Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes

Size: px
Start display at page:

Download "Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes"

Transcription

1 Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University Capacity panning is indispensabe for future Internet providing QoS. Accurate dimensioning is especiay important when no per-fow signaing or contro exists. In this paper, we address the probem of ink dimensioning and Labe Switching Path (LSP) optimization for MPLS networks supporting DiffServ EF and BE traffic casses. The probem is formuated as an optimization probem, where the goa is to minimize the noninear tota ink cost, subject to the performance constraints of both expedited forward (EF) and best effort (BE) traffic casses. The variabes to be determined are the routing of LSPs carrying both EF and BE traffic, and the discrete capacities of the inks. We show that Lagrangean Reaxation and subgradient optimization methods can be used to effectivey sove this difficut probem. Computationa resuts show that the soution quaity is verifiaby good, whie the running time remains reasonabe on practica-sized networks. This is the first work on capacity panning for MPLS networks supporting mutipe DiffServ service casses. 1. Introduction Capacity panning is the process of designing and dimensioning networks to meet the expected demands on them. The nature of offering ony best effort (BE) service makes capacity panning a straightforward matter[1] in the current Internet. With the popuarization of e-commerce and new vaue-added services over IP, Quaity of service (QoS), the abiity of a network eement to have some eve of assurance that its traffic and service requirements can be satisfied, has become a must. Capacity panning wi be an imperative part of IP network management to support various quaities of service. Mutiprotoco abe switching (MPLS) [2] [3] and Differentiated services (DiffServ) [4] [5] are regarded as two key components for providing QoS in the Internet. MPLS uses a short, fixed-ength, ocay significant abe in the packet header to switch the packets. The initia abe is chosen and inserted by the ingress node of a MPLS domain, based on the information in the IP header, associated QoS, or any other poicies in effect. The intermediate nodes use the abe as an index to find the next hop and the corresponding new abe. A abe distribution protoco (LDP) propagates abe bindings among the nodes in order to estabish and tear down the abe switched path (LSP). The power of MPLS ies in the fact that the mappings between the packet fows and the LDPs are fexibe, which enabes IP network to be traffic engineered. Packets with the same source and destination addresses, which wi inevitaby foow the same path in the traditiona IP network, can be assigned different abes This work is supported by DARPA and AFOSR (under grants F and F ). The authors wish to thank Dr. Coe Smith and Dr. Micha Pioro for their hepfu comments and suggestions.

2 and subsequenty be sent to separate LSPs. LSPs can be setup expicity to optimize the resource utiization. The use of MPLS abes may aso provide faster switching than the norma IP forwarding agorithm. The essence of DiffServ is prioritization. In traditiona IP networks, the DiffServ Code Point (DSCP) fied in the headers of IP packets is marked at the edge of the network. Routers within the core of the network forward packets using different predefined per-hop behaviors (PHBs), according to their DSCP fied. In MPLS networks, the DSCP fied is not visibe to the core LSRs. The abe vaue and EXP fied (3bit experimenta fied) are used instead to determine the PHB scheduing cass (PSC) associated with packets [6]. Note that even with MPLS, the signaing and traffic contro are sti at the eve of fow aggregation. Since there is no per-fow signaing or contro, accurate dimensioning of the network is particuary important for achieving performance guarantees. To prepare for the depoyment of DiffServ in MPLS network, it is necessary to study the capacity panning probem in the context of mutipe cass-of-service networks. The IETF DiffServ working group has standardized two PHBs: Expedited Forwarding (EF) and Assured Forwarding (AF). The EF PHB [7] is defined as being such that the EF packets are guaranteed to receive service at or above a configured rate. The EF PHB can be used to buid a ow oss, ow atency, ow jitter, assured bandwidth, end-to-end service, through a DiffServ Domain. As has been discussed in [8], three expected major initia appications of QoS in the IP network are: 1) to distinguish mission critica or preferred customers; 2) to provide voice over IP service; 3) to enabe services competitive with eased ines. It can be easiy seen that the services based on the EF PHB are idea for a three of these appications. Because of its great vaue, the EF PHB is very ikey to be the first PHB to be put into action. The priority queue is widey considered to be the canonica way to impement the EF PHB, due to its abiity to offer a tighter deay bound and smoother service over reativey short time scaes [7]. AF PHBs are designed to reaize different forwarding assurances, or dropping preferences, for IP packets. AF PHBs are considered usefu to differentiate TCP traffic, where the performance is sensitive to the packet oss rate. However, simuations showed that the standard traffic contro methods of routers, such as RED(Random Eary Detection), do not satisfactoriy differentiate between AF PHBs and best effort traffic [9]. Since our approach requires a precise performance mode for optimization, we do not incude the AF traffic casses in this paper, due to the ack of a consensus on the impementation of the AF PHB. In this paper we address the probem of ink dimensioning and path optimization for MPLS networks providing DiffServ EF and BE traffic casses. The probem is formuated as an optimization probem, where we jointy seect the routes for edge to edge EF and BE user demand pairs, and assign a discrete capacity vaue for each ink. The goa is to minimize the tota ink cost, subject to the performance constraints of both EF and BE casses. The non-bifurcated (i.e., singe-path) routing mode is used for the EF cass as required by [7], so that the traffic from a singe EF demand pair wi foow the same LSP between the origin and the destination. Traffic in the BE cass is aowed to be spit across mutipe LSPs. Whie the performance constraint of EF traffic is ony represented by a bandwidth requirement, the performance constraint of the BE cass is characterized by the average deay in each ink. Queueing is modeed as M/G/1 strict priority queues. Our intention is to not ony define the capacity panning probem for MPLS network supporting DiffServ and discose feasibe soutions, but aso provide hepfu insights for capacity panning of other QoS architectures. Athough there is no previous work specificay targeting the dimensioning and routing probems for MPLS networks supporting Diffserv, there are many papers addressing the issues of QoS routing in genera. An extensive survey can be found in [10]. But because the routing and ink dimensioning probems are cosey reated to each other, it is inappropriate to separate them. There are extensive works deaing with traffic engineering issues in MPLS network, such

3 as [11] [12], or LSP setup and dimensioning probem [13]. However, in those works the ink capacity is fixed and not subject to be optimized. Papers where the routing and capacity assignment probems are treated simutaneousy incude [14] [15] [16][17] [18] [19] [20] [21]. Gera and Keinrock [14] presented heuristic methods based on the fow deviation agorithm [22]. Gavish and Neuman [15] formuated the probem as a non-inear integer programming probem, and proposed a Lagrangean reaxation based approach. [21] studied the network with eastic traffic and approximated the non-inear cost function to a piece-wise inear function. The networks studied in [14] [15] [21] ony incude one traffic cass, though. Medhi and Tipper [19] proposed four approaches for reconfigurabe ATM networks based on the Virtua Path concept. Even though ATM networks incude mutipe traffic casses, Medhi proposed a mode that assumes the deterministic mutipexing of different virtua paths, which resuts in inear performance constraints. We studied the probem of capacity panning for DiffServ networks in a previous work [23], where the MPLS protoco is not supported. Because of the absence of MPLS in [23], traffic demands with the same origin and destination wi be constrained to foow the same path. [23] ony considers the routing of EF demand pairs, whie the routing of both EF and BE casses are optimized in this paper. A noninear cost function is assumed in this paper, whie [23] uses a inear cost function. The nove aspect of our capacity panning probem is the fact that two traffic casses, EF and BE, with independent behaviors and performance requirements, share the same capacity resource, which resuts in a compex non-inear performance constraint. In addition to the noninear performance constraint, non-bifurcated routing and discrete ink capacity constraints dramaticay increase the degree of difficuty, and significanty imit the viabe soution approaches. The remainder of this paper is organized as foows. In Section 2, notation and detaied assumptions and modes are presented. The probem definition is given in Section 3. Section 4 shows a Lagrangean reaxation of the origina probem, and describes the subgradient procedure to sove the resuting dua probem. Section 5 presents some numerica resuts on the use of the method. The paper is concuded in Section Notation and Modes The foowing notation wi be used throughout the paper. K set of (both EF and BE) Origin-Destination (O-D) pairs 3 M k set of EF demands for O-D pair k, k K L set of inks in the network J k set of possibe candidate LSP paths for the O-D pair k, k K δj ink-path indicator; 1 if path j uses ink, j J k,k K, L, 0 otherwise α ef average arriva rate of an EF traffic demand m, m M k, k K ρ ef requested bandwidth of an EF traffic demand m, m M k, k K j EF path routing variabe; 1 if EF demand m, m M k, k K uses path j J k,0 otherwise. η tota requested bandwidth of EF demand on ink L average arriva rate of tota EF traffic demand on ink L kj BE path routing variabe: the portion of BE demand k uses candidate path j, j J k. kj can be any rea vaue between 0 and 1 αk be average arriva rate of a BE traffic demand, k K γ average arriva rate of extra BE traffic demand on ink, L average arriva rate of tota BE traffic demand on ink L β be

4 d d max g T u t ψ t average deay experienced by BE traffic on ink L maximum vaue of d aowed for ink L BE deay bound factor index of avaiabe ink types for ink L ink type decision variabe; 1 if ink type t is used for ink L, 0 other wise. size of the capacity of ink type t, t T ψ tota capacity of ink, L C t cost of the ink type t, t T, in ink C tota cost of ink, L ỹ,ỹ2 the first and second moment of packet size, (units: bits & bits 2 ) Link based formuation is used in this paper. The network is defined by (L,K,J k ). For an EF demand m, m M k, we differentiate between the average arriva rate, α ef, and the requested bandwidth, ρ ef. ρef is usuay a vaue between the average arriva rate and the peak rate. It is noted in [7] that the packets of the EF traffic cass beonging to the same fow shoud not be reordered. Consequenty, traffic from the same EF demand can not be separated into different LSPs. = α ef j δ j (1) k K m M k η = Γ({ρ ef }, {δ j}, { j }) ρ ef k K m M k j δ j (2) where Γ() is the EF demand mutipexing function (discussed further beow). The inequaity becomes equaity ony when there is no mutipexing gain. For each O-D pair k, ony one BE demand pair is defined. We aow an arbitrary portion of the BE demand to route through any candidate LSP. Therefore the aggregation of BE traffic woud potentiay improve the effectiveness of traffic engineering. Because of the connectioness nature of IP traffic, it is unikey that a the BE demand can be ceary mapped to specific O-D pairs. We introduce another variabe γ, which is the average arriva rate of extra BE traffic in ink besides that from the BE demand pairs {k : k K}. Thus the tota BE oad (average arriva rate) on ink is: β be = γ + k K α be k kj δj The capacity and the cost of ink, ψ and C respectivey, are: (3) ψ = t T u t ψ t, C = t T u t C t (4) There is no inear reationship assumed between C t and ψ t, therefore C is not necessariy a inear function of ψ. There are many discussions about the origina EF PHB [24] concerning the imits on EF utiization. Charny reported in [25] that the worst case deay jitter can be made arbitrariy arge using a FIFO queue uness the utiization of EF traffic was imited to a factor smaer than 1/(H 1), where H is the number of hops in the ongest path of the network. Other

5 impementations of packet scheduing may improve the upper bound on the EF utiization. The revised EF PHB [7], RFC 3246, introduces an error term E a for the treatment of the EF aggregate, which represents the aowed worst case deviation between the actua EF packet departure time and the idea departure time of the same packet. It is not immediatey cear whether this revision totay eiminates the constraint on the EF utiization, or simpy aows a trade-off between the EF utiization and the deay jitter. In this paper, we assume that the projected EF user demand η is much ess than the capacity of the ink, so there is no concern about this imit on the EF utiization, and the exact form of the mutipexing function Γ() does not have any impact on the fina soutions. How to specify the performance of BE traffic in the service eve agreement (SLA) is sti an active research topic. [26] suggests using the atency averaged over a arge time scae as the primary criteria for the performance of BE traffic in IP network service eve agreements (SLAs). We pick the average deay as the soe performance measurement for BE traffic in this paper. We evauate the performance of BE traffic on a per-ink basis (i.e., not end-to-end). The vaue ỹ ψ stands for the average transmission deay of packets. We use ỹ ψ as the basis for the ỹ deay bound. Let d max = g, where g ψ is a parameter defined by the network designer. The arger the vaue of g, the more bandwidth is required for ink, therefore the ower the ink utiization. We assume that the performance of BE traffic is satisfactory if d d max. Every router is modeed as a M/G/1 system with Poisson packet arrivas and an arbitrary packet ength distribution. Whie it has been suggested that the Internet traffic is ong-range dependent [27] and thus bursty, a recent work [28] shows that the network traffic can be smooth and Poisson-ike. [29] concudes, through both simuation and anaytic study, that even though the traffic exhibits bursty behavior at certain time scaes, the variance-mean reation is approximatey inear over arger time scaes, where the traffic can be treated as if it were smooth. Our choice of the Poisson arriva mode is justified because we are more concerned about the average BE performance over a arge time scae for capacity panning purposes. From the average queueing deay formua of the priority queue [30], we obtain the performance constraint for BE traffic: ỹ ψ + ỹ2 2ỹ ( ψ + β be )( ψ β be ) g ỹ (5) ψ In order to have a meaningfu soution for constraint (5), ψ > With some rearrangement, (5) yieds ψ f( ), where f( ) = + βbe 3. Probem Formuation 2 + ỹ2 ( + β be ) 4(ỹ) 2 (g 1) (2 + β be + + β be is required. ỹ 2 ( + β be ) 2(ỹ) 2 (g 1) )2 4β be (β be + ) The forma probem definition is presented beow. Given: K, M k,l,j k,α ef,ρef,αbe k,γ,δj,t,ψ t,c t Variabe: j,xbe kj,u t Goa: min C L Subject to: ψ f(βef) j =0/1, j =1 (6) (7)

6 kj =1 u t =0/1, t T u t =1 (8) (9) Constraint (6) ensures the performance of BE traffic. (9) imposes a discrete constraint on the ink capacities. (7) ensures that a traffic from one EF O-D pair wi foow one singe path. Because C is a non-decreasing function of and β be, this probem can be reformuated as: min C (10) L Subject to (6) (7) (8) (9) and: k K β be γ + k K αbe k m M k α ef j δ j (11) kj δ j (12) We refer to the probem defined by (10, 6, 7, 8, 9, 11, 12) as probem (P) in the rest of this paper. As can be seen from the above probem formuation, probem (P) is a non-inear integer programming probem, which is very difficut to optimize in genera. 4. Soution Method 4.1. Lagrangean Reaxation Lagrangean Reaxation is a common technique for muticommodity fow probems [31]. It has been successfuy appied to the capacity panning and routing probems [32] [15] [20] [18] [19]. We describe its use for our probem in this section. Using Lagrangean Reaxation, reax (11) and (12), and we have the Lagrangean as: L( j,xbe kj,u t,,λ be ) = C The Lagrangean dua probem (D) is then: max h(,λ be ),λ be 0 where: h(,λ be ) = min j,xbe kj,u t L( j,xbe ( k K λ be (β be γ k K kj,u t, Since,β be and j,xbe kj are independent variabes, min L = min = + min k K + k K α be k [ C λ be (β be γ )] + min k K α be k α ef j δ j) m M k kj δ j) (13) (14),λ be ) (15) α ef m M k j δ j λ be kjδ j (16) min[ C λ be (β be γ )] + k K min(α be k m M k min(α ef j δ j) λ be kjδ j) (17)

7 4.2. Soving the Subprobems Equation (17) shows that the probem (15) can be separated into the foowing three subprobems: Subprobem (i): min[ C λ be (β be Subject to: f(,β be γ )] (18), ψ ) d max (19) Subprobem (i) can be soved by the gradient projection method [33]. Subprobem (ii): min(α ef j δ j) (20) This is simpy a shortest path probem where the cost of ink is set to. The soution is to et j =1for j satisfying: where P (j) = P (j ) = min j (P (j)) (21) j δ j Subprobem (iii): min(α be k λ be kjδ j) (22) Simiar to Subprobem (ii), the soution is to set kj to 1 for j satisfying: Q(j ) = min(q(j)) j where Q(j) = λ be kjδ j (23) 4.3. Subgradient Method The subgradient method is used to update and λ be. Due to space imitations, the reader is referred to the standard reference [31], or to our earier work [23], for a detaied description of the procedure and the choices of parameters. At each iteration, the soution of j and kj for the prima probem (P) can be obtained from the soution of subprobem (ii) and(iii). The ink capacity ψ can be computed according to (6). Consequenty, the primary objective function can be derived. As the iteration proceeds, we store the best soution found so far for the prima probem (P). In this way, we are aways abe to obtain a feasibe soution. The maximum number of iterations is set to 400 in the impementation [23][31]s. The soution of the dua probem provides a ower bound for the prima probem. Therefore, the soution quaity can be assessed by the duaity gap, which is the difference between the soutions of probem (P) and probem (D). Note that because the duaity gap is aways no smaer than the actua difference between the obtained feasibe soution and the optima soution, it is a conservative estimate of the soution quaity.

8 5. Computationa Resuts In this section, we present numerica resuts based on experimentation. The objective of our experiment is to evauate the soution quaity and running time of the agorithm. The program is impemented in C and the computation is performed on a Pentium IV 2.4GHz PC with 512M memory, running Redhat Linux 7.2. The network topoogies are generated using the Georgia Tech Internetwork Topoogy Modes (GT-ITM) [34]. The ocations of origins and destinations are randomy seected. For each O-D pair, 10 candidate paths are cacuated using Yen s K-shortest path agorithm [35]. If not specified, EF and BE demand pairs are randomy generated with a uniform distribution from 0 Mbps to 10 Mbps, whie the average BE traffic oad of each ink is aso uniformy distributed from 30 Mbps to 100 Mbps. The number of EF demands for the same O-D pair is uniformy distributed from 1 to 10. The number of candidate ink types for ink is uniformy distributed from 5 to 10. The capacities of ink types are set to be mutipes of 45Mbps, whie the costs of the ink types for ink are randomy generated in such a way that the cost goes higher and the unit cost per Mbps goes down as the ink capacity increases. We use average packet size ỹ = 4396 bits and second moment of packet size ỹ2 = bits 2 for a the test cases. They are cacuated based on a traffic trace (AIX ) from the NLANR Passive Measurement and Anaysis project [36]. In practice, the BE deay bound factor, g, shoud be carefuy chosen to refect the actua traffic pattern, the desired BE performance, and the expected ink utiization. g is set to 2 for a inks in our experiments. The average ink utiization is about 60% when g equas 2. The agorithm was tested on 8 different sizes of networks, ranging from 10 nodes to 1000 nodes. Some detais of the network topoogies are isted in Tabe 1. Note that the O-D demand number shown in Tabe 1 incudes both EF and BE demands. To obtain confidence intervas, we generate 30 different topoogies for each network size, with the same number of nodes, inks, and O-D pairs. Duaity Gap = s p s d s d (24) The soution quaity is represented by the duaity gap, which is the percentage difference between the soution of the prima probem and the dua probem. s p and s d are the soutions of prima probem and dua probem respectivey. A vaue cose to zero means the soution is very cose to optima. Tabe 1 shows the running time and Duaity Gap (where a vaue of 0 means optima quaity) of various network sizes, expressed in terms of the 95% confidence intervas. In a 240 test cases, the agorithm converges without difficuty. It is easy to see from the tabe that the Lagrangean Tabe 1 Network topoogy information and experimenta resuts Node Number Link Number O-D Demand Number Duaity Gap (%) Running Time (sec) (0.15, 2.24) (3.79, 5.20) (0.01, 3.96) (15.84, 22.68) (0, 2.78) (75.40, 98.38) (0.16, 3.51) (207.55, ) (0, 2.15) ( , ) (0, 3.02) ( , ) (0, 2.41) ( , ) (0, 2.93) ( , )

9 Reaxation together with the subgradient method produces reasonabe resuts as the duaity gap is bounded by no more than 4%. Note the prima probem itsef is approximated when reducing the size of candidate path set for a possibe path set. But according to our experimenta resuts, more than 99% of the time, the fina soution is chosen among the 5 shortest candidate paths. Therefore, 10 candidate paths are considered adequate. Having more than 10 candidate paths wi have minima impact on the soution quaity, whie significanty increasing the running time. Given the arge number of networks being tested, we are confident that the soution shoud have good quaity for other sizes of networks. Because capacity panning is usuay performed on the time scae of weeks to months, the running time of the agorithm is not the most critica factor. But it is sti desirabe to know how the running time scaes up with respect to the network size. The size of the argest network evauated in this paper is representative of a arge network, and is much arger than the test cases used in most work on capacity panning. It is fair to predict that the running time of the agorithm wi stay reasonabe for practica sized networks. The other observation is that over 93% of the time, demands with the same O-D use ony singe candidate path. It means that when designing a east cost network, traffic engineering capabiity enabed by the MPLS protoco does not have a significant impact on the optima resut at the stage of network panning. This is understandabe, since traffic engineering is most usefu when the rea traffic fuctuates in an operationa network. Further investigation is required to have a better understanding of the effect. 6. Concusions and Future Directions In this paper, we addressed the probem of ink dimensioning and routing for MPLS networks supporting DiffServ EF and BE traffic. We formuate the probem as an optimization probem, where the tota ink cost is minimized, subject to the performance constraints of both EF and BE casses. The performance guarantee of BE traffic resuts in noninear constraints. The variabe here is the non-bifurcated (singe-path) routing of EF demands, mutipath routing of BE demands, and the discrete ink capacities. We presented a Lagrangean Reaxation-based method to effectivey decompose the origina probem. A subgradient method is used to find the optima Lagrangean mutipier. We investigated experimentay the soution quaity and running time of this approach. The resuts from our experiments indicate that our method produces soutions that are within a few percent of the optima soution, whie the running time stays reasonabe for practica sized networks. This paper presents a preiminary investigation of the capacity panning issue for MPLS networks supporting DiffServ. The novety of the probem presented in this paper is that it invoves two traffic casses, EF and BE, which have totay different forms of performance requirements. The probem formuation and soution approaches may be appied to other traffic casses and simiar network architectures. There are opportunities to extend this work in severa directions. We are working on a method where an empirica performance mode may be used, and thus AF traffic casses can be incorporated into the probem. We are aso investigating the adaptation of this technique to other type of networks, when there are mutipe casses of service. REFERENCES 1. S. Keshav, An Engineering Approach to Computer Networking, Addison-Wesey, D. A. et a., Requirement for traffic engineering over MPLS, IETF RFC E. Rosen, A. Viswanathan, R. Caon, Mutiprotoco abe switching architecture, IETF RFC S. Bake, et a., An Architecture for Differentiated Service, IETF RFC 2475.

10 5. K. Nichos, V. Jacobson, L. Zhang, A Two-bit Differentiated Services Architecture for the Internet, IETF RFC L. Wu, B. David, etc, Muti-Protoco abe switching MPLS support of differentiated services, IETF RFC B. David, A. Charny, et A., An Expedited Forwarding PHB, IETF RFC B. E. Carpenter, K. Nichos, Differentiated services in the internet, Proceedings of the IEEE 90 (9) (2002) S. Ano, T. Hasegawa, N. Decre, Experimenta TCP performance evauation on diffserv AF PHBs over ATM SBR service, Teecommunication Systems 19 (3-4) (2002) S. Chen, K. Nahrstedt, An overview of quaity-of-service routing for the next generation high-speed networks: Probems and soutions, IEEE Network Magazine 12 (1998) A. Ewaid, C. Jin, S. Low, I. Widjaja, MATE: MPLS adaptive traffic engineering (2001), in: IEEE Infocom 01, Vo. 3, IEEE, Anchorage, Aaska, 2001, pp M. Kodiaam, T. Lakshman, Minimum interference routing with appications to MPLS traffic engineering, in: IEEE Infocom 00, Vo. 2, IEEE, Te Aviv, Israe, 2000, pp I. Akyidiz, T. Anjai, L. Chen, J. de Oiveira, C. Scogio, A. Sciuto, J. Smith, G. Uh, A new traffic engineering manager for DiffServ/MPLS networks: Design and impementation on an IP QoS testbed, Computer Communications 26 (2003) M. Gera, L. Keinrock, On the topoogica design of distributed computer networks, IEEE Transactions on Communications COM-25 (1) (1977) B. Gavish, I. Neuman, A System for Routing and Capacity Assignment in Computer Networks, IEEE Transaction on Communications 37 (4) (1989) H. Gersht, R. Weihmayer, Joint Optimization of Data Network Design and Faciity Location, IEEE Journa on Seected Areas in Communications 8 (9) (1990) T. Ng, D. Hoang, Joint Optimization of Capacity and Fow Assignment in a Packet-switched Communication Network, IEEE Transaction on Communications COM-35 (2) (1987) D. Medhi, Muti-Hour, Muti-Traffic Cass Network Design for Virtua Path-based Dynamicay Reconfigurabe Wide-Area ATM Networks, IEEE/ACM Transactions on Networking 3 (6) (1995) D. Medhi, D. Tipper, Some Approaches to Soving a Mutihour Broadband Network Capacity Design Probem with Singe-path Routing, Teecommunication Systems 13 (2-4) (2000) A. Amiri, A System for the Design of Packet-Switched Communication Networks with Economic Tradeoffs, Computer Communications 21 (18) (1998) G. Maicsko, G. Fodor, M. Pioro, Link capacity dimensioning and path optimization for networks supporting eastic services, in: IEEE ICC 2002, Vo. 4, 2002, pp L. Fratta, M. Gera, L. Keinrock, The Fow Deviation Method: An Approach to Store-and-Forward Communication Network Design, Networks 3 (2) (1973) K. Wu, D. S. Reeves, Capacity panning of DiffServ networks with Best-Effort and Expedited Forwarding traffic, in: To appear in IEEE 2003 Internationa Conference on Communications, Anchorage, Aaska, V.Jacobson, K.Nichos, K.Poduri, An Expedited Forwarding PHB, IETF RFC A. Charny, J.-Y. L. Boudec, Deay Bounds in Network with Aggregate Scheduing, in: First Internationa Workshop on Quaity of Future Internet Service, Berin, Germany, 2000, pp J. Martin, A. Nisson, On service eve agree ments for IP networks, in: IEEE Infocom 02, IEEE, New York, V. Paxson, S. Foyd, Wide-area traffic: The faiure of poisson modeing, in: ACM SIGCOMM 94, London, R. Morris, D. Lin, Variance of aggregated web traffic, in: IEEE Infocom 00, IEEE, Te Aviv, Israe, 2000, pp X. Tian, J. Wu, C. Ji, A unified framework for understanding network traffic using independent waveet modes, in: IEEE Infocom 02, Vo. 1, IEEE, 2002, pp L. Keinrock, Queueing Systems, Voume II: Computer Appication, Wiey Interscience, R. Ahuja, T. Magnanti, J. Orin, Network Fows, Theory, Agorithms and Appications, Prentice Ha, New Jersey, B. Gavish, I. Neuman, Capacity and Fow Assignment in Large Computer Networks, in: IEEE Infocom 86, IEEE, 1986, pp D. Bertsekas, R. Gaager, Data Networks, Prentice Ha, Engewood Ciffs, NJ, E. Zegura, K. Cavert, M. J. Donahoo, A Quantitative Comparison of Graph-based Modes for Internet Topoogy, IEEE/ACM Transactions on Networks 5 (6) (1997) J. Yen, Finding the K Shortest Loopess Paths in a Network, Management Science 17 (11) (1971) NLANR passive measurement and anaysis project, (2001).

Capacity Planning of Survivable MPLS Networks Supporting DiffServ

Capacity Planning of Survivable MPLS Networks Supporting DiffServ Capacity Panning of Survivabe MPLS Networks Supporting DiffServ Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University kwu@unity.ncsu.edu,

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

GreenTE: Power-Aware Traffic Engineering

GreenTE: Power-Aware Traffic Engineering GreenTE: Power-Aware Traffic Engineering Mingui Zhang zmg6@mais.tsinghua.edu.cn Cheng Yi yic@emai.arizona.edu Bin Liu iub@tsinghua.edu.cn Beichuan Zhang bzhang@arizona.edu Abstract Current network infrastructures

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

WIRELESS Mesh Networks (WMNs) have recently attracted

WIRELESS Mesh Networks (WMNs) have recently attracted 3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013 500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

Figure 1. A Simple Centrifugal Speed Governor.

Figure 1. A Simple Centrifugal Speed Governor. ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

NCH Software Warp Speed PC Tune-up Software

NCH Software Warp Speed PC Tune-up Software NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Eectronic Commerce Research and Appications 8 (2009) 63 77 Contents ists avaiabe at ScienceDirect Eectronic Commerce Research and Appications journa homepage: www.esevier.com/ocate/ecra Forecasting market

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1 A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,

More information

Program Management Seminar

Program Management Seminar Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.

More information

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense. Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Packet Classification with Network Traffic Statistics

Packet Classification with Network Traffic Statistics Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation Design of Foow-Up Experiments for Improving Mode Discrimination and Parameter Estimation Szu Hui Ng 1 Stephen E. Chick 2 Nationa University of Singapore, 10 Kent Ridge Crescent, Singapore 119260. Technoogy

More information

CSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu

CSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 8260 Spring 2016 Computer Network Attacks and Defenses Syabus Prof. Roberto Perdisci perdisci@cs.uga.edu Who is this course for? Open to graduate students ony Students who compete this course successfuy

More information

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions Mean-fied Dynamics of Load-Baancing Networks with Genera Service Distributions Reza Aghajani 1, Xingjie Li 2, and Kavita Ramanan 1 1 Division of Appied Mathematics, Brown University, Providence, RI, USA.

More information

ILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters

ILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters ILP Formuation and K-Shortest Path Heuristic for the RWA Probem with Aocation of Waveength Converters Karcius D.R. Assis 1, A. C. B. Soares, Wiiam F. Giozza and Heio Wadman 1 UEFS- State University of

More information

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems CSE 532 Theory of Database Systems Lecture 03 SQL Ichu Yoon Assistant Professor State University of New York, Korea Adapted from book authors sides SQL Language for describing database schema & operations

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa

More information

Risk Assessment Methods and Application in the Construction Projects

Risk Assessment Methods and Application in the Construction Projects Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,

More information

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web 4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS TABLE OF CONTENTS INTRODUCTION... 1 GOVERNANCE... 1 COMMONLY PURCHASED GOODS AND SERVICES... 1 HOW TO REGISTER YOUR COMPANY...

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Presented at the 107th Convention 1999 September 24-27 New York

Presented at the 107th Convention 1999 September 24-27 New York Room Simuation for Mutichanne Fim and Music 4993 (B-2) Knud Bank Christensen and Thomas Lund TC Eectronic A/S DK-8240 Risskov, Denmark Presented at the 107th Convention 1999 September 24-27 New York This

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information