Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes
|
|
- Ada Elliott
- 7 years ago
- Views:
Transcription
1 Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University Capacity panning is indispensabe for future Internet providing QoS. Accurate dimensioning is especiay important when no per-fow signaing or contro exists. In this paper, we address the probem of ink dimensioning and Labe Switching Path (LSP) optimization for MPLS networks supporting DiffServ EF and BE traffic casses. The probem is formuated as an optimization probem, where the goa is to minimize the noninear tota ink cost, subject to the performance constraints of both expedited forward (EF) and best effort (BE) traffic casses. The variabes to be determined are the routing of LSPs carrying both EF and BE traffic, and the discrete capacities of the inks. We show that Lagrangean Reaxation and subgradient optimization methods can be used to effectivey sove this difficut probem. Computationa resuts show that the soution quaity is verifiaby good, whie the running time remains reasonabe on practica-sized networks. This is the first work on capacity panning for MPLS networks supporting mutipe DiffServ service casses. 1. Introduction Capacity panning is the process of designing and dimensioning networks to meet the expected demands on them. The nature of offering ony best effort (BE) service makes capacity panning a straightforward matter[1] in the current Internet. With the popuarization of e-commerce and new vaue-added services over IP, Quaity of service (QoS), the abiity of a network eement to have some eve of assurance that its traffic and service requirements can be satisfied, has become a must. Capacity panning wi be an imperative part of IP network management to support various quaities of service. Mutiprotoco abe switching (MPLS) [2] [3] and Differentiated services (DiffServ) [4] [5] are regarded as two key components for providing QoS in the Internet. MPLS uses a short, fixed-ength, ocay significant abe in the packet header to switch the packets. The initia abe is chosen and inserted by the ingress node of a MPLS domain, based on the information in the IP header, associated QoS, or any other poicies in effect. The intermediate nodes use the abe as an index to find the next hop and the corresponding new abe. A abe distribution protoco (LDP) propagates abe bindings among the nodes in order to estabish and tear down the abe switched path (LSP). The power of MPLS ies in the fact that the mappings between the packet fows and the LDPs are fexibe, which enabes IP network to be traffic engineered. Packets with the same source and destination addresses, which wi inevitaby foow the same path in the traditiona IP network, can be assigned different abes This work is supported by DARPA and AFOSR (under grants F and F ). The authors wish to thank Dr. Coe Smith and Dr. Micha Pioro for their hepfu comments and suggestions.
2 and subsequenty be sent to separate LSPs. LSPs can be setup expicity to optimize the resource utiization. The use of MPLS abes may aso provide faster switching than the norma IP forwarding agorithm. The essence of DiffServ is prioritization. In traditiona IP networks, the DiffServ Code Point (DSCP) fied in the headers of IP packets is marked at the edge of the network. Routers within the core of the network forward packets using different predefined per-hop behaviors (PHBs), according to their DSCP fied. In MPLS networks, the DSCP fied is not visibe to the core LSRs. The abe vaue and EXP fied (3bit experimenta fied) are used instead to determine the PHB scheduing cass (PSC) associated with packets [6]. Note that even with MPLS, the signaing and traffic contro are sti at the eve of fow aggregation. Since there is no per-fow signaing or contro, accurate dimensioning of the network is particuary important for achieving performance guarantees. To prepare for the depoyment of DiffServ in MPLS network, it is necessary to study the capacity panning probem in the context of mutipe cass-of-service networks. The IETF DiffServ working group has standardized two PHBs: Expedited Forwarding (EF) and Assured Forwarding (AF). The EF PHB [7] is defined as being such that the EF packets are guaranteed to receive service at or above a configured rate. The EF PHB can be used to buid a ow oss, ow atency, ow jitter, assured bandwidth, end-to-end service, through a DiffServ Domain. As has been discussed in [8], three expected major initia appications of QoS in the IP network are: 1) to distinguish mission critica or preferred customers; 2) to provide voice over IP service; 3) to enabe services competitive with eased ines. It can be easiy seen that the services based on the EF PHB are idea for a three of these appications. Because of its great vaue, the EF PHB is very ikey to be the first PHB to be put into action. The priority queue is widey considered to be the canonica way to impement the EF PHB, due to its abiity to offer a tighter deay bound and smoother service over reativey short time scaes [7]. AF PHBs are designed to reaize different forwarding assurances, or dropping preferences, for IP packets. AF PHBs are considered usefu to differentiate TCP traffic, where the performance is sensitive to the packet oss rate. However, simuations showed that the standard traffic contro methods of routers, such as RED(Random Eary Detection), do not satisfactoriy differentiate between AF PHBs and best effort traffic [9]. Since our approach requires a precise performance mode for optimization, we do not incude the AF traffic casses in this paper, due to the ack of a consensus on the impementation of the AF PHB. In this paper we address the probem of ink dimensioning and path optimization for MPLS networks providing DiffServ EF and BE traffic casses. The probem is formuated as an optimization probem, where we jointy seect the routes for edge to edge EF and BE user demand pairs, and assign a discrete capacity vaue for each ink. The goa is to minimize the tota ink cost, subject to the performance constraints of both EF and BE casses. The non-bifurcated (i.e., singe-path) routing mode is used for the EF cass as required by [7], so that the traffic from a singe EF demand pair wi foow the same LSP between the origin and the destination. Traffic in the BE cass is aowed to be spit across mutipe LSPs. Whie the performance constraint of EF traffic is ony represented by a bandwidth requirement, the performance constraint of the BE cass is characterized by the average deay in each ink. Queueing is modeed as M/G/1 strict priority queues. Our intention is to not ony define the capacity panning probem for MPLS network supporting DiffServ and discose feasibe soutions, but aso provide hepfu insights for capacity panning of other QoS architectures. Athough there is no previous work specificay targeting the dimensioning and routing probems for MPLS networks supporting Diffserv, there are many papers addressing the issues of QoS routing in genera. An extensive survey can be found in [10]. But because the routing and ink dimensioning probems are cosey reated to each other, it is inappropriate to separate them. There are extensive works deaing with traffic engineering issues in MPLS network, such
3 as [11] [12], or LSP setup and dimensioning probem [13]. However, in those works the ink capacity is fixed and not subject to be optimized. Papers where the routing and capacity assignment probems are treated simutaneousy incude [14] [15] [16][17] [18] [19] [20] [21]. Gera and Keinrock [14] presented heuristic methods based on the fow deviation agorithm [22]. Gavish and Neuman [15] formuated the probem as a non-inear integer programming probem, and proposed a Lagrangean reaxation based approach. [21] studied the network with eastic traffic and approximated the non-inear cost function to a piece-wise inear function. The networks studied in [14] [15] [21] ony incude one traffic cass, though. Medhi and Tipper [19] proposed four approaches for reconfigurabe ATM networks based on the Virtua Path concept. Even though ATM networks incude mutipe traffic casses, Medhi proposed a mode that assumes the deterministic mutipexing of different virtua paths, which resuts in inear performance constraints. We studied the probem of capacity panning for DiffServ networks in a previous work [23], where the MPLS protoco is not supported. Because of the absence of MPLS in [23], traffic demands with the same origin and destination wi be constrained to foow the same path. [23] ony considers the routing of EF demand pairs, whie the routing of both EF and BE casses are optimized in this paper. A noninear cost function is assumed in this paper, whie [23] uses a inear cost function. The nove aspect of our capacity panning probem is the fact that two traffic casses, EF and BE, with independent behaviors and performance requirements, share the same capacity resource, which resuts in a compex non-inear performance constraint. In addition to the noninear performance constraint, non-bifurcated routing and discrete ink capacity constraints dramaticay increase the degree of difficuty, and significanty imit the viabe soution approaches. The remainder of this paper is organized as foows. In Section 2, notation and detaied assumptions and modes are presented. The probem definition is given in Section 3. Section 4 shows a Lagrangean reaxation of the origina probem, and describes the subgradient procedure to sove the resuting dua probem. Section 5 presents some numerica resuts on the use of the method. The paper is concuded in Section Notation and Modes The foowing notation wi be used throughout the paper. K set of (both EF and BE) Origin-Destination (O-D) pairs 3 M k set of EF demands for O-D pair k, k K L set of inks in the network J k set of possibe candidate LSP paths for the O-D pair k, k K δj ink-path indicator; 1 if path j uses ink, j J k,k K, L, 0 otherwise α ef average arriva rate of an EF traffic demand m, m M k, k K ρ ef requested bandwidth of an EF traffic demand m, m M k, k K j EF path routing variabe; 1 if EF demand m, m M k, k K uses path j J k,0 otherwise. η tota requested bandwidth of EF demand on ink L average arriva rate of tota EF traffic demand on ink L kj BE path routing variabe: the portion of BE demand k uses candidate path j, j J k. kj can be any rea vaue between 0 and 1 αk be average arriva rate of a BE traffic demand, k K γ average arriva rate of extra BE traffic demand on ink, L average arriva rate of tota BE traffic demand on ink L β be
4 d d max g T u t ψ t average deay experienced by BE traffic on ink L maximum vaue of d aowed for ink L BE deay bound factor index of avaiabe ink types for ink L ink type decision variabe; 1 if ink type t is used for ink L, 0 other wise. size of the capacity of ink type t, t T ψ tota capacity of ink, L C t cost of the ink type t, t T, in ink C tota cost of ink, L ỹ,ỹ2 the first and second moment of packet size, (units: bits & bits 2 ) Link based formuation is used in this paper. The network is defined by (L,K,J k ). For an EF demand m, m M k, we differentiate between the average arriva rate, α ef, and the requested bandwidth, ρ ef. ρef is usuay a vaue between the average arriva rate and the peak rate. It is noted in [7] that the packets of the EF traffic cass beonging to the same fow shoud not be reordered. Consequenty, traffic from the same EF demand can not be separated into different LSPs. = α ef j δ j (1) k K m M k η = Γ({ρ ef }, {δ j}, { j }) ρ ef k K m M k j δ j (2) where Γ() is the EF demand mutipexing function (discussed further beow). The inequaity becomes equaity ony when there is no mutipexing gain. For each O-D pair k, ony one BE demand pair is defined. We aow an arbitrary portion of the BE demand to route through any candidate LSP. Therefore the aggregation of BE traffic woud potentiay improve the effectiveness of traffic engineering. Because of the connectioness nature of IP traffic, it is unikey that a the BE demand can be ceary mapped to specific O-D pairs. We introduce another variabe γ, which is the average arriva rate of extra BE traffic in ink besides that from the BE demand pairs {k : k K}. Thus the tota BE oad (average arriva rate) on ink is: β be = γ + k K α be k kj δj The capacity and the cost of ink, ψ and C respectivey, are: (3) ψ = t T u t ψ t, C = t T u t C t (4) There is no inear reationship assumed between C t and ψ t, therefore C is not necessariy a inear function of ψ. There are many discussions about the origina EF PHB [24] concerning the imits on EF utiization. Charny reported in [25] that the worst case deay jitter can be made arbitrariy arge using a FIFO queue uness the utiization of EF traffic was imited to a factor smaer than 1/(H 1), where H is the number of hops in the ongest path of the network. Other
5 impementations of packet scheduing may improve the upper bound on the EF utiization. The revised EF PHB [7], RFC 3246, introduces an error term E a for the treatment of the EF aggregate, which represents the aowed worst case deviation between the actua EF packet departure time and the idea departure time of the same packet. It is not immediatey cear whether this revision totay eiminates the constraint on the EF utiization, or simpy aows a trade-off between the EF utiization and the deay jitter. In this paper, we assume that the projected EF user demand η is much ess than the capacity of the ink, so there is no concern about this imit on the EF utiization, and the exact form of the mutipexing function Γ() does not have any impact on the fina soutions. How to specify the performance of BE traffic in the service eve agreement (SLA) is sti an active research topic. [26] suggests using the atency averaged over a arge time scae as the primary criteria for the performance of BE traffic in IP network service eve agreements (SLAs). We pick the average deay as the soe performance measurement for BE traffic in this paper. We evauate the performance of BE traffic on a per-ink basis (i.e., not end-to-end). The vaue ỹ ψ stands for the average transmission deay of packets. We use ỹ ψ as the basis for the ỹ deay bound. Let d max = g, where g ψ is a parameter defined by the network designer. The arger the vaue of g, the more bandwidth is required for ink, therefore the ower the ink utiization. We assume that the performance of BE traffic is satisfactory if d d max. Every router is modeed as a M/G/1 system with Poisson packet arrivas and an arbitrary packet ength distribution. Whie it has been suggested that the Internet traffic is ong-range dependent [27] and thus bursty, a recent work [28] shows that the network traffic can be smooth and Poisson-ike. [29] concudes, through both simuation and anaytic study, that even though the traffic exhibits bursty behavior at certain time scaes, the variance-mean reation is approximatey inear over arger time scaes, where the traffic can be treated as if it were smooth. Our choice of the Poisson arriva mode is justified because we are more concerned about the average BE performance over a arge time scae for capacity panning purposes. From the average queueing deay formua of the priority queue [30], we obtain the performance constraint for BE traffic: ỹ ψ + ỹ2 2ỹ ( ψ + β be )( ψ β be ) g ỹ (5) ψ In order to have a meaningfu soution for constraint (5), ψ > With some rearrangement, (5) yieds ψ f( ), where f( ) = + βbe 3. Probem Formuation 2 + ỹ2 ( + β be ) 4(ỹ) 2 (g 1) (2 + β be + + β be is required. ỹ 2 ( + β be ) 2(ỹ) 2 (g 1) )2 4β be (β be + ) The forma probem definition is presented beow. Given: K, M k,l,j k,α ef,ρef,αbe k,γ,δj,t,ψ t,c t Variabe: j,xbe kj,u t Goa: min C L Subject to: ψ f(βef) j =0/1, j =1 (6) (7)
6 kj =1 u t =0/1, t T u t =1 (8) (9) Constraint (6) ensures the performance of BE traffic. (9) imposes a discrete constraint on the ink capacities. (7) ensures that a traffic from one EF O-D pair wi foow one singe path. Because C is a non-decreasing function of and β be, this probem can be reformuated as: min C (10) L Subject to (6) (7) (8) (9) and: k K β be γ + k K αbe k m M k α ef j δ j (11) kj δ j (12) We refer to the probem defined by (10, 6, 7, 8, 9, 11, 12) as probem (P) in the rest of this paper. As can be seen from the above probem formuation, probem (P) is a non-inear integer programming probem, which is very difficut to optimize in genera. 4. Soution Method 4.1. Lagrangean Reaxation Lagrangean Reaxation is a common technique for muticommodity fow probems [31]. It has been successfuy appied to the capacity panning and routing probems [32] [15] [20] [18] [19]. We describe its use for our probem in this section. Using Lagrangean Reaxation, reax (11) and (12), and we have the Lagrangean as: L( j,xbe kj,u t,,λ be ) = C The Lagrangean dua probem (D) is then: max h(,λ be ),λ be 0 where: h(,λ be ) = min j,xbe kj,u t L( j,xbe ( k K λ be (β be γ k K kj,u t, Since,β be and j,xbe kj are independent variabes, min L = min = + min k K + k K α be k [ C λ be (β be γ )] + min k K α be k α ef j δ j) m M k kj δ j) (13) (14),λ be ) (15) α ef m M k j δ j λ be kjδ j (16) min[ C λ be (β be γ )] + k K min(α be k m M k min(α ef j δ j) λ be kjδ j) (17)
7 4.2. Soving the Subprobems Equation (17) shows that the probem (15) can be separated into the foowing three subprobems: Subprobem (i): min[ C λ be (β be Subject to: f(,β be γ )] (18), ψ ) d max (19) Subprobem (i) can be soved by the gradient projection method [33]. Subprobem (ii): min(α ef j δ j) (20) This is simpy a shortest path probem where the cost of ink is set to. The soution is to et j =1for j satisfying: where P (j) = P (j ) = min j (P (j)) (21) j δ j Subprobem (iii): min(α be k λ be kjδ j) (22) Simiar to Subprobem (ii), the soution is to set kj to 1 for j satisfying: Q(j ) = min(q(j)) j where Q(j) = λ be kjδ j (23) 4.3. Subgradient Method The subgradient method is used to update and λ be. Due to space imitations, the reader is referred to the standard reference [31], or to our earier work [23], for a detaied description of the procedure and the choices of parameters. At each iteration, the soution of j and kj for the prima probem (P) can be obtained from the soution of subprobem (ii) and(iii). The ink capacity ψ can be computed according to (6). Consequenty, the primary objective function can be derived. As the iteration proceeds, we store the best soution found so far for the prima probem (P). In this way, we are aways abe to obtain a feasibe soution. The maximum number of iterations is set to 400 in the impementation [23][31]s. The soution of the dua probem provides a ower bound for the prima probem. Therefore, the soution quaity can be assessed by the duaity gap, which is the difference between the soutions of probem (P) and probem (D). Note that because the duaity gap is aways no smaer than the actua difference between the obtained feasibe soution and the optima soution, it is a conservative estimate of the soution quaity.
8 5. Computationa Resuts In this section, we present numerica resuts based on experimentation. The objective of our experiment is to evauate the soution quaity and running time of the agorithm. The program is impemented in C and the computation is performed on a Pentium IV 2.4GHz PC with 512M memory, running Redhat Linux 7.2. The network topoogies are generated using the Georgia Tech Internetwork Topoogy Modes (GT-ITM) [34]. The ocations of origins and destinations are randomy seected. For each O-D pair, 10 candidate paths are cacuated using Yen s K-shortest path agorithm [35]. If not specified, EF and BE demand pairs are randomy generated with a uniform distribution from 0 Mbps to 10 Mbps, whie the average BE traffic oad of each ink is aso uniformy distributed from 30 Mbps to 100 Mbps. The number of EF demands for the same O-D pair is uniformy distributed from 1 to 10. The number of candidate ink types for ink is uniformy distributed from 5 to 10. The capacities of ink types are set to be mutipes of 45Mbps, whie the costs of the ink types for ink are randomy generated in such a way that the cost goes higher and the unit cost per Mbps goes down as the ink capacity increases. We use average packet size ỹ = 4396 bits and second moment of packet size ỹ2 = bits 2 for a the test cases. They are cacuated based on a traffic trace (AIX ) from the NLANR Passive Measurement and Anaysis project [36]. In practice, the BE deay bound factor, g, shoud be carefuy chosen to refect the actua traffic pattern, the desired BE performance, and the expected ink utiization. g is set to 2 for a inks in our experiments. The average ink utiization is about 60% when g equas 2. The agorithm was tested on 8 different sizes of networks, ranging from 10 nodes to 1000 nodes. Some detais of the network topoogies are isted in Tabe 1. Note that the O-D demand number shown in Tabe 1 incudes both EF and BE demands. To obtain confidence intervas, we generate 30 different topoogies for each network size, with the same number of nodes, inks, and O-D pairs. Duaity Gap = s p s d s d (24) The soution quaity is represented by the duaity gap, which is the percentage difference between the soution of the prima probem and the dua probem. s p and s d are the soutions of prima probem and dua probem respectivey. A vaue cose to zero means the soution is very cose to optima. Tabe 1 shows the running time and Duaity Gap (where a vaue of 0 means optima quaity) of various network sizes, expressed in terms of the 95% confidence intervas. In a 240 test cases, the agorithm converges without difficuty. It is easy to see from the tabe that the Lagrangean Tabe 1 Network topoogy information and experimenta resuts Node Number Link Number O-D Demand Number Duaity Gap (%) Running Time (sec) (0.15, 2.24) (3.79, 5.20) (0.01, 3.96) (15.84, 22.68) (0, 2.78) (75.40, 98.38) (0.16, 3.51) (207.55, ) (0, 2.15) ( , ) (0, 3.02) ( , ) (0, 2.41) ( , ) (0, 2.93) ( , )
9 Reaxation together with the subgradient method produces reasonabe resuts as the duaity gap is bounded by no more than 4%. Note the prima probem itsef is approximated when reducing the size of candidate path set for a possibe path set. But according to our experimenta resuts, more than 99% of the time, the fina soution is chosen among the 5 shortest candidate paths. Therefore, 10 candidate paths are considered adequate. Having more than 10 candidate paths wi have minima impact on the soution quaity, whie significanty increasing the running time. Given the arge number of networks being tested, we are confident that the soution shoud have good quaity for other sizes of networks. Because capacity panning is usuay performed on the time scae of weeks to months, the running time of the agorithm is not the most critica factor. But it is sti desirabe to know how the running time scaes up with respect to the network size. The size of the argest network evauated in this paper is representative of a arge network, and is much arger than the test cases used in most work on capacity panning. It is fair to predict that the running time of the agorithm wi stay reasonabe for practica sized networks. The other observation is that over 93% of the time, demands with the same O-D use ony singe candidate path. It means that when designing a east cost network, traffic engineering capabiity enabed by the MPLS protoco does not have a significant impact on the optima resut at the stage of network panning. This is understandabe, since traffic engineering is most usefu when the rea traffic fuctuates in an operationa network. Further investigation is required to have a better understanding of the effect. 6. Concusions and Future Directions In this paper, we addressed the probem of ink dimensioning and routing for MPLS networks supporting DiffServ EF and BE traffic. We formuate the probem as an optimization probem, where the tota ink cost is minimized, subject to the performance constraints of both EF and BE casses. The performance guarantee of BE traffic resuts in noninear constraints. The variabe here is the non-bifurcated (singe-path) routing of EF demands, mutipath routing of BE demands, and the discrete ink capacities. We presented a Lagrangean Reaxation-based method to effectivey decompose the origina probem. A subgradient method is used to find the optima Lagrangean mutipier. We investigated experimentay the soution quaity and running time of this approach. The resuts from our experiments indicate that our method produces soutions that are within a few percent of the optima soution, whie the running time stays reasonabe for practica sized networks. This paper presents a preiminary investigation of the capacity panning issue for MPLS networks supporting DiffServ. The novety of the probem presented in this paper is that it invoves two traffic casses, EF and BE, which have totay different forms of performance requirements. The probem formuation and soution approaches may be appied to other traffic casses and simiar network architectures. There are opportunities to extend this work in severa directions. We are working on a method where an empirica performance mode may be used, and thus AF traffic casses can be incorporated into the probem. We are aso investigating the adaptation of this technique to other type of networks, when there are mutipe casses of service. REFERENCES 1. S. Keshav, An Engineering Approach to Computer Networking, Addison-Wesey, D. A. et a., Requirement for traffic engineering over MPLS, IETF RFC E. Rosen, A. Viswanathan, R. Caon, Mutiprotoco abe switching architecture, IETF RFC S. Bake, et a., An Architecture for Differentiated Service, IETF RFC 2475.
10 5. K. Nichos, V. Jacobson, L. Zhang, A Two-bit Differentiated Services Architecture for the Internet, IETF RFC L. Wu, B. David, etc, Muti-Protoco abe switching MPLS support of differentiated services, IETF RFC B. David, A. Charny, et A., An Expedited Forwarding PHB, IETF RFC B. E. Carpenter, K. Nichos, Differentiated services in the internet, Proceedings of the IEEE 90 (9) (2002) S. Ano, T. Hasegawa, N. Decre, Experimenta TCP performance evauation on diffserv AF PHBs over ATM SBR service, Teecommunication Systems 19 (3-4) (2002) S. Chen, K. Nahrstedt, An overview of quaity-of-service routing for the next generation high-speed networks: Probems and soutions, IEEE Network Magazine 12 (1998) A. Ewaid, C. Jin, S. Low, I. Widjaja, MATE: MPLS adaptive traffic engineering (2001), in: IEEE Infocom 01, Vo. 3, IEEE, Anchorage, Aaska, 2001, pp M. Kodiaam, T. Lakshman, Minimum interference routing with appications to MPLS traffic engineering, in: IEEE Infocom 00, Vo. 2, IEEE, Te Aviv, Israe, 2000, pp I. Akyidiz, T. Anjai, L. Chen, J. de Oiveira, C. Scogio, A. Sciuto, J. Smith, G. Uh, A new traffic engineering manager for DiffServ/MPLS networks: Design and impementation on an IP QoS testbed, Computer Communications 26 (2003) M. Gera, L. Keinrock, On the topoogica design of distributed computer networks, IEEE Transactions on Communications COM-25 (1) (1977) B. Gavish, I. Neuman, A System for Routing and Capacity Assignment in Computer Networks, IEEE Transaction on Communications 37 (4) (1989) H. Gersht, R. Weihmayer, Joint Optimization of Data Network Design and Faciity Location, IEEE Journa on Seected Areas in Communications 8 (9) (1990) T. Ng, D. Hoang, Joint Optimization of Capacity and Fow Assignment in a Packet-switched Communication Network, IEEE Transaction on Communications COM-35 (2) (1987) D. Medhi, Muti-Hour, Muti-Traffic Cass Network Design for Virtua Path-based Dynamicay Reconfigurabe Wide-Area ATM Networks, IEEE/ACM Transactions on Networking 3 (6) (1995) D. Medhi, D. Tipper, Some Approaches to Soving a Mutihour Broadband Network Capacity Design Probem with Singe-path Routing, Teecommunication Systems 13 (2-4) (2000) A. Amiri, A System for the Design of Packet-Switched Communication Networks with Economic Tradeoffs, Computer Communications 21 (18) (1998) G. Maicsko, G. Fodor, M. Pioro, Link capacity dimensioning and path optimization for networks supporting eastic services, in: IEEE ICC 2002, Vo. 4, 2002, pp L. Fratta, M. Gera, L. Keinrock, The Fow Deviation Method: An Approach to Store-and-Forward Communication Network Design, Networks 3 (2) (1973) K. Wu, D. S. Reeves, Capacity panning of DiffServ networks with Best-Effort and Expedited Forwarding traffic, in: To appear in IEEE 2003 Internationa Conference on Communications, Anchorage, Aaska, V.Jacobson, K.Nichos, K.Poduri, An Expedited Forwarding PHB, IETF RFC A. Charny, J.-Y. L. Boudec, Deay Bounds in Network with Aggregate Scheduing, in: First Internationa Workshop on Quaity of Future Internet Service, Berin, Germany, 2000, pp J. Martin, A. Nisson, On service eve agree ments for IP networks, in: IEEE Infocom 02, IEEE, New York, V. Paxson, S. Foyd, Wide-area traffic: The faiure of poisson modeing, in: ACM SIGCOMM 94, London, R. Morris, D. Lin, Variance of aggregated web traffic, in: IEEE Infocom 00, IEEE, Te Aviv, Israe, 2000, pp X. Tian, J. Wu, C. Ji, A unified framework for understanding network traffic using independent waveet modes, in: IEEE Infocom 02, Vo. 1, IEEE, 2002, pp L. Keinrock, Queueing Systems, Voume II: Computer Appication, Wiey Interscience, R. Ahuja, T. Magnanti, J. Orin, Network Fows, Theory, Agorithms and Appications, Prentice Ha, New Jersey, B. Gavish, I. Neuman, Capacity and Fow Assignment in Large Computer Networks, in: IEEE Infocom 86, IEEE, 1986, pp D. Bertsekas, R. Gaager, Data Networks, Prentice Ha, Engewood Ciffs, NJ, E. Zegura, K. Cavert, M. J. Donahoo, A Quantitative Comparison of Graph-based Modes for Internet Topoogy, IEEE/ACM Transactions on Networks 5 (6) (1997) J. Yen, Finding the K Shortest Loopess Paths in a Network, Management Science 17 (11) (1971) NLANR passive measurement and anaysis project, (2001).
Capacity Planning of Survivable MPLS Networks Supporting DiffServ
Capacity Panning of Survivabe MPLS Networks Supporting DiffServ Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University kwu@unity.ncsu.edu,
More informationPricing Internet Services With Multiple Providers
Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationGREEN: An Active Queue Management Algorithm for a Self Managed Internet
: An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of
More informationSimultaneous Routing and Power Allocation in CDMA Wireless Data Networks
Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationA Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
More informationCooperative Content Distribution and Traffic Engineering in an ISP Network
Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationPricing and Revenue Sharing Strategies for Internet Service Providers
Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu
More informationTOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper
TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationGreenTE: Power-Aware Traffic Engineering
GreenTE: Power-Aware Traffic Engineering Mingui Zhang zmg6@mais.tsinghua.edu.cn Cheng Yi yic@emai.arizona.edu Bin Liu iub@tsinghua.edu.cn Beichuan Zhang bzhang@arizona.edu Abstract Current network infrastructures
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationMaintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
More informationTCP/IP Gateways and Firewalls
Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and
More informationFace Hallucination and Recognition
Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.
More informationWIRELESS Mesh Networks (WMNs) have recently attracted
3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing
More informationComparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time
Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen
More informationFRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy
FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,
More informationMinimizing the Total Weighted Completion Time of Coflows in Datacenter Networks
Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications
More informationAn FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332
More informationOnline Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations
Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationAn Idiot s guide to Support vector machines (SVMs)
An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning
More informationCERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society
CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision
More informationLoad Balancing in Distributed Web Server Systems with Partial Document Replication *
Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong
More informationRicoh Healthcare. Process Optimized. Healthcare Simplified.
Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove
More informationSELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationA Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities
A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,
More informationOrder-to-Cash Processes
TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes
More informationA train dispatching model based on fuzzy passenger demand forecasting during holidays
Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand
More informationNetwork/Communicational Vulnerability
Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security
More information500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013
500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We
More informationCONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,
More informationAPPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC
Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages
More informationScheduling in Multi-Channel Wireless Networks
Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona
More informationLADDER SAFETY Table of Contents
Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3
More informationNormalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies
ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database
More informationWINMAG Graphics Management System
SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic
More informationSNMP Reference Guide for Avaya Communication Manager
SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this
More information3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68
68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected
More informationLeadership & Management Certificate Programs
MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J
More informationLeakage detection in water pipe networks using a Bayesian probabilistic framework
Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*
More informationFigure 1. A Simple Centrifugal Speed Governor.
ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems
More informationFixed income managers: evolution or revolution
Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate
More informationThe Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers
he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder
More information(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006
(19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationApplication-Aware Data Collection in Wireless Sensor Networks
Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,
More informationBite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
More informationLoad Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective
Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University
More informationStrengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India
Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,
More informationBetting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing
More informationNCH Software Warp Speed PC Tune-up Software
NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed
More informationElectronic Commerce Research and Applications
Eectronic Commerce Research and Appications 8 (2009) 63 77 Contents ists avaiabe at ScienceDirect Eectronic Commerce Research and Appications journa homepage: www.esevier.com/ocate/ecra Forecasting market
More informationTraffic classification-based spam filter
Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,
More informationHuman Capital & Human Resources Certificate Programs
MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J
More informationWide-Area Traffic Management for. Cloud Services
Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance
More informationVendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
More informationPREFACE. Comptroller General of the United States. Page i
- I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex
More informationA Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
More informationAvaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationExperiences with Class of Service (CoS) Translations in IP/MPLS Networks
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering
More informationWHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization
Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the
More informationA Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1
A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,
More informationProgram Management Seminar
Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.
More informationRicoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.
Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment
More informationChapter 2 Traditional Software Development
Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,
More informationPacket Classification with Network Traffic Statistics
Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on
More informationInternal Control. Guidance for Directors on the Combined Code
Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London
More informationTelephony Trainers with Discovery Software
Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System
More informationPrecise assessment of partial discharge in underground MV/HV power cables and terminations
QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey
More informationDesign of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation
Design of Foow-Up Experiments for Improving Mode Discrimination and Parameter Estimation Szu Hui Ng 1 Stephen E. Chick 2 Nationa University of Singapore, 10 Kent Ridge Crescent, Singapore 119260. Technoogy
More informationCSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu
CSCI 8260 Spring 2016 Computer Network Attacks and Defenses Syabus Prof. Roberto Perdisci perdisci@cs.uga.edu Who is this course for? Open to graduate students ony Students who compete this course successfuy
More informationMean-field Dynamics of Load-Balancing Networks with General Service Distributions
Mean-fied Dynamics of Load-Baancing Networks with Genera Service Distributions Reza Aghajani 1, Xingjie Li 2, and Kavita Ramanan 1 1 Division of Appied Mathematics, Brown University, Providence, RI, USA.
More informationILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters
ILP Formuation and K-Shortest Path Heuristic for the RWA Probem with Aocation of Waveength Converters Karcius D.R. Assis 1, A. C. B. Soares, Wiiam F. Giozza and Heio Wadman 1 UEFS- State University of
More informationSQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems
CSE 532 Theory of Database Systems Lecture 03 SQL Ichu Yoon Assistant Professor State University of New York, Korea Adapted from book authors sides SQL Language for describing database schema & operations
More informationTake me to your leader! Online Optimization of Distributed Storage Configurations
Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com
More informationMapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis
Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa
More informationRisk Assessment Methods and Application in the Construction Projects
Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,
More informationModeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web
4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open
More informationThe eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without
More informationAN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE
AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory
More informationMeasuring operational risk in financial institutions
Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and
More informationDOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS
DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS TABLE OF CONTENTS INTRODUCTION... 1 GOVERNANCE... 1 COMMONLY PURCHASED GOODS AND SERVICES... 1 HOW TO REGISTER YOUR COMPANY...
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationTERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.
This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate
More informationCapacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis
Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,
More informationMICROSOFT DYNAMICS CRM
biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency
More informationA New Statistical Approach to Network Anomaly Detection
A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit
More informationPresented at the 107th Convention 1999 September 24-27 New York
Room Simuation for Mutichanne Fim and Music 4993 (B-2) Knud Bank Christensen and Thomas Lund TC Eectronic A/S DK-8240 Risskov, Denmark Presented at the 107th Convention 1999 September 24-27 New York This
More informationLife Contingencies Study Note for CAS Exam S. Tom Struppeck
Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or
More informationMigrating and Managing Dynamic, Non-Textua Content
Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,
More informationQualifications, professional development and probation
UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,
More informationNCH Software FlexiServer
NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before
More information