A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

Size: px
Start display at page:

Download "A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems"

Transcription

1 A Practcal Stuy of Regeneratng Coes for Peer-to-Peer Backup Systems Alessanro Dumnuco an Ernst Bersack EURECOM Sopha Antpols, France Abstract In strbute storage systems, erasure coes represent an attractve soluton to a reunancy to store ata whle lmtng the storage overhea. They are able to prove the same relablty as replcaton requrng much less storage space. Erasure cong breaks the ata nto peces that are encoe an then store on fferent noes. However, when storage noes permanently abanon the system, new reunant peces must be create. For erasure coes, generatng anewpecerequresthetransmssonof kpecesoverthe network, resultng n a k tmes hgher reconstructon traffc as compare to replcaton. Dmaks propose a new class of coes, calle Regeneratng Coes, whch are able to prove both the storage effcency of erasure coes an the communcaton effcency of replcaton. However, Dmaks gave only a theoretcal escrpton of the coes wthout scussng mplementaton ssues or computatonalcosts. We have oneareal mplementaton of Ranom Lnear Regeneratng Coes that allows us to measure ther computatonal cost, whch can be sgnfcant f the parameters are not chosen properly. However, we also fn that there exst parameter values that result n a sgnfcant reucton of the communcaton overheaattheexpenseofasmallncreasenstoragecost an computaton, whch makes these coes very attractve for strbute storage systems. 1. Introucton PP(Peer-to-Peer) systems have receve a lot of attenton n recent years. In partcular, the research communty has shownanncreasngnterestntheuseofppsystemsfor flestorage[1],[],[3],[4].thsapplcatoncanbevery attractve for two man reasons:() centralze solutons are expensve() common PCs are equppe wth hgh-capacty local sks, whch are often unerutlze. The man challenge n esgnng storage systems s to guarantee the persstence of the store ata. Ths s nontrval because storage peers are not totally relable: they may face falures, ata corrupton or accental ata losses. Angreunancytothestoreatasthebasctool to acheve ata urablty n spte of falures of the storng peers. The smplest reunancy scheme s replcaton, whch conssts n creatng multple copes of ata an spreang them n fferent locatons. A more complex metho s represente by erasure coes: the ata are processe n orertoprouce k + hpecessuchthatany kofthemare suffcent to reconstruct the orgnal fle, then these peces are sprea across fferent peers. Prevous works have shown [5],[6]howerasurecoesareabletoprovethesame level of relablty as replcaton wth much lower storage requrements. Reunancy alone s not enough to prove ata urablty. Snce peers mght leave permanently the system, some of the ntal reunancy mght be lost. Ths means that the number of peces or replcas present n the system mnshes wth tme. Perocally ths number must be refurbshe by the mantenance, whch s performe by the means of repars. A repar conssts n rebulng a lost replca or pece usng the avalable ones. A number of works [5], [7], [8] showe how every pece repare n erasure coes requre that k other avalable peces must be rea(whch correspons to the sze of the orgnal ata), whle n replcaton the repar of one replca nees that only one other replca s rea. In strbute systems ata accesses translate nto network transfers, for ths reason, uner banwth constrants, lke n PP systems, erasure coes become mpractcal an replcaton s the only feasble soluton. Dfferent solutons have been propose to couple the storage effcency of erasure coes wth the communcaton effcency of replcaton. Rorgues an Lskov[5] propose an hybr replcaton/erasure coe soluton, n whch a full replcaofthefleshelbyaspecalpeer,whleotherpeers store erasure coe peces. Repars are always performe usng the full replca, wth a communcaton cost equal to the replcaton case. Ths metho, however, ntrouces an asymmetry n the ata mantenance, causng both a hghercomplextyof the system an a loss n terms of storage effcency. Dumnuco an Bersack [8] propose a class of coes calle Herarchcal Coes, n whch the repar communcaton cost s on average much smaller than for erasure coes. However, Herarchcal Coes have the savantage that not all the subsets of k peces are suffcent to reconstruct the orgnal fle. Fnally Dmaks et al.[7]

2 propose a generalzaton of tratonal erasure coes calle Regeneratng Coes, for whch the communcaton costs urng repar s sgnfcantly reuce as compare to Ree Solomon Erasure coes. Dmaks et al. n[7] presente a theoretcal framework that allows to prove the exstence of thesecoeswhlewuetal.showen[9]howtobul etermnstc Regeneratng Coes base on lnear coes. However, none of the two papers nvestgate the computatonal cost or propose how to mplement such coes. We beleve that Regeneratng Coes represent a very attractve soluton for reunancy schemes n PP storage systems an eserve a eeper analyss wth respect to mplementaton an eployment, whch s the subject of ths paper. In secton we prove an ntroucton to ata reunancy schemes n PP storage systems an recall the man theoretc results on Regeneratng Coes([7]). In secton 3 we escrbe our mplementaton of Ranom Lnear Regeneratng Coes, whle we perform n secton 4 an analytcal evaluaton of ther cost n terms of storage an computaton. In secton 5 we test our mplementaton an evaluate the fferent cost performance trae-offs. Fnally, secton 6 conclues the paper.. Backgroun.1. Data Reunancy Schemes Inthssectonwegveaformalescrptonoftheoperatons performe n a common reunancy scheme. These operatons can be groupe n three stnct phases, whch followthelfecycleofagenercflethatsstorenthe system. 1) Inserton: The nserton conssts n processng the fle, creatng (k+h) reunant peces an strbutng them over stnct peers. The processng can be as trval as bulngreplcasofthefle 1,orcanbeacomplexcong operaton. No matter whch reunancy scheme s use,thepropertyofthesepecessthatany kofthem aresuffcenttoreconstructtheorgnalfle. ) Mantenance: Mantenance conssts n rebulng the reunancy lost ue to peer falures. Mantenance s performe by the means of repars. A repar requres thecooperatonof peersthatsenatatoanew peer 3,callenewcomer,whchnturnprocessesthe receveatatoobtananewpece.wereferto as the repar egree. If the repar s correctly execute, thenewpecehasthesamepropertesasalltheothers,.e.wthany (k 1)otherpecestformsasetofpeces suffcent to reconstruct the orgnal fle. 1.Thssthereplcatoncasewhere k = 1.. There exst reunancy schemes, n whch ths property s not satsfe lken[8],buttheseschemesarenotofnterestnthswork. 3.Anewpeersapeerthatatthemomentnotstornganypeceofthe fle. 3) Reconstructon: If the owner of the fle wants to retreve t from the system, a reconstructon nees to be performe. The reconstructon conssts n ownloang ata from k peers an processng them to obtan the orgnal fle. Intherestofthepaperwerefertotheszeofthefle as fle antotheszeofapeceas pece (ngeneralwe refertotheszeofagenercobject xas x ). From the escrpton t s clear that a reunancy scheme mples three kns of costs: 1) Storage: Reunancy mples that the store fle consumes more storage space than the orgnal fle. The storage requrement s easly compute by: storage = (k + h) pece > fle ) Communcaton: All three phases n the lfe cycle requre ata to be transferre among peers. At nserton, all the peces must be transferre, whch amounts to a volume of storage. At mantenance, for every repar peersuploaeachanamountofataequalto repar up tothenewcomerforatotalof repar own, wththeobvousrelaton: repar own = repar up. At reconstructon, the fle owner nees to ownloa atleastanamountofataequalto fle (Seesecton 3. for etals). 3) Computaton: When cong s use, all the three phasesescrberequreprocessngofata 4.Atnserton,allthepecesneetobecoewthacost of CPU(encong). At repar, part of the processngsoneonthe partcpatngpeers,enoteas CPU(repar) up an part s one on the newcomer, enote as CPU(repar) own. At reconstructon, the orgnal fle must be reconstructe from k peces wth a cost CPU(reconstructon). The partcular reunancy scheme efnes how the reunantataaregenerateanhanleanwhatsthecost n terms of computaton, communcaton, an storage. As an example let us conser tratonal erasure coes(lke Ree-Solomon coes[1]). For these coes, the followng two constrants hol w.r.t. the repar egree an the pece sze: = k (E1) pece = fle /k whch means that every repar s performe collectng ata from = kexstngpeersanthateverypeerstoresan amountofataequalto 1/koftheflesze.Itcanbeshown that gven these constrants, the amount of ata that nees to be transferre from every partcpatng peer to the newcomer sequaltotheszeofapece,whchmeansthatntotal anamountequvalenttotheszeofthewholeflewllbe transmtte. In terms of mantenance, the communcaton costsare: repar up = pece an repar own = fle. 4. In case of replcaton there s no processng.

3 Notethatthsmeansthatforeverynewbtthatwecreate urng a repar, k exstng bts nees to be transferre. The computaton costs are mplementaton epenent(see secton 4 for etals)... Descrpton of Regeneratng Coes Inths sectonwe gveaquckovervewoftheman propertes of Regeneratng Coes from [7]. In essence Regeneratng Coes try to aress the followng queston: whatsthempactonthecommuncatoncostfwerelax the constrants efne for tratonal erasure coes gven n eq. E1? Gven k an h, Regeneratng Coes can take k h fferent values for the par of parameters (, pece ). In fact Regeneratng Coes can be consere a generalzaton of tratonal erasure coes, whch trae-off ncrease storage cost for reuce communcaton cost. More formally, a generc Regeneratng Coe enote by RC(k, h,, ),setsthefollowngconstrantsontherepar egree an the pece sze: [k, k + h 1] pece = p(, ) fle [, k 1] (E) Gvenareparegree,theparameter,whchweefne as the pece expanson nex, etermnes the pece sze throughthefuncton p(, ),whchsefne 5 as: k p(, ) = k( k + 1) + (k 1) ItcanbeprovethatRC(k, h,, )requresthateachofthe peers partcpatng to a repar transfer to the newcomer an amountofataatleastequalto where r(, )sefneas: r(, ) = repar up = r(, ) fle k( k + 1) + (k 1) consequently repar own = r(, ) fle. Inths paperwefxthevaluesfor k = 3an h = 3,whchallowsthesystemtosustanupto 3losses.We conser ths reasonable uner the massve churn we may observe n an Internet scenaro[3]. However, results wth other parameters show the same trens. Fg.1epctshowthepecesze pece anthevolume ofrepartraffc repar own evolveasafunctonof an foracoewth k = 3an h = 3.Inpartcularall thevaluesarerelatvetothepeceszeanthevolumeof repar traffc requre by a tratonal erasure coe, whch n the framework of Regeneratng Coes woul correspon to RC(3, 3, 3, ),.e.wth = 3an =.Asescrbe 5.Wereformulate theexpressons gven n[7]nafferent wayto facltate the successve computatons. pece stretch repar own reucton (a) pece =31 = =15 =7 = (b) repar own = =3 =7 =15 =31 Fgure 1. Sze of the peces an repar communcaton cost (n log-scale) normalze by the reference values of a tratonal erasure coe, forrc(3, 3,, ). n the prevous secton these reference values are: pece = fle /3an repar own = fle. We see that movng to larger repar egree an to larger pece sze(ncreasng the pece expanson factor ) t s possble to obtan an mpressve reucton of the repar traffc. Authors n [7] entfy two notable cases for the values = an = k 1.For =,theszeofthepeces stays constant at the mnmum possble sze an the coes are calle Mnmum Storage Regeneratng coes(msr). For = k 1,repartraffcsmnmzeanthecoesare calle Mnmum Banwth Regeneratng coes(mbr). 3. Ranom Lnear Implementaton Exstng works on Regeneratng Coes[7],[9] present the theoretc framework that supports the constructon of Regeneratng Coes an gve an ntuton for a possble mplementaton base on ranom lnear coes, wthout provng etals. We propose a precse escrpton of such an mplementaton an scuss ts practcal mplcatons Tratonal Ranom Lnear Coes LetusfrstexplanhowRanomLnearCoesworkfor the case of tratonal erasure coes. The essence of ranom lnear coes s that all the operatons are lnear operatons

4 overagalosfelonfxeszeatafragments.aganwe escrbe these operatons followng the lfe cycle of a fle. 1) Inserton:Inthsphasewehavetocreate k+hpeces ofsze fle /k.toothat,tsenoughtobreakthe flen n fle = kequalsze(orgnal)fragments,an computeanyofthe k + hpecesasaranomlnear combnaton of them. The ranom coeffcents use for such combnatons are store along wth the peces. ) Mantenance: As alreay explane, a repar n tratonal erasure coes requres the transfer of the whole pece from partcpatng peers to the newcomer. The newcomer then buls the new pece performng a ranom lnear combnaton of the receve peces. Agan the resultng coeffcents are store along wth the new pece. 3) Reconstructon: The owner of the fle ownloas k pecesfrom k otherpeersanuses these peces to reconstruct the fle. The proceure conssts of nvertng, f possble, the matrx compose by the coeffcents of all the receve peces, an multplyng thenvertematrxbythepeces.theresultsofsuch a multplcaton are the orgnal fragments,.e. the orgnal fle. Theory on Ranom Lnear Network Coes[11],[1],[13] says that the probablty to successfully nvert the matrx upon reconstructon epens only on the sze of the Galos Fel an that ths probablty can be mae arbtrarly close to 1 by ncreasng the sze of the Galos Fel. For all practcalpurposesafelszeequalto 16 sconsere suffcent. 3.. Ranom Lnear Regeneratng Coes In tratonal erasure coes, ranom lnear mplementaton s straghtforwar, because all the operatons are performe onasetofpeces,whchmeansthattheszeofthepece canbeuseasthebascuntofnformatonnallthelnear combnatons an n the econg. In Regeneratng Coes thngs are fferent because they allowthattheamountofatastore pece,snotnecessarlyequaltotheamountofatatransmttebyapartcpantuponarepar repar up anthattheamountofata ownloaebyanewcomer repar own snotamultpleof pece. Inotherworsthebascuntofnformaton,whchsthe szeofthefragmentswebreaktheorgnalflento,cannot betheszeofthepeceanymore.ifweenotethsszeas fragment, we can wrte the constrants t has to fulfll: fle = n fle fragment pece = n pece fragment repar up = n repar fragment (E3) where n fle, n pece an n repar arentegers.usngequatonsn secton., we can compute: pece p(, ) = repar up r(, ) = k an: fle repar up = 1 k( k + 1) + (k 1) = r(, ) Bothratosarentegers.Thsmeansthatwecanset n repar = 1,whchcorresponstosettng fragment = repar up,an consequently: k( k+1)+(k 1) n fle = n pece = k (E4) Gven these parameters we can escrbe the operatons neee n Ranom Lnear Regeneratng Coes: 1) Inserton:Webreaktheflen n fle equalszeorgnal fragments, an compute any of the k + h peces as n pece ranomlnearcombnatonsof them. The ranom coeffcents use for such combnatons are storealongwththepece.theyforma(n pece, n fle ) matrx 6. ) Mantenance: A repar nvolves exstng peers, whchsenatatothenewcomer.theatasentby anyofthe peerscorrespontotheresultsofone ranom lnear combnaton of the n pece fragments contane n the store pece, as epcte n fgure Fg. (a). The newcomer receves thus fragments an the corresponng coeffcents an obtans ts new peceas n pece ranomlnearcombnatonsofthem,as epcte n Fg. (b). Note that n the partcular case of = n pece thenewcomeroesnotneetoperform lnear combnatons of the receve fragments, snce they consttute alreay the new pece. 3) Reconstructon: The owner of the fle ownloas k pecesfrom k peers,whchcorresponto n pece k fragments, along wth the coeffcents whch form a (n pece k, n fle )matrx.ittrestofn n fle nepenent rows n the coeffcent matrx, then t nverts the resultng square submatrx an fnally multples ths matrx by the concerne fragments. An mportant remark s that f the fle owner ownloas k peces, t potentally ownloas an amount of ata qute bgger than the flesze.in[7]tsclamethatthscanrepresent a sgnfcant rawback for Regeneratng Coes. In our mplementaton, we elmnate ths shortcomng: we ownloa only the coeffcents, we extract a fullrank square submatrx, we nvert t, an fnally we ownloaonlythe n fle fragmentscorresponngtothe nvertble submatrx that was extracte. In ths way we ownloaalwaysanamountofataequaltothefle sze, wthout payng any extra-cost. 6.In ournotaton a (n, m) matrx samatrx wth nrows an m columns.

5 4.1. Impact of coeffcents (a) Partcpant se (b) Newcomer se Fgure. Repar scheme on the partcpant se an on the newcomer se. Every arrow ncates a partcpaton to a ranom lnear combnaton. 4. Analytcal Evaluaton In ths secton we perform an analytcal evaluaton of the Ranom Lnear Regeneratng Coes. To o ths, we gve a formal escrpton of the lnear operatons performe. All the ata we hanle can be nterpreteas a sequence of values, calle elements, n a gven Galos Fel. Usually theszeofsuchfelschosentobeequalto q,snce thsspeesupthecomputaton.inthscaseeveryvalues asequenceof qbts,acommonchoces q = 16,whch correspons to an element sze of bytes. Every fragment sthusrepresentebyavectorof l frag = ( fragment /q) elements.thewholeflesthusrepresentebya(n fle, l frag ) matrx,enoteas F nfle,l frag.asetof nencoefragments srepresenteasa(n, l frag )matrx E n,lfrag 7,thsmatrxcan bealwaysrepresenteasasetoflnearcombnatonsofthe orgnal fragments: f n,lfrag = C n,nfle F nfle l frag where C n,nfle areelementsnthefelanrepresentthe coeffcents assocate wth the set of fragments. coeffcent overhea =31 = =15.1 =7 = Fgure 3. Coeffcent overhea (n log-scale) of RC(3, 3,, ) for a 1 MByte fle. 7.Inournotaton F n,mcorresponstoasetoforgnalfragments,whle E n,mtoasetofencoefragments. Thefrstquestonwearesssthempactofthecoeffcents n the storage an n the communcaton costs. Snce wtheveryfragment,weassocateasetof n fle coeffcents, the relatve mpact of the coeffcents s gven by the rato: r coeff = n fleq fragment = n fle fle q ths rato can be nterprete as the overhea ue to coeffcents: for every bt of ata we nee r coeff bts of coeffcents. Note that ths rato s nversely proportonal wththeszeoftheflewestore,thsmeans,asonecoul expect, that the bgger the fle the smaller s the coeffcent overhea. More mportantly, the overhea ncreases wth the squareof n fle,whchncreasessgnfcantlyaswencrease the parameters an n Regeneratng Coes(see eq. E4). To unerstan the mpact of ths atonal cost, let us conser the class of regeneratng coes RC(3, 3,, ) an letusassumethatthefelszes q = 16,whchcorrespons toanelementszeofbytes.infg.3weplotthevaluesof the coeffcent overhea when the orgnal fle sze s fle =1 MByteforallthepossblevaluesof an. Forsuchasmallflesze,thecoeffcentoverheasnot neglgble: n the most expensve confguraton for 1 bt ofata,morethan4btsofcoeffcentsareneee,whch s clearly unacceptable. By ncreasng the fle sze, ths overheaecreases 8.Themplcatonoffgure3sthatwhen usng Regeneratng Coes, system esgners nee to choose a mnmum sze for storage objects that s sgnfcantly bgger than for tratonal erasure coes. 4.. Computatonal Complexty Oneofthemanconcernsntheemploymentofcongn real systems s the computatonal effort that they requre. In ths secton we propose a formal analyss of Ranom Lnear Regeneratng Coes. All the operatons are performe n Galos Fels. Therefore, we nee to make sure to control the cost of the operatonsbychoosngtherghtfelsze.ifwesetthe felszeequalto q,wth q = 16alltheoperatonsare performe on unsgne short ntegers( bytes). In ths case Atons an subtractons correspon to an XOR operaton between two elements. Multplcaton an vson are performe n the logspace.forexample: a bbecomes exp(log a + log b). logan expforallthepossblevaluesnthefelare compute offlne an store, whch requres 56 KB ofmemoryfor q = 16.Theoperatons logan exp canthenbemplementeasvaluelookupsnavector, 8.Theactualoverheasgvenbythevaluesshownnfgure3ve bythefleszenmbytes

6 whch allows to mplement vsons an multplcaton n3lookupsan1aton. All the operatons we perform n Regeneratng Coes can be reuce to:(1) Lnear Combnatons an() Matrx nversons. Let us analyze them n etals: 1) A lnear combnaton of n vectors of length l conssts n n latonsan n lmultplcatonsforatotalof 5nl operatons. ) Thenversonofasquare (n, n)matrxconsstsn n 3 atonsan n 3 multplcatonsthatcanbemplemente 5n 3 operatons.actuallyforregeneratng Coes the stuaton s slghtly fferent: we have a (m, n) matrx, m n from whch we nee to extract n rows that are lnearly nepenent, whch wll result n a (n, n) submatrx that can then be nverte. Extracton an nverson are one n parallel an the cost wll vary accorngly to the partcular matrxbetweenthebouns 5n 3 an 5mn. Nowwehaveallthebasctoolstocomputethecomplexty of Regeneratng Coes along the lfetme of a fle: 1) Inserton:Inthsphaseweperform (k+h) n pece lnearcombnatonsof n fle fragmentsforatotalnumber of operatons equal to: CPU(encong) = 5(k + h) n fle n pece l frag Usng the efntons of the fferent parts we obtan: CPU(encong) = 5 (k + h) n pece fle (E5) ) Mantenance: As alreay explane, n a repar, part oftheworksoneonthepartcpatngpeersan another part s one on the newcomer. On every partcpatng peer we perform one lnear combnaton of n pece fragments,whchcorresponsto: CPU(repar) up = 5 n pece l frag ong some manpulatons we obtan that the number ofoperatonssproportonaltotheszeofthepece expresse n bytes: CPU(repar) up = 5 pece (E6) Onthenewcomerweperform n pece lnearcombnatons of fragments, whch correspons to: CPU(repar) own = 5 n pece l frag = CPU(repar) up (E7) Note that every fragment s also assocate wth a set of coeffcents. Ths means that every tme that a new fragment s generate as a lnear combnaton of other exstng fragments, ths operaton must be performe also on the corresponent coeffcents, n orer to obtan the coeffcents assocate wth the new fragment. In terms of computaton cost, ths can be taken nto account assumng that the fragment sze s vrtually ncrease by the sze of coeffcents, whch sgvenbytheoverheansecton4.1. 3) Reconstructon: We can splt the reconstructon n twophases:(1)weneetoextract n fle lnearnepenentrowsfromak n pece n fle matrx,anthennvert the obtane submatrx() We multply ths submatrx by the corresponent encoe fragments. Accorng tothesetwophases,thecostofreconstructoncanbe splt n two components as well: CPU(reconstructon) = CPU(nverson)+CPU(econg) As explane before the cost of the nverson s boune by two lmts: 5 n 3 fle <CPU(nverson) < 5 k n pece n fle (E8) Theecong,then,corresponsto n fle lnearcombnatonsof n fle fragments,whchleasto: CPU(econg) = 5 n fle l frag = 5 n fle fle Notethatallthecosts,exceptfromthenversoncost,are lnearly epenent to the fle sze fle (Ths hols also for repar, snce pece s n turn proportonal to fle ). 5. Expermental Evaluaton In ths secton we evaluate the resource requrements of Regeneratng Coes. For ths purpose, we wrote an optmze C mplementaton of Ranom Lnear Regeneratng Coes thatwe executeonan IntelCore DuoCPU at.66ghz. We execute all the operatons performe n the lfe cycle ofastorefle,asescrbensecton4,anmeasurethe tme neee to perform these operatons. All the experments have been one for a fle of 1 MByte n sze an the RegeneratngCoeparametersarefxeto k = 3, h = 3, ancantakeallpossblevaluesfor an Computatonal Cost To have a bass for comparng fferent confguratons of Regeneratng Coes, we frst show the results obtane for a tratonal erasure coe,(.e. a Regeneratng Coe wth RC(3, 3, 3, ))whenafle of 1MBytesstore.Let t, enotethetmeneeebyapartcularoperatonfor a Regeneratng Coe RC(3, 3,, ). The followng table showsthetme t 3, neeeforeachoperaton: t 3, [sec] Encong.5 Partcpant Repar Newcomer Repar.1 Matrx Inverson. Decong.5

7 computaton overhea computaton overhea computaton overhea computaton overhea computaton overhea (a) Encong (b) Repar: Partcpant se (c) Repar: Newcomer se () Reconstructon: Matrx Inverson (e) Reconstructon: Decong Fgure 4. Computaton overhea for RC(3, 3,, ) Note that the partcpant repar has a computaton tme of zero because n tratonal erasure coes repars o not requre any computaton at the partcpant se, whch smply sens to the newcomer the entre pece. Let us now ntrouce the results obtane for the general case of Regeneratng Coes RC(3, 3,, ). To unerstan the computatonal overhea of these coes, we conser the ratobetweenthetme t, anthetme t 3, measurefor tratonal erasure coes. We call ths rato computaton overhea r cpu : r cpu = t, t 3, The computaton overhea tells us how much a gven Regeneratng Coe s slower than a tratonal erasure coe. Followngthelfecycleofaflewehave: 1) Inserton: We show n Fg. 4(a) the computaton overheaofthentalencongofthefle.wesee thattheoverheagrowslnearlywth an.ths sconsstentwtheq.e5,whchsaysthatthecosts proportonalto n pece,whchsnturnlnearwth an aswecanseefromeq.e4. ) Mantenance: Fg. 4(b) shows the computaton overheaonthepartcpantse 9,nthscasethecomputaton overhea grows slghtly more than lnearly wth an,snceasweknowfromeq.e6tsproportonal tothepecesze,whchnturnhasthebehavorshown n Fg. 1(a). Fg. 4(c) shows the computaton overhea on the newcomer se. From eq. E7, ths cost s proportonal to tmes the cost on the partcpant se, whch s confrme by the roughly quaratc relaton wth shownbytheplot.notethatfor = k 1 the overhea falls to zero, snce for ths confguraton the newcomer oes not nee to combne the receve blocks, but smply stores them(c.f. secton 3.). 3) Reconstructon: The reconstructon requres the nverson of the matrx coeffcents an then the econg of the fragments. Fg. 4() shows the computaton overhea for the nverson, whch as we know from eq.e8growsroughlyas n 3 fle.inversoncanbecomputatonally very expensve, n partcular for large values of an. Fg. 4(e) shows the computaton overhea of the econg, whose shape closely resembles the one for encong(see Fg. 4(a)), whch s expecte snce both perform analogous operatons. 5.. Bottleneck Network Banwth As outlne n secton.1, a reunancy scheme ntrouces three fferent costs, namely computaton, storage 9.Notethatthscostsequaltozerontratonalerasurecoes,for ths reason the normalzaton s one by the smallest value larger than zero whchoccursfor = 33an = ansequalntermsofcomputaton tme to.3 sec.

8 Bottleneck Network Banwth Communcaton Storage Encong Repar Reconstructon Partcpant Newcomer Matrx Inverson Decong repar own storage Mbps Mbps 7.8 Mbps 4.6 Mbps 1MB MB Kbps 11.Mbps 1.Mbps 383Kbps 48Kbps 4.47KB.61MB Mbps 1.6Mbps 1.6Mbps 1.6Mbps 1.3Mbps 6.18KB 3.76MB Mbps 7.5Mbps 76.8Mbps 1.5Mbps.5Mbps 18.4KB.6MB Table 1. Resource requrements ofrc(3, 3,, ) for a 1 MByte fle. an communcaton. So far we have only consere computaton. However, what we are really ntereste n s to evaluate whch resource(computaton or communcaton) s the overall performance bottleneck of the system. In a strbute storage system the ata hanle must be transferre over the network. Let us assume that the transfer operaton s ppelne wth the cong, whch means n the case of nserton that each fragment s transmtte as soonastsproucebythentalencongstep.ifthe transfer takes longer than the computaton, then the bottleneck s communcaton, an the use of a computatonally more effcent coe wll not make the nserton operaton faster. Ths means that whether or not computaton has an mpact on the overall performance of the system epens on the avalable network banwth of the partcpatng peers. For ths purpose we want to know the mnmum network banwth of a peer, for whch the computaton represents the bottleneck for the overall performance. We call ths banwth bottleneck network banwth, whch senoteasbnb. The bottleneck network banwth can be compute as thebanwthforwhchthetransfertmesequaltothe computatontme.if t, enotesthetmeneeetoperform anoperatonforrc(3, 3,, )an ata, enotesthe amountofatahanlebythatoperatonthatneetobe transmtte over the network. We have: bnb, = ata, t, From the above efnton t s clear that the bottleneck network banwth also gves the amount of ata that can be processe by the cong/econg operaton. Thevaluesof ata, forthefferentoperatonsare compute as follows: Encong: Ths operaton prouces the (k + h) ntal peces.theamountofataproucethatssentover the network s gven by the sze of these peces: ata = (k + h) pece. Partcpant Repar: Ths operaton prouces a sngle fragment plus the corresponng coeffcents. The amountofatathatssentoverthenetworks: ata = (1 + r coeff ) fragment. Newcomer Repar: Ths operaton prouces a new pece an hs coeffcents from receve fragments an ther coeffcents. The amount of ata that s recevefromthenetworksgvenbytheszeof fragments plus the corresponng coeffcents: ata = (1 + r coeff ) fragment. Inverson: Ths operaton extracts n fle nepenent rowsformthereceve (k n pece, n fle )matrx(whch escrbes the k peces use for reconstructon), an nverts the submatrx obtane. Ths means that the amountofatathatsreceveforthsoperatons gvenbytheszeofthecoeffcentsofthe kpeces: ata = k r coeff pece. Decong: Ths operaton prouces the orgnal fle by multplyng the matrx obtane from the nverson by the corresponent encoe fragments. The amount of atathatsreceveforthsoperatonssgvenbythe szeof n fle fragments,.e.theflesze: ata = fle. Table 1 shows the bottleneck network banwth for all theoperatonsnthelfecycleofafleforfferentvalues of,.thelasttwocolumnsshowthevolumeofrepar traffc repar own anthetotalamountofatastorenthe system storage. Thefrstrowwth = 3, = presentstheresults for a tratonal erasure coe, whch mnmzes the storage requrementattheexpenseofaverylargevolumeofrepar traffc( repar own = fle ).Inrowtwoweconseracoe wth = 63 an = 3, whch mnmzes the repar traffc. However, as we know from fgure 4 ths partcular coe has the hghest computatonal costs, whch result n bottleneck network banwth values that can be as low as a few hunre Kbps. However, f we remember the results presente n Fg. 1(b), whch shows the savngs n repar traffc for Regeneratng Coes, we know that most of the savngs are alreayachevebyqutesmallvaluesof,.e.where = k orwhere sslghtlylargerthan k.forthsreason,thenext two rows of table 1 conser Regeneratng Coes wth values of = 3an = 4thatllustratehowwecantraeoff storage requrement an repar traffc: Ifwehaveplentyofstoragespace,wecanuseabg valueforthepeceexpansonnex :For = 3, = 3thestoragespacerequreascomparetotheone requre by tratonal erasure coes almost oubles. However, the reucton n repar traffc as compare to tratonal erasure coes s stll almost as goo as for theregeneratngcoewth = 63, = 3,whch mnmzes the repar traffc. Ontheotherhanfstoragespacematters,wecan chooseacoewthasmall,anaslghtlylarger

9 than k, whch stll preserves most of reucton n repar traffc.resultsfor = 4, = 1areshownnthefourth rowoftable1.ifwecomparetheresultstothebestone achevable for each resource(see frst two rows), we see that we acheve a close to mnmal storage requrement (.6MBvs..MB),anarepartraffc(18.4 KB)thatsalmostoneorerofmagntuelessthan for tratonal erasure coes. From the results presente so far, we can conclue that Regeneratng Coes, as compare to tratonal erasure coes, can prove substantal reuctons n repar traffc, atalmostnoextracostntermsofstoragespacerequre. However,thsgancomesattheprceofamuchhgher computatonalcostascanbeseenwhenlookngattheencong an reconstructon performance, whch s nearly one orer of magntue lower than for tratonal erasure coes. Wth the current mplementaton, we can encoe/ecoe n theorerof1gbyteofataperhour. Thsperformancemaybetoolowforalargeatacenter. However, we feel that Regeneratng Coes are best sutable forthosesystemsthatonotnsertorretreveverylarge amountsofataanthatneetooasgnfcantamount of repars: An example s gven by peer-to-peer ata backup systems where the ata mantenance ue to the hgh noe churn, s far more frequent than ata nserton or retreval. avalable banwth to carry repar traffc s lmte, as s for nstance the case n Internet-we peer-to-peer backup systems. Asfuturework,weplantoeployRanomLnearRegeneratngCoesnarealPPstoragesystem.Wewantto compare the performance of Regeneratng Coes to other exstng solutons, n partcular tratonal erasure coes an Herarchcal Coes[8], uner fferent contons wth respect to ata volume an avalable banwth. References [1] A.Aya,W.Bolosky,M.Castro,G.Cermak,R.Chaken, J.Douceur,J.Howell,J.Lorch,M.Themer,anR.Wattenhofer, Farste: Feerate, avalable an relable storage for an ncompletely truste envronment, n OSDI,. [] F. Dabek et al., We-area cooperatve storage wth CFS, n SOSP, 1. [3] A. Haeberlen, A. Mslove, an P. Druschel, Glacer: Hghly urable, ecentralze storage espte massve correlate falures, n NSDI, 5. [4] H. Weatherspoon, Desgn an evaluaton of strbutewearea on-lne archval storage systems, Ph.D. ssertaton, Unversty of Calforna, Berkeley, 6. [5] R. Rorgues an B. Lskov, Hgh avalablty n DHTs: Erasure cong vs.replcaton, n IPTPS, 5. [6] H. Weatherspoon an J. D. Kubatowcz, Erasure cong vs. replcaton: A quanttatve comparson, n IPTPS,. [7] A. G. Dmaks, B. Gofrey, Y. Wu, M. J. Wanwrght, an K. Ramchanran, Network cong for strbute storage systems, Computer Research Repostory (CoRR), vol. arxv:83.63v1 Mar. 8. Fgure 5. Illustraton of the trae-offs prove by Regeneratng Coes. 6. Concluson Regeneratng Coes can be seen as a generalzaton of prevously known reunancy schemes base on replcaton anerasurecoes.theyallowtotraeoffnotonlycommuncaton an storage requrements, but also computatonal costs. We schematcally epct ths trae-off n fgure 5. We propose a practcal mplementaton of Regeneratng Coes, base on Ranom Lnear Coes. We presente an evaluate ts performance trae-offs. We saw that the mportantsavngsproventermsofrepartraffconotcome for free, as Regeneratng Coes have much lower cong an econg rates. However,wefeelthatRegeneratngCoeshavealotof potental n envronments where repars are frequent an the [8] A. Dumnuco an E. Bersack, Herarchcal coes: How to make erasure coes attractve for peer-to-peer storage systems, n IEEE PP, 8. [9] Y. Wu, A. Dmaks, an K. Ramchanran, Determnstc regeneratng coes for strbute storage, n Annual Allerton Conference, 7. [1] J. S. Plank, A tutoral on Ree-Solomon cong for faulttolerance n RAID-lke systems, Software Practce & Experence, vol. 7, no. 9, pp , September [11] S.Aceacnsk,S.Deb,M.Mear,anR.Koetter, How goo s ranom lnear cong base strbute networke storage? n NETCOD, 5. [1] S.-Y. R. L, R. W. Yeung, an N. Ca, Lnear network cong, IEEE Transactons on Informaton Theory, vol. 49, no., February 3. [13] R.Ahlswee,N.Ca,S.-Y.R.L,anR.W.Yeung, Network nformaton flow, IEEE Transactons on Informaton Theory, vol.46,no.4,july.

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes The Desgn of Effcently-Encoable Rate-Compatble LDPC Coes Jaehong Km, Atya Ramamoorthy, Member, IEEE, an Steven W. McLaughln, Fellow, IEEE Abstract We present a new class of rregular low-ensty party-check

More information

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam DEGREES OF EQUIVALECE I A EY COMPARISO Thang H. L., guyen D. D. Vetnam Metrology Insttute, Aress: 8 Hoang Quoc Vet, Hano, Vetnam Abstract: In an nterlaboratory key comparson, a ata analyss proceure for

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs

RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs RSA Cryptography usng Desgne Processor an McroBlaze Soft Processor n FPGAs M. Nazrul Islam Monal Dept. of CSE, Rajshah Unversty of Engneerng an Technology, Rajshah-6204, Banglaesh M. Al Mamun Dept. of

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Decomposition Methods for Large Scale LP Decoding

Decomposition Methods for Large Scale LP Decoding Decomposton Methos for Large Scale LP Decong Sharth Barman Xshuo Lu Stark Draper Benjamn Recht Abstract Felman et al. IEEE Trans. Inform. Theory, Mar. 2005) showe that lnear programmng LP) can be use to

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree

Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree Effcent Algorthms for omputng the Trplet an Quartet Dstance Between Trees of Arbtrary Degree Gerth Støltng Broal, Rolf Fagerberg Thomas Malun hrstan N. S. Peersen, Anreas San, Abstract The trplet an quartet

More information

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. We characterze all cyclotomc polynomals of even egree wth coeffcents restrcte to the set {+1, 1}. In ths

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

On the computation of the capital multiplier in the Fortis Credit Economic Capital model

On the computation of the capital multiplier in the Fortis Credit Economic Capital model On the computaton of the captal multpler n the Forts Cret Economc Captal moel Jan Dhaene 1, Steven Vuffel 2, Marc Goovaerts 1, Ruben Oleslagers 3 Robert Koch 3 Abstract One of the key parameters n the

More information

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org A Bnary Quantum-behave Partcle Swarm Optmzaton Algorthm wth Cooperatve

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

On the Optimal Marginal Rate of Income Tax

On the Optimal Marginal Rate of Income Tax On the Optmal Margnal Rate of Income Tax Gareth D Myles Insttute for Fscal Stues an Unversty of Exeter June 999 Abstract: The paper shows that n the quas-lnear moel of ncome taxaton, the optmal margnal

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

An algorithm of choosing LSPs in the MPLS network with unreliable links

An algorithm of choosing LSPs in the MPLS network with unreliable links Ireneusz OLSZESKI Unversty of Technology an Lfe Scences n Bygoszcz, Faculty of Telecommuncatons an Electrcal Engneerng An algorthm of choosng LSPs n the MPLS network wth unrelable lnks Streszczene. pracy

More information

Exact GP Schema Theory for Headless Chicken Crossover and Subtree Mutation

Exact GP Schema Theory for Headless Chicken Crossover and Subtree Mutation Exact GP Schema Theory for Healess Chcken Crossover an Subtree Mutaton Rccaro Pol School of Computer Scence The Unversty of Brmngham Brmngham, B5 TT, UK [email protected] Ncholas F. McPhee Dvson of Scence

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

Present Values and Accumulations

Present Values and Accumulations Present Values an Accumulatons ANGUS S. MACDONALD Volume 3, pp. 1331 1336 In Encyclopea Of Actuaral Scence (ISBN -47-84676-3) Ete by Jozef L. Teugels an Bjørn Sunt John Wley & Sons, Lt, Chchester, 24 Present

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Distributed Strategic Learning with Application to Network Security

Distributed Strategic Learning with Application to Network Security Amercan Control Conference on O'Farrell Street San Francsco CA USA June 9 - July Dstrbute Strategc Learnng wth Applcaton to Network Securty Quanyan Zhu Hamou Tembne an Tamer Başar Abstract We conser n

More information

A General and Practical Datacenter Selection Framework for Cloud Services

A General and Practical Datacenter Selection Framework for Cloud Services 212 IEEE Ffth Internatonal Conference on Clou Computng A General an Practcal Datacenter Selecton Framework for Clou Servces Hong Xu, Baochun L henryxu, [email protected] Department of Electrcal an Computer

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Cluster Analysis. Cluster Analysis

Cluster Analysis. Cluster Analysis Cluster Analyss Cluster Analyss What s Cluster Analyss? Types of Data n Cluster Analyss A Categorzaton of Maor Clusterng Methos Parttonng Methos Herarchcal Methos Densty-Base Methos Gr-Base Methos Moel-Base

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Institut für Informatik der Technischen Universität München. MISTRAL: Processing Relational Queries using a Multidimensional Access Technique

Institut für Informatik der Technischen Universität München. MISTRAL: Processing Relational Queries using a Multidimensional Access Technique Insttut für Informatk er Technschen Unverstät München MISTRAL: Processng Relatonal Queres usng a Multmensonal Access Technque Volker Markl Preface Classcal one mensonal B-trees have been the stanar access

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

High Performance Latent Dirichlet Allocation for Text Mining

High Performance Latent Dirichlet Allocation for Text Mining Hgh Performance Latent Drchlet Allocaton for Text Mnng A thess submtte for Degree of Doctor of Phlosophy By Department of Electronc an Computer Engneerng School of Engneerng an Desgn Brunel Unversty September

More information

The EigenTrust Algorithm for Reputation Management in P2P Networks

The EigenTrust Algorithm for Reputation Management in P2P Networks The EgenTrust Algorthm for Reputaton Management n P2P Networks Sepandar D. Kamvar Stanford Unversty [email protected] Maro T. Schlosser Stanford Unversty [email protected] Hector Garca-Molna

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES

APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES Harsh Kumar G R * an Dharmenra Sngh ([email protected], [email protected]) Department

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

Small-Signal Analysis of BJT Differential Pairs

Small-Signal Analysis of BJT Differential Pairs 5/11/011 Dfferental Moe Sall Sgnal Analyss of BJT Dff Par 1/1 SallSgnal Analyss of BJT Dfferental Pars Now lets conser the case where each nput of the fferental par conssts of an entcal D bas ter B, an

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BUILDING SYSTEM

PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BUILDING SYSTEM 3 th Worl Conference on Earthquake Engneerng Vancouver, B.C., Canaa August -6, 4 Paper No. 54 PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BILDING SYSTEM Joonam PARK, Barry

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Reliable State Monitoring in Cloud Datacenters

Reliable State Monitoring in Cloud Datacenters Relable State Montorng n Cloud Datacenters Shcong Meng Arun K. Iyengar Isabelle M. Rouvellou Lng Lu Ksung Lee Balaj Palansamy Yuzhe Tang College of Computng, Georga Insttute of Technology, Atlanta, GA

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information