Location, Location, Location! Modeling Data Proximity in the Cloud
|
|
|
- Loraine Austin
- 10 years ago
- Views:
Transcription
1 Locatio, Locatio, Locatio! Modelig Data Proximity i the Cloud Birjodh Tiwaa [email protected] Uiversity of Michiga rbor, MI Hitesh Ballai [email protected] Microsoft Research Cambridge, UK Mahesh Balakrisha [email protected] Microsoft Research Moutai View, C Z. Morley Mao [email protected] Uiversity of Michiga rbor, MI Marcos K. guilera [email protected] Microsoft Research Moutai View, C BSTRCT Cloud applicatios have icreasigly come to rely o distributed storage systems that hide the complexity of hadlig etwork ad ode failures behid simple, data-cetric iterfaces (such as PUTs ad GETs o key-value pairs). While these iterfaces are very easy to use, the applicatio is completely oblivious to the locatio of its data i the etwork; as a result, it has o way to optimize the placemet of data or computatio. I this paper, we propose exposig the etwork locatio of data to applicatios. The primary challege is that data does ot usually exist at a sigle poit i the etwork; it ca be striped, replicated, cached ad coded across differet locatios, i arbitrary ways that vary across storage systems. For example, a item that is sychroously mirrored i both Seattle ad Lodo will appear equally far from both locatios for writes, but equally close to both locatios for reads. ccordigly, we describe Cotour, a system that allows applicatios to query ad maipulate the locatio of data without requirig them to be aware of the physical machies storig the data, the replicatio protocols used or the uderlyig etwork topology. Categories ad Subject Descriptors C.2.1 [Network rchitecture ad Desig]: Network Topology; C.4 [Performace of Systems]: Modelig Techiques Geeral Terms Desig, Measuremet, Performace Permissio to make digital or hard copies of all or part of this work for persoal or classroom use is grated without fee provided that copies are ot made or distributed for profit or commercial advatage ad that copies bear this otice ad the full citatio o the first page. To copy otherwise, to republish, to post o servers or to redistribute to lists, requires prior specific permissio ad/or a fee. Hotets 10, October 20 21, 2010, Moterey, C, US. Copyright 2010 CM /10/10...$ Keywords Cloud Computig, Locatio, Network Topology, Key- Value Stores 1. INTRODUCTION Existig cloud platforms offer developers storage services with simple, data-cetric iterfaces to store ad retrieve applicatio data (for example, Microsoft zure s Blob Store ad mazo s S3 allow PUTs ad GETs o key-value pairs). Behid such simple iterfaces, these services use complex machiery to esure that data is available ad persistet i the face of etwork ad ode failures. s a result, developers ca focus o applicatio fuctioality without havig to reaso about complex failure scearios. Ufortuately, this simplicity comes at a cost; applicatios have little or o iformatio regardig the locatio of their data i the etwork. Without this iformatio, applicatios caot optimize their executio by movig computatio closer to data, data closer to users, or related data closer to each other. These kids of optimizatios ca be crucial for applicatios executig across differet data ceters (where etwork latecies ca be very high), as well as withi hierarchical data ceter etworks (where badwidth ca be limited). The curret state-of-the-art solutio for this problem ivolves guesswork: the cloud determies data placemet by predictig the future access patters of the applicatio based o past history, while treatig the applicatio as a black box. This approach ca be expesive ad couter-productive, sice the applicatio typically has more accurate iformatio tha the cloud about its ow future behavior. I additio, without iput from the applicatio, the cloud ca optimize oly simple aggregates of low-level metrics such as badwidth usage or access latecy. Requestig iformatio from the appli-
2 catio i.e., its future access patters or the high-level metrics of iterest to it is a possible solutio; however applicatios ca have arbitrary optimizatio criteria that are difficult to express to the cloud without complicatig the storage iterface. I this paper, we examie a differet approach: exposig the locatio of data to applicatios ad allowig them to optimize their ow executio. We wat applicatios to be able to estimate the time take to update or retrieve data from differet etwork locatios. We also wat to eable cloud iterfaces that allow applicatios to move computatio closer to data (ad vice versa), as well as request ew computatioal resources ear existig data. Importatly, we wat to do so without breakig the abstractio of data-cetric storage; applicatios must ot be aware of physical storage servers or the uderlyig etwork topology. The primary challege is that data does ot exist at a sigle locatio i the etwork. Data ca be striped, mirrored, cached ad coded across differet poits i the etwork, usig protocols with widely varyig sematics. Cosider a example i which a machie i Los geles accesses data sychroously mirrored at data ceters i Seattle ad Lodo. For reads, the data will appear to reside i Seattle, sice oly the local data ceter eeds to be cotacted. For writes, the data will appear to reside i Lodo, sice both data ceters are cotacted i parallel for a successful write operatio. Note that differet protocols where the cliet machie waits for a respose from the first mirror before updatig the secod, or lets oe mirror directly update the other lead to differet access latecies to the data. To capture such protocol-specific behavior, we propose the idea of replicatio topologies. These are simple represetatios of the iteractios betwee differet servers triggered by reads or writes to a storage service. Importatly, replicatio topologies are ot meat to be complete descriptios of protocols; istead, they capture oly the etwork pathways take by the protocol i failure-free operatio. We fid that most protocols used i practice such as sychroous ad asychroous mirrorig, erasure codes, chai replicatio ad differet types of quorums ca be modeled with very simple replicatio topologies. We describe the desig of Cotour, a system that uses replicatio topologies to provide data-cetric locatio fuctioality. Cotour provides estimates of the latecy to retrieve or update data i a storage service from ay ode i the etwork. It also supports higherlevel fuctioality such as closest-ode discovery (e.g., fidig a ode that is closest to a key/value pair for reads) ad costrait satisfactio (e.g., fidig a ode that ca update a particular key/value pair withi 100 ms ad read aother withi 10 ms). These iterfaces ca be used directly by applicatios to optimize performace. They ca also be used by cloud subsystems to support ew applicatio-facig iterfaces for movig data closer to give etwork locatios, or for requestig ew resources ear existig data. To work with Cotour, a storage service has to provide it with the replicatio topology used to access data. Cotour combies this iformatio with lik-level etwork topology iformatio such as RTTs, badwidth ad loss rates to estimate data access latecies from ay other locatio i the cloud. This lik-level iformatio is collected cotiuously i the backgroud, amortizig the cost of measuremet across multiple applicatios. Sythesizig accurate estimates i this maer is a sigificat challege; however, we believe that cloud platforms have eough moitorig ifrastructure i place o their iteral etworks to make this approach viable. dditioally, high-level fuctios such as closest-ode discovery do ot require very accurate latecy estimates; it is sufficiet if the estimate for the closest ode is lower tha for ay other ode. I this paper, our target applicatios are Iteret services caterig to a geo-distributed user base. Cotour is equally relevat for differet applicatios, such as MapReduce jobs ruig withi badwidth-costraied data ceters, or eterprise applicatios split across private ad public clouds. We omit discussig these applicatios i detail for lack of space. 2. LOCTION IN THE CLOUD To uderstad why locatio is importat i the cloud, we examie the aatomy of a typical applicatio. Cloud applicatios are composed of three distict types of etities: Cliets are machies or devices accessig the service from the public Iteret. Whe a user types i the URL of a service ito her browser, the request is redirected (typically through DNS-based load-balacig) to a data ceter hostig the service. Compute Nodes are the work-horses of the cloud, executig applicatio logic for services (kow as worker roles i zure ad istaces o EC2). Compute odes usually do ot store persistet state, though they ca store soft sessio state ad be sticky with respect to idividual user sessios. Withi each data ceter, icomig requests are directed to compute odes by a layer of web-servers that accept ad maage HTTP coectios from users. Storage Services store all applicatio data ad are accessed by compute odes via simple, datacetric iterfaces. Uder the hood, these are distributed storage systems ruig complex protocols to esure that data is always available ad
3 durable, eve whe machies, disks ad etworks fail. Each cloud provider offers a rage of such services, with differet iterfaces (such as key-value stores, queues, or eve liear address spaces) ad persistece guaratees. Cosider the example of FaceTracker, a hypothetical face recogitio applicatio for mobile phoes: whe the user of the phoe poits its camera towards some perso, the image is matched agaist a library of her frieds photos. I a cloud-based versio of this applicatio, the cliet would be the phoe itself, ad the library of photos would be stored i a cloud-based storage service (say a key-value store). Images are uploaded from the phoe to a compute ode, which rus face recogitio algorithms o them, fetchig photos of the user s frieds from the key-value store with GET calls. Successfully matched images are occasioally added to the library with PUT calls to improve accuracy. Of the three types of etities described, the applicatio obviously has o cotrol over the locatio of cliets, while it ca move data aroud with some cost i terms of badwidth ad time. Computatio is the easiest to move, sice compute odes have o persistet state. Compute odes typically eed to be close to cliets to miimize iteractio latecies; for FaceTracker, it is reasoable to assume that a user s compute ode is always i the data ceter closest to her locatio. I practice, deployed systems do a good job of redirectig cliets to compute odes i close-by data ceters; cosequetly, we do ot focus o the locatio of compute odes relative to cliets. gaist this backdrop, we examie applicatio scearios where the locatio of data matters with respect to compute odes, usig FaceTracker as a ruig example. Obtaiig ew resources: applicatio may eed ew compute odes ear existig data items. lteratively, it may wat to place a ewly created data item ear a existig compute ode. Whe lice uses Face- Tracker for the first time, her request is directed to a existig compute ode, which creates her photo library close to itself. Load balacig ad failure recovery: Whe a compute ode processig some data fails or gets overloaded, the applicatio may eed to shift computatio to a differet compute ode ear the same data. Whe the compute ode matchig lice s icomig images fails, FaceTracker restarts the task o a differet compute ode close to her photo library. Dispersed data: Whe a task accesses a set of differet data items, the applicatio may wat to locate it o a compute ode equally close to all these data items, or closer to some of them tha the rest. lice wats to match her camera s feed agaist all her frieds libraries; accordigly, FaceTracker locates her matchig task o a compute ode optimally placed with respect to all their libraries. Movig data closer to computatio: Whe users move or chage their access patters, the applicatio may wat to relocate data to be closer to the ew compute odes hadlig those users. Whe lice moves from New York City to Sa Fracisco, FaceTracker moves her photo library closer to the ew compute ode i Califoria ow matchig her images. Shared data: Whe a data item is beig cocurretly accessed by multiple compute odes, the applicatio may wat to place the data item equally close to all the compute odes, or prioritize some over others. lice is i New York ad wats to match her camera s feed agaist Bob s photo library, who lives i Seattle. Sice movig her matchig task to Seattle will icrease her latecy ad cost to upload images, FaceTracker moves Bob s library closer to her compute ode. 3. REPLICTION TOPOLOGIES Thus far, we have established the eed for applicatios to kow ad chage the locatio of data. This is relatively easy to achieve if the cloud stores each data item o a sigle machie i the etwork; the locatio of data is simply the locatio of the machie storig it. I this sceario, existig ode-cetric models for etwork locatio (such as etwork coordiates or treebased models) ca be used to estimate access latecies for the data. While such models usually provide lowlevel path properties betwee odes (such as RTT ad badwidth), it is possible to covert these metrics ito estimates of data trasfer times; for example, the time take to retrieve 1 MB of data via TCP/IP. Ufortuately, data i the cloud does ot usually reside o a sigle machie, makig ode-cetric etwork models ieffective i this cotext. Storage services typically replicate data over multiple odes, usig a wide rage of differet protocols. We use replicatio as a catch-all term, spaig techiques such as cachig, mirrorig, erasure codig ad stripig. Whe a read or write operatio is issued o a item i a storage service, multiple storage servers commuicate with each other to esure the right sematics for the operatio. The exact patters of commuicatio which servers talk to each other, ad whether they wait for resposes from each other before replyig back to the ode issuig the request deped o the replicatio protocol used. The key isight i this paper is that the critical path of iteractios betwee storage servers for ay replicatio protocol ca be captured usig simple represetatios called replicatio topologies. Replicatio topologies ca be draw as DGs, where a directed edge betwee two odes represets a message goig from oe
4 Writes: Compute Node Reads: Compute Node Primary Primary Secodary B C Secodary Leged: Payload Message Cotrol Message Figure 1: Read/Write replicatio topologies for a sychroous mirrorig protocol with oe primary () ad two secodaries (B, C). ode to the other. Edges with solid lies correspod to messages that have the actual payload beig read or writte, whereas edges with dashed lies correspod to small cotrol messages. To express message depedecies precisely, we allow a sigle machie to be represeted by multiple odes i the graph. To uderstad replicatio topologies better, cosider a simple sychroous mirrorig protocol cosistig of a primary replica ad two secodary replicas. Write operatios are first set to the primary, which sychroously stores them o the secodary replicas before respodig back to the compute ode. ll read operatios are satisfied directly by the primary; the secodaries are read from oly i the case of primary failure. We show the correspodig replicatio topology for this protocol i Figure 1, where a compute ode is show accessig a item sychroously mirrored o a primary ad two secodaries B ad C. For reads, the replicatio topology simply cosists of a sigle outgoig edge from a ode to a ode, ad the back to a ode. For writes, we have a outgoig edge from to, which the has two edges outgoig to B ad C, represetig the mirrorig messages. B ad C the respod back to, which i tur respods back to. Give this replicatio topology ad the locatios of,, B ad C i the etwork, it is possible to estimate the time take to write or retrieve a value. For example, if the value is of size 5 MB, the total time take by to write it ca be computed as follows. First, we compute the time take to trasfer 5 MB from to. Sice the cotacts B ad C i parallel, we the take the max of the time take alog those two paths. Each path ivolves sedig 5 MB from to B or C, respectively, ad the receivig a short ackowledgmet message back. Lastly, we add the time take to sed a ackowledgmet from to. I other words, the latecy to write a value is a simple fuctio over iter-ode data trasfer latecies, usig sum ad max operators. I additio to providig estimates of data access latecies, replicatio topologies also allow us to uderstad how these latecies are impacted by the locatio of each replica i the etwork. I the example above, movig closer to B or C does ot ecessarily improve performace for writes; what matters is the proximity of to, ad of to B ad C. Similarly, the locatio of B or C has o impact o read performace from. Such kowledge of the replicatio topology ca be used to implemet fuctioality such as closest-ode discovery more efficietly. Our represetatio icludes two more operators to idicate that a ode should cotact or wait for the closest subset of its eighbors. Figure 2 shows the replicatio topology for a erasure codig protocol; a item is stored as six coded pieces o six differet machies ( to F ), of which ay four pieces are sufficiet to recostruct the origial item. We show a variat of this protocol where cotacts all six machies i parallel, but waits for oly the first four machies that respod. To implemet this, we itroduce the first-k operator o the DG, idicatig that the ode waits for oly the first k icomig messages. differet variat of this protocol might have cotact oly the four closest machies, tha all six; to model this, we use a closest-t operator o the outgoig edges of a ode to idicate that it cotacts oly its t closest eighbors. We believe that replicatio topologies are geeral eough to model a wide rage of replicatio protocols. For istace, quorum-based protocols are similar to erasure codig i behavior, i that oly a subset of odes eeds to be cotacted (or waited for). Oe challegig aspect of some protocols is that their behavior ca chage over time; for example, a asychroous primary-backup protocol may allow reads from the secodary except whe the primary has just bee updated. We ca model these protocols as exhibitig differet replicatio topologies at differet poits i time. 4. THE CONTOUR SYSTEM I this sectio, we describe the desig of the Cotour system, ad how it iteracts with applicatios ad storage services. 4.1 Cotour ad the Storage Service Cotour expects the storage service to implemet a simple iterface that returs the read or write replicatio topology for a passed-i key. For example, if the storage service implemets sychroous mirrorig, the
5 Reads o (4,2) Erasure Code Cotact all, Wait for first 4 Compute Node B C D E F First 4 Figure 2: Read replicatio topology for a erasure codig protocol where ay four coded blocks are sufficiet to read the whole item. retured replicatio topology will be idetical to the diagram i Figure 1, with actual IP addresses substituted for abstract ode idetifiers (e.g., istead of ). s described i the previous sectio, computig the access latecy from this replicatio topology ivolves a simple fuctio over iter-ode data trasfer latecies (for example, the time take to trasfer 5 MB from to ), ivolvig sum, mi ad max operators. Cotour determies this fuctio from the replicatio topology ad evaluates it usig estimates for iter-ode data trasfer latecies obtaied from its ow lik-level measuremets. secodary iterface that the storage service eeds to implemet is a call that returs the size of the value correspodig to a passed-i key. This is used by Cotour to compute access latecies for reads give the replicatio topology. 4.2 Cotour ad the pplicatio The basic fuctioality provided by Cotour is data access latecy estimatio: applicatios (or cloud subsystems) ca estimate the time take to read or write data from ay compute ode i the etwork. Over this basic primitive, Cotour builds more specific fuctioality; for example, it allows applicatios to fid the ode from a set closest to a particular uit of data. It also supports fidig odes that satisfy access latecy costraits with respect to multiple data items. This is useful if the applicatio wats to choose a existig compute ode to ru a particular task based o the data it accesses. It is also useful for cloud allocatio or schedulig compoets that wat to satisfy applicatiospecified requiremets for ew compute odes. ll these calls idetify idividual data uits with a opaque key parameter, which depeds o the uderlyig storage service ivolved; it ca be a simple key, a block umber i a liear address space, or a (row, colum) pair. Cotour does ot actively operate o the key i ay way; it merely uses it as a parameter to retrieve the replicatio topology from the storage service. O their ow, these iterfaces aturally support ay applicatio sceario that ivolves movig computatio closer to data. With the ivolvemet of the storage service, they ca also support scearios that ivolve movig data closer to specific etwork locatios. I these cases, we expect the storage service to support a applicatio-facig iterface that allows data to be moved closer to some ode. The storage service ca the use Cotour s iterfaces to estimate the distace of differet replicatio topologies from the target ode to fid oe that fits the access latecy costrait. 4.3 Desig Cosideratios The simplest way to implemet Cotour is as a cetralized service, accessed by applicatios via local libraries. Every time a applicatio wishes to estimate access latecies to a key, it ca first issue a query to a close-by Cotour server, which correspodigly retrieves the replicatio topology from the storage service. While simple to implemet, this purely pull-based approach ca result i high query latecies. Cachig resposes both at the Cotour server ad the applicatio machie ca reduce latecies, but itroduces the possibility of staleess. alterative ivolves itroducig push-based mechaisms. pplicatios could register their iterest i specific keys to their local Cotour server, which i tur registers its iterest i those keys to the storage service. Whe the Cotour server is otified by the storage service of a chage i the replicatio topology for a key or the uderlyig etwork topology chages it ca otify the compute ode iterested i that key. 5. DISCUSSION Cotour i differet settigs: We focused this paper o Iteret services ruig across geographically distat data ceters. Cotour geeralizes easily to other types of cloud applicatios with oe alteratio: the way that Cotour computes data trasfer latecies from lowlevel lik metrics such as RTT, badwidth ad loss rates ca chage depedig o the settig. For example, a differet methodology may be required to compute data trasfer latecies withi a data ceter, as opposed to wide area liks. This fuctioality ca be abstracted away ito a module resposible for geeratig estimates of data trasfer latecies betwee two physical odes. Modelig accesses to storage media: Oe aspect of usig Cotour withi a sigle data ceter is that the latecy of accessig storage media (such as disk or flash) eeds to be modeled as well, sice it costitutes a much larger fractio of ed-to-ed latecy i such settigs. We ca modify replicatio topologies to model
6 media access latecies by itroducig ew odes ad edges ito the graph as appropriate. For example, if is a storage server i a replicatio topology, it could be rewritte as two odes istead, 1 ad 2, with a directed edge goig from oe to the other. ll icomig edges ito would ow go ito 1, ad all outgoig edges would ow leave from 2. Does the cloud care about its ow privacy?: itriguig aspect of Cotour s approach is that the cloud could ed up revealig iformatio about its compositio. I a geo-distributed settig, this could result i applicatios learig the umber of data ceters or their locatio; withi a data ceter, they could possibly lear the type of topology used or the umber of machies. While this possibility exists eve i the absece of Cotour, the ability to collect large umbers of latecy estimates without actively trasferrig data provides applicatios a iexpesive way to ifer the cloud s iteral details. This is a ope problem for Cotour; oe possibility ivolves addig jitter to estimates to offer the cloud some measure of privacy. Other data-cetric metrics: Cotour provides applicatios with the estimated latecy to retrieve or update data from a storage service. differet metric of iterest could be cost i terms of dollars; for example, if a access results i traffic betwee data ceters, the applicatio may be charged for it by the cloud. ccordigly, Cotour could report to the applicatio the cost of a data access. other possible data-cetric metric is availability; Cotour could provide the probability that a access succeeds, based o the failure rates of the etwork paths ivolved i the replicatio topology. 6. RELTED WORK Cotour is ispired by existig work o etwork models for predictig path properties such as latecy betwee Iteret ed-hosts; for example, etwork coordiate systems such as Vivaldi [3] attempt to embed iter-ode latecies i a coordiate space. Other work i this space icludes systems that offer differet models [5], arrow locatio-cetric fuctioality [6] or geeral query iterfaces [4]. Cotour ca be viewed as a attempt to exted this class of work to provide a datacetric otio of etwork locatio. Volley [1] does automated data placemet for geodistributed applicatios based o user request patters. key differece from our work is that Volley igores write performace ad uses a simple, fixed replicatio strategy; accordigly, it equates the locatio of data to the locatio of its closest replica. I additio, Volley does ot seek to retai a data-cetric applicatio iterface. Lastly, Volley represets a desig where optimizatio is hadled by ifrastructure istead of the applicatios themselves; as metioed earlier, it is difficult for such desigs to hadle arbitrary applicatio priorities. other related system is PDS [2], which provides a architecture for buildig distributed storage systems by defiig policies for locatig ad updatig replicas. Like Cotour, PDS comes up with a geeral represetatio for differet replicatio policies; however, its goal is more ambitious sice it tries to completely defie the protocol. I cotrast, Cotour s replicatio topologies are meat to oly model the ed-to-ed latecies exhibited by the protocol. 7. CONCLUSION Moder cloud platforms make it easy for developers to write applicatios by abstractig away ode-level details uder data-cetric iterfaces. However, doig so robs developers of the ability to uderstad ad optimize applicatio performace. We preset a system called Cotour that allows odes to reaso about the locatio of data i the etwork without breakig the abstractio of data-cetric storage. t the core of Cotour are replicatio topologies, abstractios that express the critical server iteractios that occur o data accesses. ckowledgmets We d like to thak Vijaya Prabhakara, Veugopala Ramasubramaia ad Patrick Stuedi for their feedback durig the project. We would also like to thak the HotNets reviewers for their detailed commets o the paper. 8. REFERENCES [1] S. garwal, J. Duaga, N. Jai, S. Saroiu,. Wolma, ad H. Bhoga. Volley: utomated Data Placemet for Geo-Distributed Cloud Services. I NSDI [2] N. Belaramai, J. Zheg,. Nayate, R. Soulé, M. Dahli, ad R. Grimm. PDS: a policy architecture for distributed storage systems. I NSDI [3] F. Dabek, R. Cox, F. Kaashoek, ad R. Morris. Vivaldi: decetralized etwork coordiate system. I SIGCOMM [4] H. Madhyastha, T. Isdal, M. Piatek, C. Dixo, T. derso,. Krishamurthy, ad. Vekataramai. iplae: iformatio plae for distributed services. I OSDI [5] V. Ramasubramaia, D. Malkhi, F. Kuh, M. Balakrisha,. Gupta, ad. kella. O the treeess of iteret latecy ad badwidth. I SIGMETRICS [6] B. Wog,. Slivkis, ad E. Sirer. Meridia: lightweight etwork locatio service without virtual coordiates. I SIGCOMM 2005.
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
Domain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
Engineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
Domain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Baan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
CHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
CHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS
GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS I the sprig of 2008, Stadig Together agaist Domestic Violece carried out a piece of collaborative work o domestic violece
client communication
CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.
.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio
June 3, 1999. Voice over IP
Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig
How to use what you OWN to reduce what you OWE
How to use what you OWN to reduce what you OWE Maulife Oe A Overview Most Caadias maage their fiaces by doig two thigs: 1. Depositig their icome ad other short-term assets ito chequig ad savigs accouts.
Professional Networking
Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market
CCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY
Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,
Systems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
Output Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
BaanERP. BaanERP Windows Client Installation Guide
BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
A Balanced Scorecard
A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio
Optimization of Large Data in Cloud computing using Replication Methods
Optimizatio of Large Data i Cloud computig usig Replicatio Methods Vijaya -Kumar-C, Dr. G.A. Ramachadhra Computer Sciece ad Techology, Sri Krishadevaraya Uiversity Aatapuramu, AdhraPradesh, Idia Abstract-Cloud
IT Support. 020 8269 6878 n www.premierchoiceinternet.com n [email protected]. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
Handling. Collection Calls
Hadlig the Collectio Calls We do everythig we ca to stop collectio calls; however, i the early part of our represetatio, you ca expect some of these calls to cotiue. We uderstad that the first few moths
TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology
TruStore: The storage system that grows with you Machie Tools / Power Tools Laser Techology / Electroics Medical Techology Everythig from a sigle source. Cotets Everythig from a sigle source. 2 TruStore
Case Study. Normal and t Distributions. Density Plot. Normal Distributions
Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca
Lesson 15 ANOVA (analysis of variance)
Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi
CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD
Books Olie Software Fee Fee Protectio Cosultacy Advice Advice Lies Lies CPD CPD facig today s challeges As a accoutacy practice, maagig relatioships with our cliets has to be at the heart of everythig
ContactPro Desktop for Multi-Media Contact Center
CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers
A Secure Implementation of Java Inner Classes
A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio
Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
Center, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy
QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their
INVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
BaanERP 5.0c. EDI User Guide
BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
I. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
Incremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
How to read A Mutual Fund shareholder report
Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.
Designing Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied
Soving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
Automatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
E-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
CS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
Lesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
Setting Up a Contract Action Network
CONTRACT ACTION NETWORK Settig Up a Cotract Actio Network This is a guide for local uio reps who wat to set up a iteral actio etwork i their worksites. This etwork cosists of: The local uio represetative,
QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot
QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as
Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
facing today s challenges As an accountancy practice, managing relationships with our clients has to be at the heart of everything we do.
CCH CRM cliet relatios facig today s challeges As a accoutacy practice, maagig relatioships with our cliets has to be at the heart of everythig we do. That s why our CRM system ca t be a bolt-o extra it
Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation
Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,
Ideate, Inc. Training Solutions to Give you the Leading Edge
Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!
Flood Emergency Response Plan
Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy
C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..
(IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai
Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA
Telecom White Paper Actioable Itelligece i the SDN Ecosystem: Optimizig Network Traffic through FRSA About the Authors Sumit Kapoor Sumit is a solutio architect i the telecom busiess uit at Tata Cosultacy
Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13
EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may
Desktop Management. Desktop Management Tools
Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig
Amendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
How To Write A Privacy Policy For A Busiess
Office of the Privacy Commissioer of Caada PIPEDA Privacy Guide for Small Busiesses: The Basics Privacy is the best policy Hadlig privacy cocers correctly ca help improve your orgaizatio s reputatio. Whe
On the Capacity of Hybrid Wireless Networks
O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,
Hypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing
Lect. Phd. Liviu Gabriel CRETU / SPRERS evet Traiig o software services, Timisoara, Romaia, 6-10 dec 2010 www.feaa.uaic.ro Busiess Rules-Drive SOA. A Framework for Multi-Teat Cloud Computig Lect. Ph.D.
Research Article Sign Data Derivative Recovery
Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov
1 Correlation and Regression Analysis
1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio
The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms
The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD [email protected] RUSSELL IMPAGLIAZZO Dept. of Computer
iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor
iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous
Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites
Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a
Agency Relationship Optimizer
Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey
Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation
Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,
Multiplexers and Demultiplexers
I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see
6. p o s I T I v e r e I n f o r c e M e n T
6. p o s I T I v e r e I f o r c e M e T The way positive reiforcemet is carried out is more importat tha the amout. B.F. Skier We all eed positive reiforcemet. Whether or ot we are cosciously aware of
Convention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
Department of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
Quality of Service for Workflows and Web Service Processes
Joural of Web Sematics (accepted, to appear 2004), Elsevier. Quality of Service for Workflows ad Web Service Processes Jorge Cardoso 1, Amit Sheth 2, Joh Miller 2, Joatha Arold 3, ad Krys Kochut 2 1 Departameto
NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,
NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical
