Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput

Size: px
Start display at page:

Download "Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput"

Transcription

1 Bndwidth Alloction for Best Effort Trffic to Achieve 100% Throughput Msoumeh Krimi, Zhuo Sun, nd Deng Pn Florid Interntionl University, Mimi, FL E-mils: {mkri001, zsun003, Abstrct Generlized Processor Shring (GPS) is powerful model nd there re mny prcticl scheduling lgorithms tht cn perfectly emulte it. GPS is widely used s n idel firness model to schedule pckets for gurnteed performnce trffic. However, there hs not been wy for GPS to properly hndle the best effort trffic. In this pper, we propose bndwidth lloction scheme for GPS clled Queue Length Proportionl (QLP) in crossbr switches without speedup. QLP dynmiclly obtins fesible bndwidth mtrix to schedule best effort flows. In QLP, the mount of service tht ech flow receives is proportionl to the length of its bcklogged queue. We nlyticlly prove tht QLP is strongly stble nd hence provides 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. Moreover, we show tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. We lso discuss how to trck the queue length in GPS. Finlly, we perform simultions to verify the theoreticl results nd to mesure the performnce of QLP. I. INTODUCTION Generlized Processor Shring (GPS) hs long been known s simple nd powerful fluid model for trffic scheduling [1]. All fir queueing lgorithms ultimtely emulte the GPS idel model becuse it chieves perfect firness for pcket scheduling [2], [3], [4]. GPS is theoreticl fluid model nd divides the vilble bndwidth into logiclly independent chnnels. Thus, trffic of ech flow is smoothly trnsmitted through its own exclusive chnnel from the input port to the output port. GPS is widely used s n idel firness model to schedule pckets for gurnteed performnce trffic. However, there hs not been wy for GPS to properly hndle the best effort trffic. The objective of this pper is to ddress the pproprite scheduling of best effort trffic in order to be employed in crossbr switches. Crossbr switches hve received significnt ttention due to the non-blocking cpbility nd lrge bndwidth utiliztion in comprison with bus bsed switches [6], [7]. The chllenge of bndwidth lloction in crossbr switch is how to efficiently shre the vilble cpcity of ech input port nd output port. Simple proportionl bndwidth lloction for shred link is not proper for crossbr switches [8], [9] becuse flows of switch re subject to two bndwidth constrints: the vilble bndwidth t both the input port nd output port of the flow. The scheme should be efficient to fully utilize the vilble bndwidth, nd should be fesible in order to be pplied in prctice. Our motivtion for this work rises from the fct tht in crossbr switches we need to dynmiclly obtin n dmissible bndwidth mtrix to properly hndle best effort trffic. Gurnteed performnce flows reserve resources for n llocted trnsmission rte [10]. However, best effort flows try to mke the best use of the vilble trnsmission cpcity but hve no gurntee to the qulity of service [7]. As cn be seen, the bndwidth lloction scheme plys severl importnt roles in gurnteeing the high performnce of switch [11]. First, the scheme helps to determine the trffic dmission policy nd buffer mngement strtegy. Second, n efficient scheme mkes it possible for switch to chieve 100% throughput. Third, the scheme is used s the scheduling criterion by fir scheduling lgorithms. There re mny fir scheduling lgorithms designed for bndwidth lloction in different crossbr switch rchitectures [2], [3], [12], [13], [14], [15]. However, most of them focused on providing qulity of service for gurnteed performnce trffic nd there is reltively less work on how to better support best effort trffic. In this pper, we present bndwidth lloction scheme for GPS clled Queue Length Proportionl (QLP) to properly hndle best effort trffic in crossbr switches without speedup. In QLP, the mount of service tht ech flow receives, or its dedicted bndwidth, is proportionl to the length of its bcklogged queue. QLP essentilly fvors the queues with the gretest occupncy nd thus ssists the crossbr switch to be more work-conserving. We conduct theoreticl nlysis to prove tht QLP is strongly stble nd therefore chieves 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. We lso show tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. Furthermore, we discuss how to trck the queue length is GPS. Lstly, we conduct simultions to verify the nlyticl results nd to mesure the performnce of QLP. The orgniztion of this pper is s follows. In Section II, we present the bstrct switch model nd the QLP bndwidth lloction scheme. In Section III, we theoreticlly nlyze the stbility nd throughput of QLP nd then provide some discussions. We show the simultion results in Section IV. Finlly, we conclude the pper in Section V. II. QUEUE LENGTH POPOTIONAL (QLP) SCHEME In this section, we present our bndwidth lloction scheme. First, we briefly explin the switch model. Then, we describe the QLP bndwidth lloction lgorithm for best effort trffic.

2 A. The Abstrct Switch Model The considered switch rchitecture includes N input ports nd N output ports, connected by crossbr with no internl speedup. Let In i denote the i th input port nd Out j denote the j th output port. The vilble bndwidth of ech input port nd output port nd lso the crossbr is. Define the trffic from In i destined to Out j to be flow F ij. Use ij (t) to represent the llocted bndwidth of F ij t time t. Denote the queue of pckets t In i destined to Out j s Q ij. B. Algorithm Description In this subsection we present our Queue Length Proportionl (QLP) bndwidth lloction scheme nd investigte its fesibility property. As mentioned erlier, simple proportionl bndwidth lloction policy of GPS does not pply to switches [8], [9], [11]. For GPS server works t fixed bndwidth, the φ rte of j will gurntee the performnce of ech flow, j φj where φ j is the weight of ech flow [1]. However in contrst with single server, flows of switch re subject to two bndwidth constrints: the vilble bndwidth t both the input nd output port of the flow. Nive bndwidth lloction t the output port my mke the flows violte the bndwidth constrints t their input ports, nd vice vers. QLP dynmiclly ssigns the bndwidth to ech best effort flow proportionl to the bcklogged queue length. We use queue length Q ij (t) s dynmic weight of ech flow F ij nd define Q j (t) = i Q ij(t) to be the number of bits queued t ll input ports directed to prticulr Out j t time t, nd Q i (t) = j Q ij(t) to be the number of bits queued t prticulr In i destined to different output ports t time t. We lso denote the llocted bndwidth of flow F ij respecting to the constrint of ech input port nd output port s i.in(t) nd j.out (t), ccordingly. eclling the GPS fluid model, trffic of ech flow cn smoothly strem from the input port to the output port through its own exclusive chnnel, without buffering in the middle, s illustrted in Figure 1. Thus, by considering the bndwidth constrints t both the input port nd output port of ech flow F ij we hve ij.in (t) = Q ij(t) Q i (t) = Q ij(t) j Q ij(t) (1) ij.out (t) = Q ij(t) Q j (t) = Q ij(t) i Q ij(t) (2) In order to void bndwidth violtion t the input port nd the output port, we consider the overll llocted bndwidth ij (t) of F ij to be the minimum [8] between two clculted bndwidths s follows ij(t) = min{ij.in (t), ij.out (t)} (3) = min{ Q ij(t) Q i (t), Q ij(t) } (4) Q j (t) Q ij (t) = mx{q i (t), Q j (t)} (5) As cn be seen, QLP bndwidth lloction scheme essentilly fvors the queues with the gretest occupncy. It trets ll Input 1 Input i 1 = j 1 j Input i = j ij N = j Nj Fig F11 Output F 1 i1 F N1 1 = i i1 F Nj F 1 j F 1 N Output F j Output ij F in F NN j = N = i ij i in GPS idel fluid model used for scheduling in crossbr switch. queues firly nd ssists the crossbr switch to be more workconserving [20]. One of the dvntges of our scheme is its simplicity. It does not require ny sorting or re-sorting process. Using the clculted informtion of the queue lengths, QLP just needs to find the mximum between the ggregted queue length of flows witing in prticulr input port nd flows directed to specific output port. Now we discuss the importnt properties of QLP, fesibility nd stbility. A bndwidth lloction scheme should efficiently utilize the vilble bndwidth while mintining fesibility. Definition 1: The llocted bndwidth ij (t) of F ij will be fesible if no over-subscription hppens t ny input port or output port. In other words, the ggregted ssigned rte of flows does not exceed the vilble cpcity, i.e. i nd j (6) For esy presenttion, ssume normlized bndwidth; = 1. Now, we show tht our scheme is fesible. According to the QLP description we cn write i = ij(t) = j=1 i=1 j=1 i=1 Q ij (t) mx{ j Q ij(t), i Q ij(t)} j = ij(t) Q ij (t) = mx{ j Q ij(t), i Q ij(t)} Since N j=1 Q ij(t) mx{ j Q ij(t), i Q ij(t)} nd N i=1 Q ij(t) mx{ j Q ij(t), i Q ij(t)}, we hve i 1 nd j 1 (7) which indictes QLP is fesible. We study the stbility of our scheme in the next section. III. PEFOMANCE ANALYSIS A. Stbility nd Throughput In this subection, we theoreticlly prove tht QLP is strongly stble for ny dmissible trffic which implies tht QLP chieves 100% throughput. We first dopt the following definitions presented in [23]. The switch size is shown by P = N N = N 2.

3 Definition 2: U is the set of vector Y = (Y 1,..., Y P ) nd Y +P, such tht Y (i+jn) 1 j = 0, 1,..., (N 1) (8) i=1 N 1 Y (i+jn) 1 i = 1,..., N (9) j=0 Definition 3: Y is the Eucliden norm of vector Y, i.e., Y = y y2 i... + y2 P = P i=1 (y2 i ). Definition 4: Ŷ is the normlized vector prllel to Y, given tht Y 0, i.e., Ŷ = Y Y = Ỹ Ỹ. Definition 5: Ỹ is the mximl vector prllel to Y, given tht Y 0 nd k, i.e., Ỹ = mx k ky. Definition 6: Ψ Y is the symmetric mtrix ssocited with the projection opertor long the direction of Ŷ, given tht Y 0, i.e., Ψ Y = Ŷ T Ŷ. Property 1: Given tht Y 0, we hve Y Ψ Y = Y, which is strightforwrd result of definition 6. The following vribles re used to represent the sttus of the crossbr switch. Their initil vlues re ssumed to be zero t time t = 0. Q ij (t) is the number of bits buffered in Q ij t time t, belong to flow F ij. Q(t) is the vector of queue lengths t time t, i.e., Q(t) = (Q 11,..., Q ij,..., Q NN ). A ij (t) is the number of bits rriving t Q ij up to time t. A(t) is the vector of the number of rrivls t time t, i.e., A(t) = (A 11,..., A ij,..., A NN ). D ij (t) is the number of bits deprting from Q ij up to time t. D(t) is the vector of the number of deprtures t time t, i.e., D(t) = (D 11,..., D ij,..., D NN ). Assume tht the number of rriving bits A ij (t) stisfies the Strong Lw of Lrge Numbers (SLLN), i.e. A ij (t) lim = λ ij (10) t t where λ ij is the rrivl rte of Q ij. Consider the incoming trffic is dmissible, which mens tht no over-subscription t ny input ports or output ports, i.e., for ll λ ij 0 we hve i, λ ij 1, nd j, λ ij 1 (11) j i Correspondingly, Λ is the vector of the verge rrivl rtes, i.e., Λ = (λ 11,..., λ ij,..., λ NN ), nd due to the dmissible trffic we hve E[A(t)] = Λ. Similr to tht in [25][18], the evolution eqution of the switch for the intervl [t, t + 1] is described s follows Q(t + 1) = Q(t) + A(t) D(t) (12) Before investigting the stbility of our scheme, we first clculte the verge deprture rte s the following lemm. Lemm 1: For crossbr switch without speedup, the verge deprture rte in QLP bndwidth lloction scheme is proportionl to the queue length, i.e. E[D(t)] = Q(t) (13) Proof: According to the previous Section, the dedicted portion of the vilble bndwidth for ech queue Q ij t time t, cn be described s weight fctor w ij (t). It mens tht for flow F ij we cn hve { 0, if Qij (t) = 0 w ij (t) = Q ij(t) mx{ j Qij(t), Qij(t)}, otherwise (14) i which is positive when there is n offered lod Q ij (t) > 0. Consequently, ij (t), the llocted bndwidth of flow F ij Q t time t will be ij (t) mx{ j Qij(t), i Qij(t)}. Obviously, the deprture rte of ech flow will be equl to its llocted bndwidth s follows. D ij (t) = ij(t) = Q ij (t) mx{ j Q ij(t), i Q ij(t)} = Q ij (t) which is proportionl to its queue length t time t. By considering the normlized vilble bndwidth = 1, we hve D ij (t) = Q ij (t), nd thus E[D(t)] = Q(t). In order to prove 100% throughput of our scheme, we introduce the following definition nd lemm from [23][25]. Definition 7: A system of queues is strongly stble if lim sup E[ Q(t) ] < (15) t which implies 100% throughput nd bounded dely gurntee. Lemm 2: Given system of queues whose evolution is described by DTMC with stte vector S(t) N M, nd whose stte spce H is subset of the Crtesin product of denumerble stte spce H Q nd finite stte spce H K, then, if lower bounded function V (Q(t)), clled Lypunov function, V : N P cn be found such tht E[V (Q t+1 ) S(t)] < S(t) nd there exists ɛ +, B + such tht S(t) : Q(t) > B E[V (Q(t + 1)) V (Q(t)) S(t)] < ɛ Q(t) (16) then the system of queues is strongly stble. It mens tht the queue length does not grow infinitely which implies 100% throughput nd bounded verge dely. Proof: We need to show lim t sup E[ Q(t) ] <. For the detiled proof, see theorem 2 in [23]. Now, we present the min theorem for the stbility of QLP. Theorem 1: For crossbr switch without speedup, the QLP bndwidth lloction scheme is strongly stble for ny dmissible trffic, i.e., it chieves 100% throughput. Proof: According to lemm 2 nd eqution (16), we cn define qudrtic Lypunov function V (t) = Q(t)ZQ T (t) s tht in [24][25], if there exists symmetric copositive mtrix Z P P. Similrly, we cn consider Z = I ρψ Λ (17) where I is n identity mtrix, ρ such tht 0 ρ 1, Λ = E[A(t)] is the vector of the verge rrivl rte, nd by definition 6 we hve Ψ Λ = ˆΛ T ˆΛ. It is esy to prove tht Z is positive (semi)definite. We lso ssume tht the stte vector S(t) = Q(t).

4 Now, we need to prove tht for some ɛ +, B + (B is lrge enough), ρ such tht for Q(t) > B, we hve E[Q(t + 1)ZQ T (t + 1) Q(t)ZQ T (t) Q(t)] < ɛ Q(t) For nottionl convenience, we define the timing index s subscript, e.g., Q t+1 is equivlent to Q(t + 1). Therefore E[Q t+1 ZQ T t+1 Q t ZQ T t Q t ] < ɛ Q t (18) By substituting Q t+1 nd Q T t+1 from the evolution eqution (12) into the left hnd side of (18) we hve E[Q t+1 ZQ T t+1 Q t ZQ T t Q t ] = (19) E[(Q t + A t D t )Z(Q T t + A T t D T t ) Q t ZQ T t Q t ] = E[2(A t D t )Q T t + (A t D t )(A t D t ) T Q t ] (20) For simplicity, we find the limit of (20) when Q t tends to infinity, s follows. E[2(A t D t )ZQ T t + (A t D t )Z(A t D t ) T Q t ] lim Q t Q t As cn be seen, the terms (A t D t ) nd (A t D t ) T re bounded since the number of rrivls nd deprtures in time intervl [t, t + 1] re bounded. Also, we know tht Z is positive (semi)definite mtrix. It mens tht, the limit of E[(A t D t )(A t D t ) T Q t ] Q t when Q t is 0. As result, the remining prt of the eqution will be E[2(A t D t )ZQ T t Q t ] lim Q t Q t By definition 4 nd knowing tht Q T t = Q t, we obtin lim Q t By using (17) in (23), we hve E[2(A t D t )Z( ˆQ T t Q t ) Q t ] Q t (21) = (22) E[2(A t D t )Z ˆQ T t Q t ] (23) 2E[(A t D t )(I ρψ Λ ) ˆQ T t Q t ] (24) By definition 6 nd property 1, (24) cn be written s follows 2(Λ ˆQ T t E[D t ] ˆQ T t ρλ ˆQ T t + ρe[d t ]Ψ Λ ˆQT t ) By replcing the result of lemm 1 for E[D t ], we obtin 2(Λ ˆQ T t (1 ρ) Q t ˆQT t + ρ Q t Ψ Λ ˆQT t ) (25) As cn be seen, (25) is function of ρ nd ˆQ t, i.e., f(ρ, ˆQ t ) = 2(Λ ˆQ T t (1 ρ) Q t ˆQT t + ρ Q t Ψ Λ ˆQT t ) (26) In order to proof the stbility, we need to show tht for the entire domin of ˆQ t, there exists ρ such tht (26) is lwys less thn finite negtive constnt, i.e., Since ˆQ(t) = ρ, ˆQ t Q(t) Q(t) = : f(ρ, ˆQ t ) < ɛ Q(t) is normlized vector, ij Q2 ij (t) for given ρ, the domin of f(ρ, ˆQ t ) is the surfce of the unit sphere such tht ˆQt +P. On the other hnd, for given vector ˆQ t, vrition of f(ρ, ˆQ t ) is liner versus the sclr ρ. Knowing tht 0 ρ 1, we nlyze two cses s below, for ll vlues of ˆQ t. Cse 1. when ρ = 1: f(1, ˆQ t ) = 2( Q t ˆQT t + Q t Ψ Λ ˆQT t ). If ˆQ t is in prllel with Λ, we will hve ˆQ t = ˆΛ, by definition 6 we cn write Ψ Λ = ˆQ T t ˆQ t. Thus f(1, ˆQ t ) = 2( Q t ˆQT t + Q t ˆQT t ˆQt ˆQT t ) = 2 Q t ( ˆQ T t + ˆQ T t ) = 0. If ˆQ t is not in prllel with Λ, we cn find Q t ˆQT t > Q t Ψ Λ ˆQT t. It leds to hve negtive vlue for f(1, ˆQ t ). As result, for ll vlues of ˆQ t we obtin f(ρ, ˆQ t ) ρ=1 = f(1, ˆQ t ) 0. Cse 2. when 0 ρ < 1, or in other words: 1 ρ 1 < 0. To investigte this cse, we cn write f s follows f(ρ, ˆQ t ) = f(ρ, ˆQ t ) ρ=1 +(ρ 1) ρ f(ρ, ˆQ t ), where the prtil derivtive of f cn be found s ρ f(ρ, ˆQ t ) = 2( Λ ˆQ T t + Q t Ψ Λ ˆQT t ). If ˆQ t is in prllel with Λ, i.e., ˆQ t = ˆΛ nd thus Ψ Λ = ˆQ T ˆQ t t. We cn write the prtil derivtive of f s ρ f(ρ, ˆQ t ) = 2( ˆQ t ˆQT t + Q t ˆQT t ˆQt ˆQT t ), which is strictly positive, i.e., ρ f(ρ, ˆQ t ) > 0. Since in cse one we obtined f(1, ˆQ t ) 0, fter comprison with f(ρ, ˆQ t ) = f(1, ˆQ t )+(ρ 1) ρ f(ρ, ˆQ t ) for 0 ρ < 1, we find tht f(ρ, ˆQ t ) < 0. If ˆQ t is not in prllel with Λ, we will hve Λ ˆQ T t < Q t Ψ Λ ˆQT t nd therefore, ρ f(ρ, ˆQ t ) will be strictly positive. Similrly, it cn be shown tht for 0 ρ < 1 we hve f(ρ, ˆQ t ) < 0. Hence, QLP is lwys stble for crossbr switch without speedup for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. It mens tht the queue length t input buffers does not grow infinity nd there exists finite upper bound B < t which bcklogged queues will settle. B. Discussions In this subsection, we discuss how to find out the queue length of ech flow in GPS. For trcking the queue length of flow F ij, similr to eqution (12) we cn hve n evolution eqution for queue Q ij during intervl [t 1, t 2 ] s follows Q ij (t 2 ) = Q ij (t 1 ) + A ij (t 2, t 1 ) D ij (t 2, t 1 ) (27) where Q ij (t 1 ) is the remining bcklogged queue of F ij t time t 1. We know tht D ij (t 2, t 1 ), the number of deprted bits from prticulr flow F ij during intervl [t 1, t 2 ] in GPS, cn be obtined s D ij (t 2, t 1 ) = t2 t 1 ij(t)dt (28) Assume tht the llocted bndwidth of F ij is fixed to constnt ij during intervl [t 1, t 2 ], i.e., ij (t) = ij, eqution (28) cn be clculted s t2 D ij (t 2, t 1 ) = ijdt = ij (t 2 t 1 ) (29) t 1 Thus Q ij (t 2 ) = Q ij (t 1 ) + A ij (t 2, t 1 ) (ij (t 2 t 1 )) (30) As cn be seen, the length of ech queue Q ij cn be found during ny intervl [t 1, t 2 ].

5 IV. SIMULATION ESULTS In this section, we crry out simultions to verify the theoreticl results in Section III, nd to evlute the performnce of QLP. We consider crossbr switch. Ech input nd output hs bndwidth of = 1 Gbps, nd the crossbr hs speedup of one. We set the pcket length to be distributed between 40 nd 1,500 bytes [26]. For the destintion of the pckets, we consider both uniform trffic nd non-uniform trffic pttern. For uniform trffic, the destintion of new incoming pcket is uniformly distributed mong ll the output ports, i.e., λ ij = η/n, where η is the effective lod nd N is the switch size. The η tkes one of the 10 possible vlues of [0.1,1] with step of 0.1 For non-uniform trffic, we use the sme model s tht in [27]. The trffic rrivl rte λ ij is defined by i, j nd n { unblnced probbility w s follows. ( ) w + 1 w λ ij (t) = N, if i = j 1 w N, if i j In this cse, the η is fixed to 1 nd w tkes one of the 11 possible vlues of [0,1] with step of 0.1. When w = 0, the trffic rrivl is uniformly distributed mong the outputs, i.e., λ ij (t) = /N. Otherwise, the incoming pckets t In i re more directed to Out j rther thn the other outputs, which is clled the hotspot destintion. A specil cse will hppen when w = 1, i.e., λ ii (t) =. To constrin the burstiness of flow F ij, we consider leky bucket model (η λ ij, σ ij ), where σ ij is the burst size of F ij [7]. We set σ ij of every flow to fixed vlue of 10,000 bytes, nd the burst my rrive t ny time during simultion run. To evlute the performnce of our scheme, We compre our simultion dt with Loclized Independent Pcket Scheduling (LIPS), in which n input port or output port mkes scheduling decisions solely bsed on the stte informtion of its locl crosspoint buffers [6]. We consider four different LIPS implementtion versions with different rbitrtion rules s follows: FP (Fixed Priority) ssigns fixed priority order to ll the virtul queues of the sme input to the sme output nd lwys picks the cndidte with the highest priority; D (ndom) mkes the rbitrtion on rndom bsis; (ound obin) lterntively chooses eligible cndidtes in round robin mnner to void strvtion; OPF (Oldest Pcket First) uses the pcket rrivl time s the rbitrtion criterion, i.e., the pcket rriving erlier hs higher priority. Now, we investigte the results on the throughput nd the verge dely. A. Throughput To verify theorem 1, we present the simultion dt to show tht our scheme chieves 100% throughput. Figure 2() displys the throughput under uniform trffic. It cn be seen tht, the throughput of different schemes grows consistently with the effective lod, nd finlly reches 100% when the effective lod becomes 1, only FP slightly decreses when the lod is the mximum. Figure 2(b) shows the throughput under non-uniform trffic. It clerly reflects the non-monotonic performnce vritions of other methods. As expected, QLP significntly yields higher throughput thn the other schemes when the speedup is one. The other schemes Throughput Throughput Switch, Uniform Trffic Lod () Switch, Non-uniform Trffic Unblnced Probbility Fig. 2. Throughput of QLP. () With different lods (b) With different unblnced probbilities. chieve the lowest throughput when the unblnced probbility is round 0.5 nd then, throughput is grdully improved until the unblnced probbility becomes 1. In fct t this point, ll the pckets of In i go to Out j nd no scheduling is necessry. The results confirm tht, QLP chieves 100% throughput nd outperforms the other four methods when the speedup is one. B. Averge Dely Next, we study the dely performnce of QLP. We mesure the totl time tht pcket stys in the switch. It is the intervl from the time tht the lst bit of pcket rrives t its input to the time tht the lst bit of the pcket is sent to the output. We plot the verge dely of different schemes in logrithmic scle nd the verge dely is mesured in seconds. Figure 3() displys the verge dely under uniform trffic. As cn be seen, the dely grows grdully when the effective lod increses, nd jumps when the effective lod becomes 1. Surprisingly, for the effective lods greter thn 0.8, the QLP outperforms the other four schemes. Figure 3(b) depicts the verge dely under non-uniform trffic. As expected, QLP shows n optimistic behvior in comprison with the other four methods nd the dely difference is more thn one decde. The verge dely of other schemes increses with the unblnced probbility nd reches to the mximum when the unblnced probbility is round 0.5. Then, the verge dely (b)

6 Averge Dely (Logrithmic Scle) Averge Dely (Logrithmic Scle) Switch, Uniform Trffic Lod () Switch, Non-uniform Trffic Unblnced Probbility (b) Fig. 3. Averge Dely of QLP. () With different lods (b) With different unblnced probbilities. of ll schemes drops when the unblnced probbility is equl to 1, becuse t this point ll trffic of n input is destined to the sme output nd no switching is necessry. It is observed tht, different unblnced probbilities do not significntly ffect the verge dely of QLP, which demonstrtes tht our scheme works well under non-uniform trffic. V. CONCLUSIONS In this pper, we hve presented the Queue Length Proportionl (QLP) bndwidth lloction scheme for GPS to schedule best effort trffic in crossbr switches without speedup. In QLP, the mount of service tht ech flow receives is proportionl to the length of its bcklogged queue. QLP essentilly fvors the queues with the gretest occupncy nd thus ssists the crossbr switch to be more work-conserving. By theoreticl nlysis, we hve proved tht QLP is strongly stble nd therefore provides 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or nonuniform. We hve lso shown tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. Furthermore, we hve discussed how to trck the queue length in GPS. Finlly, we hve conducted simultions to verify the nlyticl results. EFEENCES [1] A. Prekh nd. Gllger, A generlized processor shring pproch to flow control in integrted services networks: the single node cse, IEEE/ACM Trns. Networking, vol. 1, no. 3, pp , Jun [2] A. Demers, S. Keshv nd S. Shenker, Anlysis nd simultion of fir queueing lgorithm, ACM SIGCOMM 89, vol. 19, no. 4, pp. 3-12, Austin, TX, Sept [3] H. Zhng, WF2Q: worst-cse fir weighted fir queueing, IEEE INFO- COM 96, pp , Sn Frncisco, CA, Mr [4] J. Xu nd. J. Lipton, On Fundmentl Trdeoffs between Dely Bounds nd Computtionl Complexity in Pcket Scheduling Algorithms, IEEE/ACM Trns. on Netw., vol. 13, no. 1, pp , Feb [5] S. He, S. Sun, W. Zho, Y. Zheng, nd W. Go, On Gurnteed Smooth Switching for Buffered Crossbr Switches, IEEE/ACM Trnsctions on Networking, vol. 16, no. 3, pp , [6] D. Pn nd Y. Yng, Loclized Independent pcket scheduling for buffered crossbr switches, IEEE Trns. on Comp., vol. 58, Feb [7] J. Kurose nd K. oss, Computer networking: top-down pproch, Addison Wesley, 4th edition, [8] X. Zhng, S.. Mohnty, nd L.N. Bhuyn, Adptive Mx-Min Fir Scheduling in Buffered Crossbr Switches Without Speedup, 26th IEEE Interntionl Conference on Computer Communictions, INFOCOM 07, pp , Qulcomm Inc., Sn Diego, My [9] M.. Hosgrhr nd H. Sethu, Mx-Min Fir Scheduling in Input- Queued Switches, IEEE Trnsctions on Prllel nd Distributed Systems, volume 19, number 4, pp , Apr [10] Gerld. Ash, Trffic engineering nd QoS optimiztion of integrted voice nd dt networks, Morgn Kufmnn, first edition, [11] D. Pn nd Y. Yng, Mx-min fir bndwidth lloction lgorithms for pcket switches, IEEE Int. Pr. nd Dist. Processing Symp. (IPDPS), Long Bech, CA, Mr [12] S. Chung, S. Iyer, nd N. McKeown, Prcticl lgorithms for performnce gurntees in buffered crossbrs, IEEE INFOCOM 05, Mimi, FL, Mrch [13] M. Shreedhr nd G. Vrghese, Efficient fir queuing using deficit round robin, IEEE/ACM Trns. Netw., vol. 4, no. 3, pp , [14] N. Ni nd L. Bhuyn, Fir scheduling for input buffered switches, Cluster Computing, vol. 6, no. 2, pp , Hinghm, MA, Apr [15] X. Zhng nd L. Bhuyn, Deficit round-robin scheduling for inputqueued switches, IEEE Journl on Selected Ares in Communictions, no. 4, pp , My [16] D. Pn nd Y. Yng, Credit bsed fir scheduling for pcket switched networks, IEEE INFOCOM, pp , Mimi, FL, Mrch [17] M. J. Krol, M. J. Hluchyj, nd S. P. Morgn, Input Versus Output Queueing on Spce-Division Pcket Switch, IEEE Trnsctions on Communictions, vol. 35, no. 12, pp , Dec [18] N. McKeown, A. Mekkittikul, V. Annthrm nd J. Wlrnd, Achieving 100% throughput in n input queued switch, IEEE Trnsctions on Communictions, vol. 47, no. 8, pp , [19] D. Stephens nd H. Zhng, Implementing distributed pcket fir queueing in sclble switch rchitecture, IEEE INFOCOM, Sn Frncisco, CA, Mrch [20] X. Zhng nd L. Bhuyn, An Efficient Scheduling Algorithm for Combined-Input-Crosspoint-Queued (CICQ) Switches, IEEE GLOBE- COM, Dlls, TX, November [21] L. Mhmdi nd M. Hmdi, Output queued switch emultion by one-cell-internlly buffered crossbr switch, IEEE GLOBECOM, Sn Frncisco, CA, Dec [22] J. Turner, Strong performnce gurntees for synchronous crossbr schedulers, IEEE/ACM Trnsctions on Networking, to pper, [23] E. Leonrdi, M. Melli, F. Neri, nd M. A. Mrsn, On the stbility of input-queued switches with speed-up, IEEE/ACM Trns. Netw., vol. 9, no. 1, pp , [24] P.. Kumr nd S. P. Meyn, Stbility of queueing networks nd scheduling policies, IEEE Trnsctions on Automt. Control, vol. 40, pp , Feb [25] M. A. Mrsn, et l. Pcket Scheduling in Input-Queued Cell-Bsed Switches, IEEE INFOCOM, Alsk, USA, April [26] G. Psss, M. Ktevenis, Pcket Mode Scheduling in Buffered Crossbr (CICQ) Switches, Proc. IEEE Workshop on High Performnce Switching nd outing (HPS 2006), pp , Poznn, Polnd, June [27] ojs-cess, E. Oki, Z. Jing nd H. J. Cho, CIXB-1: Combined input-once-cell-crosspoint buffered switch, IEEE Workshop on High Performnce Switching nd outing, Dlls, TX, July 2001.

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Performance Prediction of Distributed Load Balancing on Multicomputer Systems

Performance Prediction of Distributed Load Balancing on Multicomputer Systems Performnce Prediction of Distributed Lod Blncing on Multicomputer Systems Ishfq Ahmd *, Arif Ghfoor+, nd Kishn Mehrotr * * School of Computer nd Informtion Science, Syrcuse University, Syrcuse, NY 13244

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

piecewise Liner SLAs and Performance Timetagment

piecewise Liner SLAs and Performance Timetagment i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion

More information

MODULE 3. 0, y = 0 for all y

MODULE 3. 0, y = 0 for all y Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Online Multicommodity Routing with Time Windows

Online Multicommodity Routing with Time Windows Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Module 2. Analysis of Statically Indeterminate Structures by the Matrix Force Method. Version 2 CE IIT, Kharagpur

Module 2. Analysis of Statically Indeterminate Structures by the Matrix Force Method. Version 2 CE IIT, Kharagpur Module Anlysis of Stticlly Indeterminte Structures by the Mtrix Force Method Version CE IIT, Khrgpur esson 9 The Force Method of Anlysis: Bems (Continued) Version CE IIT, Khrgpur Instructionl Objectives

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

Learner-oriented distance education supporting service system model and applied research

Learner-oriented distance education supporting service system model and applied research SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING

PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.6 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING Sid EL KAFHALI Abdelli EL BOUCHTI Mohmed HANINI nd Abdelkrim HAQIQ Computer, Networks, Mobility

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting

More information

Euler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems

Euler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems Euler Euler Everywhere Using the Euler-Lgrnge Eqution to Solve Clculus of Vrition Problems Jenine Smllwood Principles of Anlysis Professor Flschk My 12, 1998 1 1. Introduction Clculus of vritions is brnch

More information

Week 11 - Inductance

Week 11 - Inductance Week - Inductnce November 6, 202 Exercise.: Discussion Questions ) A trnsformer consists bsiclly of two coils in close proximity but not in electricl contct. A current in one coil mgneticlly induces n

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

COMPONENTS: COMBINED LOADING

COMPONENTS: COMBINED LOADING LECTURE COMPONENTS: COMBINED LOADING Third Edition A. J. Clrk School of Engineering Deprtment of Civil nd Environmentl Engineering 24 Chpter 8.4 by Dr. Ibrhim A. Asskkf SPRING 2003 ENES 220 Mechnics of

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Discovering General Logical Network Topologies

Discovering General Logical Network Topologies Discovering Generl Logicl Network Topologies Mrk otes McGill University, Montrel, Quebec Emil: cotes@ece.mcgill.c Michel Rbbt nd Robert Nowk Rice University, Houston, TX Emil: {rbbt, nowk}@rice.edu Technicl

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

belief Propgtion Lgorithm in Nd Pent Penta

belief Propgtion Lgorithm in Nd Pent Penta IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 375 Itertive Trust nd Reputtion Mngement Using Belief Propgtion Ermn Aydy, Student Member, IEEE, nd Frmrz Feri, Senior

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Project Recovery. . It Can Be Done

Project Recovery. . It Can Be Done Project Recovery. It Cn Be Done IPM Conference Wshington, D.C. Nov 4-7, 200 Wlt Lipke Oklhom City Air Logistics Center Tinker AFB, OK Overview Mngement Reserve Project Sttus Indictors Performnce Correction

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

19. The Fermat-Euler Prime Number Theorem

19. The Fermat-Euler Prime Number Theorem 19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout

More information

Modeling POMDPs for Generating and Simulating Stock Investment Policies

Modeling POMDPs for Generating and Simulating Stock Investment Policies Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo

More information

ORBITAL MANEUVERS USING LOW-THRUST

ORBITAL MANEUVERS USING LOW-THRUST Proceedings of the 8th WSEAS Interntionl Conference on SIGNAL PROCESSING, ROBOICS nd AUOMAION ORBIAL MANEUVERS USING LOW-HRUS VIVIAN MARINS GOMES, ANONIO F. B. A. PRADO, HÉLIO KOII KUGA Ntionl Institute

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Deployment Strategy for Mobile Robots with Energy and Timing Constraints

Deployment Strategy for Mobile Robots with Energy and Timing Constraints Proceedings of the 2005 IEEE Interntionl Conference on Robotics nd Automtion Brcelon, Spin, April 2005 Deployment Strtegy for Mobile Robots with Energy nd Timing Constrints Yongguo Mei, Yung-Hsing Lu,

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Lectures 8 and 9 1 Rectangular waveguides

Lectures 8 and 9 1 Rectangular waveguides 1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves

More information

How To Understand The Theory Of Inequlities

How To Understand The Theory Of Inequlities Ostrowski Type Inequlities nd Applictions in Numericl Integrtion Edited By: Sever S Drgomir nd Themistocles M Rssis SS Drgomir) School nd Communictions nd Informtics, Victori University of Technology,

More information

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros

More information

The mean-variance optimal portfolio

The mean-variance optimal portfolio ALEXANDRE S. DA SILVA is vice president in the Quntittive Investment Group t Neuberger ermn in New York, NY. lexndre.dsilv@nb.com WAI LEE is the chief investment officer nd hed of the Quntittive Investment

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds Optiml Control of Seril, Multi-Echelon Inventory/Production Systems with Periodic Btching Geert-Jn vn Houtum Deprtment of Technology Mngement, Technische Universiteit Eindhoven, P.O. Box 513, 56 MB, Eindhoven,

More information