sponsored by the NASA Glenn Research Center. 1
2 The recent success of the project [SETI], where data gathered by a radio-telescope is processed by a large network of volunteers, shows that distributed computing can be very beneficial. Parallel processing has the potential to aid NASA in much of its work. For example, a data-gathering robot on the moon could make use of powerful Earth-based computers to analyze its surroundings, and then use the information produced by the analysis to decide where to go and what to focus its sensing devices on next. The same kind of situation could apply to a data-collecting satellite which might need to make decisions based upon the information it gathers As a test problem we used the process of finding the N-th prime number. Because the primes become more rare as N becomes larger, it takes an increasingly longer period of time for a computer to find the N-th prime as N grows. As a demonstration, we created a program called sprime to calculate the N-th prime on a single computer. The results for various N are shown in Table 1 and Figure 1. As the graph illustrates, the problem is not linear as N increases, due to the thinning nature of primes. The time values given in Figure 1 represent the average over 30 runs for each value of N. Details on the workings of the sprime program can be found in Appendix A. N N-th Prime 250,000 3,497, ,000 7,368, ,000 11,381,621 1,000,000 15,485,863 1,500,000 23,879,579 2,000,000 32,452,843 Table 1: The N-th prime grows faster as N becomes larger Time (sec) , , ,000 1,000,000 1,500,000 2,000,000 N Figure 1: The time taken by one machine to calculate the N-th prime shows a rapid increase as N becomes larger. 2
3 2. Adding More Machines To divide the problem amongst a number of computers we wrote two programs. The first program, pprime (parallel prime), is the client program that acts as the scheduler and splits the task into smaller parts which it assigns to other computers. The second program, pprimed (parallel prime daemon), is the server program that receives job requests from pprime, performs the required task and sends back the results. The pprimed program that runs on each of the server computers receives a request from the client that consists of a range of numbers to check for primality and a maximum number of primes to find. The method used to determine whether or not a number is prime is the same as used in sprime and is described in Appendix A. When the daemon has finished checking the assigned range, or when the maximum number of primes has been reached, it stops checking and sends pprime a message echoing the range checked, how many primes were found, and the last prime found. The pprime program can be configured to send requests to any number of computers running pprimed. For our tests, pprime ran on an Ultra-2 running SunOS 5.6, and pprimed ran on between one and ten nearly identical Pentium-Pro machines running NetBSD 2. This was determined to be a good setup, because initial tests using the sprime program showed that the Sun machine was slower than any of the NetBSD machines. This could be typical of a real-life scenario in which one less-powerful computer could use its network to take advantage of faster computers that would otherwise be left idle. Figure 2 is a simplified diagram of our network. All network links are 10Mbps Ethernet. Figure 2: Our servers only communicated with the machine running pprime. All network links are 10Mbps Ethernet. 2 The NetBSD machines used in our investigation were not identical. For instance, the machines ran various versions of the operating system (1.3.2, 1.3.3, and 1.4). In addition, the machines had differing amounts of RAM. The minor differences in the operating systems and RAM did not significantly impact the performance of the machines in tests with sprime, so for the sake of simplicity, they were all considered to be equally capable. 3
4 The Transmission Control Protocol (TCP) [Pos81] is used to provide reliable communications between the client and servers. The size of the messages exchanged between pprime and pprimed is always small enough to fit within one TCP segment and therefore TCP s congestion control algorithms [JK88] do not influence performance. Due to the low amount of other traffic and the close proximity of our computers to one another, the network conditions did not have a large effect upon the behavior of the system. Calculating the 2,000,000-th Prime Time (sec) Servers Figure 3: Adding more servers reduced the calculation time Figure 3 plots the average length of time that our system took to calculate the twomillionth prime over thirty trials as a function of the number of servers. As expected, utilizing more servers caused the job to be completed much faster. The figure also shows that the gains in performance time decrease with every machine that is added. It seems that the curve can be approximated by saying that the time in which a parallel processing system can complete a task equals the time required for one server to complete the task, divided by the total number of servers being used. Or symbolically: T x = T 1 / x, where x is the number of servers, and T x is the time required for x servers to do the job. This equation is for a system operating under what are considered ideal circumstances, where all the servers are equally capable machines, it takes zero time to send information between machines, and the problem can be divided equally. Figure 4 depicts the percent difference in calculation time between the results achieved in our experiment and what the ideal equation predicts. Figure 5 gauges the benefits we experienced by adding more 4
5 computers by presenting the decrease in calculation time from the single-server calculation time as a function of the number of servers. 35.0% 30.0% Difference from Ideal 25.0% 20.0% 15.0% 10.0% 5.0% 0.0% Servers Figure 4: As more machines are added our system performs progressively worse than an ideal system. 90% 80% Decrease in Calculation Time 70% 60% 50% 40% 30% 20% 10% 0% Servers Figure 5: The performance improvement obtained by adding more machines goes down with each machine added. Figure 4 illustrates that using up to five servers, our system very close to ideal. But, as more machines were added, the results begin to differ substantially the ideal case. Figure 5 also attests to a sharp decrease in calculation time at first, followed by a prolonged 5
6 leveling off. From these charts it is clear that the contributions of additional machines become less effective as the number of servers is increased. This is due to the client program s inefficiency in dealing with the rising complexity of coordinating the work of multiple servers. We may be able to use a different scheduling algorithm to remedy this problem, however that task was left as future work. 3. Effects of a Communications Delay With the small network of computers in our lab, which were all within a few feet of each other and connected by 10 Mbps Ethernet, the communication time between computers was negligible. In a real world implementation however, the geographic distances between the client and servers might be much greater than that of our lab s network. Therefore, the time it would take to communicate could be significantly larger. To simulate a longer communications time, the pprimed program which runs on each server machine was designed with a variable delay option. The delay could be set to any time period, which the program would wait for between finishing its calculations and sending its results back to the client, thus simulating a longer network delay. Our delay represents the twice the time needed for a trip over the network, since our program only waits once, but two network trips are required per request (one to get the request to the server and then another to return the results back to the client). The influence of communication time in the total calculation time is dependent upon the number of times the computers must communicate. If the number of messages sent over the network can be kept to a minimum then the network delay will create less of an increase in the total calculation time. In situations where the size of the job is known, it can simply be divided evenly between the number of machines available and there would only need to be one request sent to each machine and one response received back from each, thus minimizing the effect of communication time to one round-trip over the network. In our case however, pprime usually has to send multiple requests to each server. Since the density of the prime numbers decreases, the program cannot predict how big the total job will be, so it sequentially assigns ranges of numbers to all the servers until N primes are found. The size of the chunk of numbers each machine is told to check is simply equal to the number of primes left to find (N minus the number of primes found). Since this would result in a large number of small chunk sizes as the number of primes found approaches N, there is also a built-in minimum chunk-size of 25,000. A result of this algorithm is that as machines are added, less total requests must be sent since each salvo of requests searches a larger total area. We expect that other parallel processing systems where the size of the job is not known beforehand can be expected to show similar behavior. Table 2 lists the average number of requests that pprime will send as a function of the number of servers, when calculating the two-millionth prime. As expected the number of requests drops off as servers are added to the system. 6
7 Even traveling at the speed of light, communications between the Earth, satellites, and the moon experience a significant propagation delay because of the large distances that must be crossed. As useful delays for our tests, we chose 0.25 seconds, 0.5 seconds and 2.6 seconds. NASA s ACTS satellite can cover a large area of the Earth, making it a good candidate for use in creating a satellite based distributed computing system. Since it takes roughly 250 milliseconds to get a signal to up to the ACTS satellite and then back down to Earth, 0.25 seconds is used to simulate a situation in which a geosynchronous data-collecting satellite uses Earth-based computers to process its data. The 0.5 second delay approximates two messages traveling over the ACTS satellite link which would be the case if the satellite was used to connect ground based computers. Another scenario we envisioned was having our weaker client computer on the moon. In this case it would use more powerful Earth-based computers to do work as its servers. A delay of 2.6 seconds was chosen to replicate this situation because it takes about 1.3 seconds to get a signal up to the moon or back down. These were two areas we envisioned as possible uses of distributed computing for NASA. Figure 6 shows the average time it took to find the two-millionth prime when all of our servers were set with the specified delays over thirty trials Servers Requests Table 2: Average number of requests sent (90 trials) Time (sec) delay 0.25 sec delay 0.5 sec delay 2.6 sec delay Servers Figure 6: Time to find Two-Millionth Prime when a delay is introduced From Figure 6, we can see that as more servers are introduced, the extra run-time added by the network delay goes down considerably. This is a direct effect of the assignment algorithm we used in pprime, which sends less requests as it works with more 7
8 machines. Using Table 2, we can predict roughly how many requests will need to be sent to a particular number of servers and dividing the average number of total requests by the number of servers, we can get the average number of requests sent to each individual server. The total effect of the network delay then, is approximately equal to the average number of requests sent to an individual server multiplied by the network delay. Since some machines end up processing more requests than others, a more accurate figure for the total calculation time can be obtained by adding the zero-delay calculation time to the product of the maximum number of requests sent to any one server and the network delay. 25% 20% Increase in Time 15% 10% 5% 0% 2.6 sec delay 0.5 sec delay 0.25 sec delay Servers 9 10 Figure 7: Increase in calculation time caused by delay as a percentage of the zero-delay calculation time. Figure 7 illustrates that increasing the number of machines reduces the negative effects of the network delay. This is, once again, a result of issuing less requests per server being as the number of servers is increased. Figure 7 also indicates that adding servers is more effective at reducing calculation time in longer delay networks than networks with a short delay. This is because in longer delay systems the communications time is a bigger portion of the total calculation time so a reduction in the number of network round-trips has more effect. 8
9 4. Conclusions and Future Work This experiment has shown that it is possible to use several computers in parallel to solve problems that take long periods of time to complete on a single machine, and that by using more computers the total calculation time can be drastically reduced. The results of this experiment also show that for tasks which involve multiple requests over a long-delay network, adding more machines to the parallel processing system can also help to reduce the negative effects of the network s delay. These are important results for NASA because they show that cheaper less-powerful computers placed on the moon, or linked by a satellite connection can effectively use parallel processing techniques with more powerful machines elsewhere on the network. Future work in this area involves analyzing the effects of even longer delays, such as a Mars-based computer using servers on Earth. It is expected that at a longer delay the size of the task must be proportionally larger for the system to be effective. For tasks involving transfers of large amounts of data, networks with different data-transfer rates should be considered. In a real-world situation, there might also be varying network delays to each server, which should also be analyzed. Changes in these network conditions could result in the need for a different scheduling algorithm. In addition, tests should be performed on a more dynamic network, since competing traffic could have some influence on the system. Acknowledgments The authors would like to thank David Juedes from Ohio University for giving us some helpful information about primality testing. Dan Glover at NASA-GRC also provided feedback which was useful in the writing of this paper. References [Bres89] David M. Bressoud, Factorization and Primality Testing, Springer Vertag, [CLR90] Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest, Introduction to Algorithms, The MIT Press, 1990, pages [JK88] Van Jacobson and Michael J. Karels. Congestion Avoidance and Control. In ACM SIGCOMM, [Pos81] Jon Postel. Transmission Control Protocol, September RFC 793. [SETI] The Search for Extraterrestrial Intelligence, Appendix A. Checking for Primality One of the main portions of the programs used in this experiment is the algorithm that checks a particular number for primality. Although there are faster methods for performing this test [Bres89] such as the APR test, the Miller-Rabin test [CLR90], the 9
10 Cyclotomy test, and several Monte Carlo methods, the method used in the sprime and pprimed programs is probably the most obvious and the easiest to understand. Most of the other methods are also intended to be used upon numbers that have hundreds or even thousands of digits, while we were only testing numbers that could be contained in four bytes of memory. Our goal also was not to find the fastest or most efficient way to find primes. Rather, finding primes was simply a test problem used to make generalizations about the behavior of a parallel processing system in a long-delay environment. A number is considered prime if it is an integer greater than one, and its only factors are itself and one. Any number which is not prime is called a composite, with the exception of the number one, which is considered to be a unit. So, to check a number X for primality, all that must be done is to make sure that none of the integers less X will divide it evenly. One way to speed this task up is to first check to see if two is a factor of X, and then only make sure that odd numbers are not factors. This is possible because if X is even, then dividing by two will immediately show that X is a composite, and if X is odd, then it cannot have any even numbers as factors. Actually, as long as the square root of the number is not a whole number, only the integers less than the square root of X must be checked, since factors come in pairs, and all the pairs whose first term is greater than X s square root will be mirror images of pairs whose first term was less than the square root of X. When looking for primes, our programs, sprime and pprimed, skip over even numbers because we know that there are no even primes greater than two. To check an odd number X for primality then, our programs use the C language s modulus operator (%) to ensure that there is no remainder when X is divided by any of the odd integers less than one plus the square root. As soon as a number is found that divides X evenly, X is taken to be a composite and the next odd integer, X + 2, is checked for primality. If no numbers can be found to divide X evenly, then X is considered prime. 10
ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite
ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,
POLYNOMIAL FUNCTIONS
POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Year 9 set 1 Mathematics notes, to accompany the 9H book.
Part 1: Year 9 set 1 Mathematics notes, to accompany the 9H book. equations 1. (p.1), 1.6 (p. 44), 4.6 (p.196) sequences 3. (p.115) Pupils use the Elmwood Press Essential Maths book by David Raymer (9H
PARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Section 1.5 Exponents, Square Roots, and the Order of Operations
Section 1.5 Exponents, Square Roots, and the Order of Operations Objectives In this section, you will learn to: To successfully complete this section, you need to understand: Identify perfect squares.
Appendix A: Science Practices for AP Physics 1 and 2
Appendix A: Science Practices for AP Physics 1 and 2 Science Practice 1: The student can use representations and models to communicate scientific phenomena and solve scientific problems. The real world
Determining the Optimal Combination of Trial Division and Fermat s Factorization Method
Determining the Optimal Combination of Trial Division and Fermat s Factorization Method Joseph C. Woodson Home School P. O. Box 55005 Tulsa, OK 74155 Abstract The process of finding the prime factorization
Negative Integral Exponents. If x is nonzero, the reciprocal of x is written as 1 x. For example, the reciprocal of 23 is written as 2
4 (4-) Chapter 4 Polynomials and Eponents P( r) 0 ( r) dollars. Which law of eponents can be used to simplify the last epression? Simplify it. P( r) 7. CD rollover. Ronnie invested P dollars in a -year
Session 6 Number Theory
Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Chapter 11 Number Theory
Chapter 11 Number Theory Number theory is one of the oldest branches of mathematics. For many years people who studied number theory delighted in its pure nature because there were few practical applications
ALGEBRA. Find the nth term, justifying its form by referring to the context in which it was generated
ALGEBRA Pupils should be taught to: Find the nth term, justifying its form by referring to the context in which it was generated As outcomes, Year 7 pupils should, for example: Generate sequences from
SOLVING EQUATIONS WITH RADICALS AND EXPONENTS 9.5. section ( 3 5 3 2 )( 3 25 3 10 3 4 ). The Odd-Root Property
498 (9 3) Chapter 9 Radicals and Rational Exponents Replace the question mark by an expression that makes the equation correct. Equations involving variables are to be identities. 75. 6 76. 3?? 1 77. 1
2.5 Zeros of a Polynomial Functions
.5 Zeros of a Polynomial Functions Section.5 Notes Page 1 The first rule we will talk about is Descartes Rule of Signs, which can be used to determine the possible times a graph crosses the x-axis and
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Exponents and Radicals
Exponents and Radicals (a + b) 10 Exponents are a very important part of algebra. An exponent is just a convenient way of writing repeated multiplications of the same number. Radicals involve the use of
PORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT
1 PORTrockIT Veeam : accelerating virtual machine replication 2 Executive summary Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of
VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)
VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) December 16 th, 2015 Table of Contents 1. Purpose... 3 2. What a typical internet speed test measures....
Kindergarten Math Curriculum Course Description and Philosophy Text Reference:
Kindergarten Math Curriculum Course Description and Philosophy How do numbers and math affect our daily lives? What types of problems can be solved by understanding numbers and math concepts? Through inquiry,
A Case for Dynamic Selection of Replication and Caching Strategies
A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
7 th Grade Integer Arithmetic 7-Day Unit Plan by Brian M. Fischer Lackawanna Middle/High School
7 th Grade Integer Arithmetic 7-Day Unit Plan by Brian M. Fischer Lackawanna Middle/High School Page 1 of 20 Table of Contents Unit Objectives........ 3 NCTM Standards.... 3 NYS Standards....3 Resources
INTRODUCTION TO MATHEMATICAL MODELLING
306 MATHEMATICS APPENDIX 2 INTRODUCTION TO MATHEMATICAL MODELLING A2.1 Introduction Right from your earlier classes, you have been solving problems related to the real-world around you. For example, you
Technology Update White Paper. High Speed RAID 6. Powered by Custom ASIC Parity Chips
Technology Update White Paper High Speed RAID 6 Powered by Custom ASIC Parity Chips High Speed RAID 6 Powered by Custom ASIC Parity Chips Why High Speed RAID 6? Winchester Systems has developed High Speed
Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
3.2. Solving quadratic equations. Introduction. Prerequisites. Learning Outcomes. Learning Style
Solving quadratic equations 3.2 Introduction A quadratic equation is one which can be written in the form ax 2 + bx + c = 0 where a, b and c are numbers and x is the unknown whose value(s) we wish to find.
Introduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
LAN Performance Measurements Lab
LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for
Fast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik [email protected] Abstract This paper provides an introduction to the design of augmented data structures that offer
1.6 The Order of Operations
1.6 The Order of Operations Contents: Operations Grouping Symbols The Order of Operations Exponents and Negative Numbers Negative Square Roots Square Root of a Negative Number Order of Operations and Negative
CONTENTS. Please note:
CONTENTS Introduction...iv. Number Systems... 2. Algebraic Expressions.... Factorising...24 4. Solving Linear Equations...8. Solving Quadratic Equations...0 6. Simultaneous Equations.... Long Division
Polynomial and Rational Functions
Polynomial and Rational Functions Quadratic Functions Overview of Objectives, students should be able to: 1. Recognize the characteristics of parabolas. 2. Find the intercepts a. x intercepts by solving
5.1 Radical Notation and Rational Exponents
Section 5.1 Radical Notation and Rational Exponents 1 5.1 Radical Notation and Rational Exponents We now review how exponents can be used to describe not only powers (such as 5 2 and 2 3 ), but also roots
Working with whole numbers
1 CHAPTER 1 Working with whole numbers In this chapter you will revise earlier work on: addition and subtraction without a calculator multiplication and division without a calculator using positive and
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
The Euclidean Algorithm
The Euclidean Algorithm A METHOD FOR FINDING THE GREATEST COMMON DIVISOR FOR TWO LARGE NUMBERS To be successful using this method you have got to know how to divide. If this is something that you have
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
20-30 minutes, can be used within a longer activity
Locked-in 1 Age group successfully used with: Abilities assumed: Time: Size of group: 11 adult None 20-30 minutes, can be used within a longer activity anything from 2 to hundreds Focus What is an algorithm?
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Irrational Numbers. A. Rational Numbers 1. Before we discuss irrational numbers, it would probably be a good idea to define rational numbers.
Irrational Numbers A. Rational Numbers 1. Before we discuss irrational numbers, it would probably be a good idea to define rational numbers. Definition: Rational Number A rational number is a number that
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Chapter 4. Polynomial and Rational Functions. 4.1 Polynomial Functions and Their Graphs
Chapter 4. Polynomial and Rational Functions 4.1 Polynomial Functions and Their Graphs A polynomial function of degree n is a function of the form P = a n n + a n 1 n 1 + + a 2 2 + a 1 + a 0 Where a s
High Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
Correctness Preserving Transformations for Network Protocol Compilers
Correctness Preserving Transformations for Network Protocol Compilers Tommy M. McGuire and Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin October 31, 2001 Abstract Strong
IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS
Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE
FACTORS, PRIME NUMBERS, H.C.F. AND L.C.M.
Mathematics Revision Guides Factors, Prime Numbers, H.C.F. and L.C.M. Page 1 of 16 M.K. HOME TUITION Mathematics Revision Guides Level: GCSE Higher Tier FACTORS, PRIME NUMBERS, H.C.F. AND L.C.M. Version:
Chapter 9. Systems of Linear Equations
Chapter 9. Systems of Linear Equations 9.1. Solve Systems of Linear Equations by Graphing KYOTE Standards: CR 21; CA 13 In this section we discuss how to solve systems of two linear equations in two variables
OPTIMIZING VIRTUAL TAPE PERFORMANCE: IMPROVING EFFICIENCY WITH DISK STORAGE SYSTEMS
W H I T E P A P E R OPTIMIZING VIRTUAL TAPE PERFORMANCE: IMPROVING EFFICIENCY WITH DISK STORAGE SYSTEMS By: David J. Cuddihy Principal Engineer Embedded Software Group June, 2007 155 CrossPoint Parkway
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Acquisition Lesson Plan for the Concept, Topic or Skill---Not for the Day
Acquisition Lesson Plan Concept: Linear Systems Author Name(s): High-School Delaware Math Cadre Committee Grade: Ninth Grade Time Frame: Two 45 minute periods Pre-requisite(s): Write algebraic expressions
Quick Reference ebook
This file is distributed FREE OF CHARGE by the publisher Quick Reference Handbooks and the author. Quick Reference ebook Click on Contents or Index in the left panel to locate a topic. The math facts listed
Module 3: Floyd, Digital Fundamental
Module 3: Lecturer : Yongsheng Gao Room : Tech - 3.25 Email : [email protected] Structure : 6 lectures 1 Tutorial Assessment: 1 Laboratory (5%) 1 Test (20%) Textbook : Floyd, Digital Fundamental
The Crescent Primary School Calculation Policy
The Crescent Primary School Calculation Policy Examples of calculation methods for each year group and the progression between each method. January 2015 Our Calculation Policy This calculation policy has
F.IF.7b: Graph Root, Piecewise, Step, & Absolute Value Functions
F.IF.7b: Graph Root, Piecewise, Step, & Absolute Value Functions F.IF.7b: Graph Root, Piecewise, Step, & Absolute Value Functions Analyze functions using different representations. 7. Graph functions expressed
Indiana State Core Curriculum Standards updated 2009 Algebra I
Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and
Backup architectures in the modern data center. Author: Edmond van As [email protected] Competa IT b.v.
Backup architectures in the modern data center. Author: Edmond van As [email protected] Competa IT b.v. Existing backup methods Most companies see an explosive growth in the amount of data that they have
Grade 7/8 Math Circles Fall 2012 Factors and Primes
1 University of Waterloo Faculty of Mathematics Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Fall 2012 Factors and Primes Factors Definition: A factor of a number is a whole
LotServer Deployment Manual
LotServer Deployment Manual Maximizing Network Performance, Responsiveness and Availability DEPLOYMENT 1. Introduction LotServer is a ZetaTCP powered software product that can be installed on origin web/application
Graphical Integration Exercises Part Four: Reverse Graphical Integration
D-4603 1 Graphical Integration Exercises Part Four: Reverse Graphical Integration Prepared for the MIT System Dynamics in Education Project Under the Supervision of Dr. Jay W. Forrester by Laughton Stanley
Lecture - 4 Diode Rectifier Circuits
Basic Electronics (Module 1 Semiconductor Diodes) Dr. Chitralekha Mahanta Department of Electronics and Communication Engineering Indian Institute of Technology, Guwahati Lecture - 4 Diode Rectifier Circuits
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Zeros of a Polynomial Function
Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we
A Strategy for Teaching Finite Element Analysis to Undergraduate Students
A Strategy for Teaching Finite Element Analysis to Undergraduate Students Gordon Smyrell, School of Computing and Mathematics, University of Teesside The analytical power and design flexibility offered
/ Department of Mechanical Engineering. Manufacturing Networks. Warehouse storage: cases or layers? J.J.P. van Heur. Where innovation starts
/ Department of Mechanical Engineering Manufacturing Networks Warehouse storage: cases or layers? J.J.P. van Heur Where innovation starts Systems Engineering Group Department of Mechanical Engineering
The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc.
The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. Abstract Packet reordering in the Internet is a well-known phenomenon. As
4D WebSTAR 5.1: Performance Advantages
4D WebSTAR 5.1: Performance Advantages CJ Holmes, Director of Engineering, 4D WebSTAR OVERVIEW This white paper will discuss a variety of performance benefits of 4D WebSTAR 5.1 when compared to other Web
Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008
Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to
The Taxman Game. Robert K. Moniot September 5, 2003
The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game
SCALABILITY OF CONTEXTUAL GENERALIZATION PROCESSING USING PARTITIONING AND PARALLELIZATION. Marc-Olivier Briat, Jean-Luc Monnot, Edith M.
SCALABILITY OF CONTEXTUAL GENERALIZATION PROCESSING USING PARTITIONING AND PARALLELIZATION Abstract Marc-Olivier Briat, Jean-Luc Monnot, Edith M. Punt Esri, Redlands, California, USA [email protected], [email protected],
Core Maths C1. Revision Notes
Core Maths C Revision Notes November 0 Core Maths C Algebra... Indices... Rules of indices... Surds... 4 Simplifying surds... 4 Rationalising the denominator... 4 Quadratic functions... 4 Completing the
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
How do you compare numbers? On a number line, larger numbers are to the right and smaller numbers are to the left.
The verbal answers to all of the following questions should be memorized before completion of pre-algebra. Answers that are not memorized will hinder your ability to succeed in algebra 1. Number Basics
Numeracy and mathematics Experiences and outcomes
Numeracy and mathematics Experiences and outcomes My learning in mathematics enables me to: develop a secure understanding of the concepts, principles and processes of mathematics and apply these in different
2.3 Solving Equations Containing Fractions and Decimals
2. Solving Equations Containing Fractions and Decimals Objectives In this section, you will learn to: To successfully complete this section, you need to understand: Solve equations containing fractions
Unit 4: Exploring Math Patterns...106. Introduction...5. Unit 1: Visualizing Math...17. Unit 5: Exploring Probability...125
Introduction....................................5 WHAT IS MICROWORLDS EX, AND HOW CAN IT HELP ME IN THE MATH CLASSROOM?.................6 HOW TO USE THIS BOOK AND CD.....................10 CLASSROOM ENVIRONMENT..........................12
Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov
Lee 1 Primes in Sequences By: Jae Young Lee Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 2 Jae Young Lee MA341 Number Theory PRIMES IN SEQUENCES
Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem.
Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem. Solve word problems that call for addition of three whole numbers
Analysing Large Web Log Files in a Hadoop Distributed Cluster Environment
Analysing Large Files in a Hadoop Distributed Cluster Environment S Saravanan, B Uma Maheswari Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham,
Analysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
Zeros of Polynomial Functions
Review: Synthetic Division Find (x 2-5x - 5x 3 + x 4 ) (5 + x). Factor Theorem Solve 2x 3-5x 2 + x + 2 =0 given that 2 is a zero of f(x) = 2x 3-5x 2 + x + 2. Zeros of Polynomial Functions Introduction
Decimal Notations for Fractions Number and Operations Fractions /4.NF
Decimal Notations for Fractions Number and Operations Fractions /4.NF Domain: Cluster: Standard: 4.NF Number and Operations Fractions Understand decimal notation for fractions, and compare decimal fractions.
Hospital Facility Layout
Hospital Facility Layout Design Team Jamie Janvrin, Wael Leheta, Ilan Levy Fernando Munarriz, Nayib Neme Design Advisor Prof. Thomas Cullinane Sponsor Center of Health Organization Transformation, James
M 1310 4.1 Polynomial Functions 1
M 1310 4.1 Polynomial Functions 1 Polynomial Functions and Their Graphs Definition of a Polynomial Function Let n be a nonnegative integer and let a, a,..., a, a, a n n1 2 1 0, be real numbers, with a
Encrypting Network Traffic
Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have
Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting
Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting [email protected] All rights reserved. You have permission to copy and distribute the document as long as you make no changes
Saving Time & Money Across The Organization With Network Management Simulation
Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT
1 PORTrockIT 2 Executive summary IBM Spectrum Protect, previously known as IBM Tivoli Storage Manager or TSM, is the cornerstone of many large companies data protection strategies, offering a wide range
Problem of the Month: Once Upon a Time
Problem of the Month: The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards:
CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)
Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:
Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
