Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput
|
|
- Lee Cameron
- 8 years ago
- Views:
Transcription
1 Bndwidth Alloction for Best Effort Trffic to Achieve 100% Throughput Msoumeh Krimi, Zhuo Sun, nd Deng Pn Florid Interntionl University, Mimi, FL E-mils: {mkri001, zsun003, Abstrct Generlized Processor Shring (GPS) is powerful model nd there re mny prcticl scheduling lgorithms tht cn perfectly emulte it. GPS is widely used s n idel firness model to schedule pckets for gurnteed performnce trffic. However, there hs not been wy for GPS to properly hndle the best effort trffic. In this pper, we propose bndwidth lloction scheme for GPS clled Queue Length Proportionl (QLP) in crossbr switches without speedup. QLP dynmiclly obtins fesible bndwidth mtrix to schedule best effort flows. In QLP, the mount of service tht ech flow receives is proportionl to the length of its bcklogged queue. We nlyticlly prove tht QLP is strongly stble nd hence provides 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. Moreover, we show tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. We lso discuss how to trck the queue length in GPS. Finlly, we perform simultions to verify the theoreticl results nd to mesure the performnce of QLP. I. INTODUCTION Generlized Processor Shring (GPS) hs long been known s simple nd powerful fluid model for trffic scheduling [1]. All fir queueing lgorithms ultimtely emulte the GPS idel model becuse it chieves perfect firness for pcket scheduling [2], [3], [4]. GPS is theoreticl fluid model nd divides the vilble bndwidth into logiclly independent chnnels. Thus, trffic of ech flow is smoothly trnsmitted through its own exclusive chnnel from the input port to the output port. GPS is widely used s n idel firness model to schedule pckets for gurnteed performnce trffic. However, there hs not been wy for GPS to properly hndle the best effort trffic. The objective of this pper is to ddress the pproprite scheduling of best effort trffic in order to be employed in crossbr switches. Crossbr switches hve received significnt ttention due to the non-blocking cpbility nd lrge bndwidth utiliztion in comprison with bus bsed switches [6], [7]. The chllenge of bndwidth lloction in crossbr switch is how to efficiently shre the vilble cpcity of ech input port nd output port. Simple proportionl bndwidth lloction for shred link is not proper for crossbr switches [8], [9] becuse flows of switch re subject to two bndwidth constrints: the vilble bndwidth t both the input port nd output port of the flow. The scheme should be efficient to fully utilize the vilble bndwidth, nd should be fesible in order to be pplied in prctice. Our motivtion for this work rises from the fct tht in crossbr switches we need to dynmiclly obtin n dmissible bndwidth mtrix to properly hndle best effort trffic. Gurnteed performnce flows reserve resources for n llocted trnsmission rte [10]. However, best effort flows try to mke the best use of the vilble trnsmission cpcity but hve no gurntee to the qulity of service [7]. As cn be seen, the bndwidth lloction scheme plys severl importnt roles in gurnteeing the high performnce of switch [11]. First, the scheme helps to determine the trffic dmission policy nd buffer mngement strtegy. Second, n efficient scheme mkes it possible for switch to chieve 100% throughput. Third, the scheme is used s the scheduling criterion by fir scheduling lgorithms. There re mny fir scheduling lgorithms designed for bndwidth lloction in different crossbr switch rchitectures [2], [3], [12], [13], [14], [15]. However, most of them focused on providing qulity of service for gurnteed performnce trffic nd there is reltively less work on how to better support best effort trffic. In this pper, we present bndwidth lloction scheme for GPS clled Queue Length Proportionl (QLP) to properly hndle best effort trffic in crossbr switches without speedup. In QLP, the mount of service tht ech flow receives, or its dedicted bndwidth, is proportionl to the length of its bcklogged queue. QLP essentilly fvors the queues with the gretest occupncy nd thus ssists the crossbr switch to be more work-conserving. We conduct theoreticl nlysis to prove tht QLP is strongly stble nd therefore chieves 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. We lso show tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. Furthermore, we discuss how to trck the queue length is GPS. Lstly, we conduct simultions to verify the nlyticl results nd to mesure the performnce of QLP. The orgniztion of this pper is s follows. In Section II, we present the bstrct switch model nd the QLP bndwidth lloction scheme. In Section III, we theoreticlly nlyze the stbility nd throughput of QLP nd then provide some discussions. We show the simultion results in Section IV. Finlly, we conclude the pper in Section V. II. QUEUE LENGTH POPOTIONAL (QLP) SCHEME In this section, we present our bndwidth lloction scheme. First, we briefly explin the switch model. Then, we describe the QLP bndwidth lloction lgorithm for best effort trffic.
2 A. The Abstrct Switch Model The considered switch rchitecture includes N input ports nd N output ports, connected by crossbr with no internl speedup. Let In i denote the i th input port nd Out j denote the j th output port. The vilble bndwidth of ech input port nd output port nd lso the crossbr is. Define the trffic from In i destined to Out j to be flow F ij. Use ij (t) to represent the llocted bndwidth of F ij t time t. Denote the queue of pckets t In i destined to Out j s Q ij. B. Algorithm Description In this subsection we present our Queue Length Proportionl (QLP) bndwidth lloction scheme nd investigte its fesibility property. As mentioned erlier, simple proportionl bndwidth lloction policy of GPS does not pply to switches [8], [9], [11]. For GPS server works t fixed bndwidth, the φ rte of j will gurntee the performnce of ech flow, j φj where φ j is the weight of ech flow [1]. However in contrst with single server, flows of switch re subject to two bndwidth constrints: the vilble bndwidth t both the input nd output port of the flow. Nive bndwidth lloction t the output port my mke the flows violte the bndwidth constrints t their input ports, nd vice vers. QLP dynmiclly ssigns the bndwidth to ech best effort flow proportionl to the bcklogged queue length. We use queue length Q ij (t) s dynmic weight of ech flow F ij nd define Q j (t) = i Q ij(t) to be the number of bits queued t ll input ports directed to prticulr Out j t time t, nd Q i (t) = j Q ij(t) to be the number of bits queued t prticulr In i destined to different output ports t time t. We lso denote the llocted bndwidth of flow F ij respecting to the constrint of ech input port nd output port s i.in(t) nd j.out (t), ccordingly. eclling the GPS fluid model, trffic of ech flow cn smoothly strem from the input port to the output port through its own exclusive chnnel, without buffering in the middle, s illustrted in Figure 1. Thus, by considering the bndwidth constrints t both the input port nd output port of ech flow F ij we hve ij.in (t) = Q ij(t) Q i (t) = Q ij(t) j Q ij(t) (1) ij.out (t) = Q ij(t) Q j (t) = Q ij(t) i Q ij(t) (2) In order to void bndwidth violtion t the input port nd the output port, we consider the overll llocted bndwidth ij (t) of F ij to be the minimum [8] between two clculted bndwidths s follows ij(t) = min{ij.in (t), ij.out (t)} (3) = min{ Q ij(t) Q i (t), Q ij(t) } (4) Q j (t) Q ij (t) = mx{q i (t), Q j (t)} (5) As cn be seen, QLP bndwidth lloction scheme essentilly fvors the queues with the gretest occupncy. It trets ll Input 1 Input i 1 = j 1 j Input i = j ij N = j Nj Fig F11 Output F 1 i1 F N1 1 = i i1 F Nj F 1 j F 1 N Output F j Output ij F in F NN j = N = i ij i in GPS idel fluid model used for scheduling in crossbr switch. queues firly nd ssists the crossbr switch to be more workconserving [20]. One of the dvntges of our scheme is its simplicity. It does not require ny sorting or re-sorting process. Using the clculted informtion of the queue lengths, QLP just needs to find the mximum between the ggregted queue length of flows witing in prticulr input port nd flows directed to specific output port. Now we discuss the importnt properties of QLP, fesibility nd stbility. A bndwidth lloction scheme should efficiently utilize the vilble bndwidth while mintining fesibility. Definition 1: The llocted bndwidth ij (t) of F ij will be fesible if no over-subscription hppens t ny input port or output port. In other words, the ggregted ssigned rte of flows does not exceed the vilble cpcity, i.e. i nd j (6) For esy presenttion, ssume normlized bndwidth; = 1. Now, we show tht our scheme is fesible. According to the QLP description we cn write i = ij(t) = j=1 i=1 j=1 i=1 Q ij (t) mx{ j Q ij(t), i Q ij(t)} j = ij(t) Q ij (t) = mx{ j Q ij(t), i Q ij(t)} Since N j=1 Q ij(t) mx{ j Q ij(t), i Q ij(t)} nd N i=1 Q ij(t) mx{ j Q ij(t), i Q ij(t)}, we hve i 1 nd j 1 (7) which indictes QLP is fesible. We study the stbility of our scheme in the next section. III. PEFOMANCE ANALYSIS A. Stbility nd Throughput In this subection, we theoreticlly prove tht QLP is strongly stble for ny dmissible trffic which implies tht QLP chieves 100% throughput. We first dopt the following definitions presented in [23]. The switch size is shown by P = N N = N 2.
3 Definition 2: U is the set of vector Y = (Y 1,..., Y P ) nd Y +P, such tht Y (i+jn) 1 j = 0, 1,..., (N 1) (8) i=1 N 1 Y (i+jn) 1 i = 1,..., N (9) j=0 Definition 3: Y is the Eucliden norm of vector Y, i.e., Y = y y2 i... + y2 P = P i=1 (y2 i ). Definition 4: Ŷ is the normlized vector prllel to Y, given tht Y 0, i.e., Ŷ = Y Y = Ỹ Ỹ. Definition 5: Ỹ is the mximl vector prllel to Y, given tht Y 0 nd k, i.e., Ỹ = mx k ky. Definition 6: Ψ Y is the symmetric mtrix ssocited with the projection opertor long the direction of Ŷ, given tht Y 0, i.e., Ψ Y = Ŷ T Ŷ. Property 1: Given tht Y 0, we hve Y Ψ Y = Y, which is strightforwrd result of definition 6. The following vribles re used to represent the sttus of the crossbr switch. Their initil vlues re ssumed to be zero t time t = 0. Q ij (t) is the number of bits buffered in Q ij t time t, belong to flow F ij. Q(t) is the vector of queue lengths t time t, i.e., Q(t) = (Q 11,..., Q ij,..., Q NN ). A ij (t) is the number of bits rriving t Q ij up to time t. A(t) is the vector of the number of rrivls t time t, i.e., A(t) = (A 11,..., A ij,..., A NN ). D ij (t) is the number of bits deprting from Q ij up to time t. D(t) is the vector of the number of deprtures t time t, i.e., D(t) = (D 11,..., D ij,..., D NN ). Assume tht the number of rriving bits A ij (t) stisfies the Strong Lw of Lrge Numbers (SLLN), i.e. A ij (t) lim = λ ij (10) t t where λ ij is the rrivl rte of Q ij. Consider the incoming trffic is dmissible, which mens tht no over-subscription t ny input ports or output ports, i.e., for ll λ ij 0 we hve i, λ ij 1, nd j, λ ij 1 (11) j i Correspondingly, Λ is the vector of the verge rrivl rtes, i.e., Λ = (λ 11,..., λ ij,..., λ NN ), nd due to the dmissible trffic we hve E[A(t)] = Λ. Similr to tht in [25][18], the evolution eqution of the switch for the intervl [t, t + 1] is described s follows Q(t + 1) = Q(t) + A(t) D(t) (12) Before investigting the stbility of our scheme, we first clculte the verge deprture rte s the following lemm. Lemm 1: For crossbr switch without speedup, the verge deprture rte in QLP bndwidth lloction scheme is proportionl to the queue length, i.e. E[D(t)] = Q(t) (13) Proof: According to the previous Section, the dedicted portion of the vilble bndwidth for ech queue Q ij t time t, cn be described s weight fctor w ij (t). It mens tht for flow F ij we cn hve { 0, if Qij (t) = 0 w ij (t) = Q ij(t) mx{ j Qij(t), Qij(t)}, otherwise (14) i which is positive when there is n offered lod Q ij (t) > 0. Consequently, ij (t), the llocted bndwidth of flow F ij Q t time t will be ij (t) mx{ j Qij(t), i Qij(t)}. Obviously, the deprture rte of ech flow will be equl to its llocted bndwidth s follows. D ij (t) = ij(t) = Q ij (t) mx{ j Q ij(t), i Q ij(t)} = Q ij (t) which is proportionl to its queue length t time t. By considering the normlized vilble bndwidth = 1, we hve D ij (t) = Q ij (t), nd thus E[D(t)] = Q(t). In order to prove 100% throughput of our scheme, we introduce the following definition nd lemm from [23][25]. Definition 7: A system of queues is strongly stble if lim sup E[ Q(t) ] < (15) t which implies 100% throughput nd bounded dely gurntee. Lemm 2: Given system of queues whose evolution is described by DTMC with stte vector S(t) N M, nd whose stte spce H is subset of the Crtesin product of denumerble stte spce H Q nd finite stte spce H K, then, if lower bounded function V (Q(t)), clled Lypunov function, V : N P cn be found such tht E[V (Q t+1 ) S(t)] < S(t) nd there exists ɛ +, B + such tht S(t) : Q(t) > B E[V (Q(t + 1)) V (Q(t)) S(t)] < ɛ Q(t) (16) then the system of queues is strongly stble. It mens tht the queue length does not grow infinitely which implies 100% throughput nd bounded verge dely. Proof: We need to show lim t sup E[ Q(t) ] <. For the detiled proof, see theorem 2 in [23]. Now, we present the min theorem for the stbility of QLP. Theorem 1: For crossbr switch without speedup, the QLP bndwidth lloction scheme is strongly stble for ny dmissible trffic, i.e., it chieves 100% throughput. Proof: According to lemm 2 nd eqution (16), we cn define qudrtic Lypunov function V (t) = Q(t)ZQ T (t) s tht in [24][25], if there exists symmetric copositive mtrix Z P P. Similrly, we cn consider Z = I ρψ Λ (17) where I is n identity mtrix, ρ such tht 0 ρ 1, Λ = E[A(t)] is the vector of the verge rrivl rte, nd by definition 6 we hve Ψ Λ = ˆΛ T ˆΛ. It is esy to prove tht Z is positive (semi)definite. We lso ssume tht the stte vector S(t) = Q(t).
4 Now, we need to prove tht for some ɛ +, B + (B is lrge enough), ρ such tht for Q(t) > B, we hve E[Q(t + 1)ZQ T (t + 1) Q(t)ZQ T (t) Q(t)] < ɛ Q(t) For nottionl convenience, we define the timing index s subscript, e.g., Q t+1 is equivlent to Q(t + 1). Therefore E[Q t+1 ZQ T t+1 Q t ZQ T t Q t ] < ɛ Q t (18) By substituting Q t+1 nd Q T t+1 from the evolution eqution (12) into the left hnd side of (18) we hve E[Q t+1 ZQ T t+1 Q t ZQ T t Q t ] = (19) E[(Q t + A t D t )Z(Q T t + A T t D T t ) Q t ZQ T t Q t ] = E[2(A t D t )Q T t + (A t D t )(A t D t ) T Q t ] (20) For simplicity, we find the limit of (20) when Q t tends to infinity, s follows. E[2(A t D t )ZQ T t + (A t D t )Z(A t D t ) T Q t ] lim Q t Q t As cn be seen, the terms (A t D t ) nd (A t D t ) T re bounded since the number of rrivls nd deprtures in time intervl [t, t + 1] re bounded. Also, we know tht Z is positive (semi)definite mtrix. It mens tht, the limit of E[(A t D t )(A t D t ) T Q t ] Q t when Q t is 0. As result, the remining prt of the eqution will be E[2(A t D t )ZQ T t Q t ] lim Q t Q t By definition 4 nd knowing tht Q T t = Q t, we obtin lim Q t By using (17) in (23), we hve E[2(A t D t )Z( ˆQ T t Q t ) Q t ] Q t (21) = (22) E[2(A t D t )Z ˆQ T t Q t ] (23) 2E[(A t D t )(I ρψ Λ ) ˆQ T t Q t ] (24) By definition 6 nd property 1, (24) cn be written s follows 2(Λ ˆQ T t E[D t ] ˆQ T t ρλ ˆQ T t + ρe[d t ]Ψ Λ ˆQT t ) By replcing the result of lemm 1 for E[D t ], we obtin 2(Λ ˆQ T t (1 ρ) Q t ˆQT t + ρ Q t Ψ Λ ˆQT t ) (25) As cn be seen, (25) is function of ρ nd ˆQ t, i.e., f(ρ, ˆQ t ) = 2(Λ ˆQ T t (1 ρ) Q t ˆQT t + ρ Q t Ψ Λ ˆQT t ) (26) In order to proof the stbility, we need to show tht for the entire domin of ˆQ t, there exists ρ such tht (26) is lwys less thn finite negtive constnt, i.e., Since ˆQ(t) = ρ, ˆQ t Q(t) Q(t) = : f(ρ, ˆQ t ) < ɛ Q(t) is normlized vector, ij Q2 ij (t) for given ρ, the domin of f(ρ, ˆQ t ) is the surfce of the unit sphere such tht ˆQt +P. On the other hnd, for given vector ˆQ t, vrition of f(ρ, ˆQ t ) is liner versus the sclr ρ. Knowing tht 0 ρ 1, we nlyze two cses s below, for ll vlues of ˆQ t. Cse 1. when ρ = 1: f(1, ˆQ t ) = 2( Q t ˆQT t + Q t Ψ Λ ˆQT t ). If ˆQ t is in prllel with Λ, we will hve ˆQ t = ˆΛ, by definition 6 we cn write Ψ Λ = ˆQ T t ˆQ t. Thus f(1, ˆQ t ) = 2( Q t ˆQT t + Q t ˆQT t ˆQt ˆQT t ) = 2 Q t ( ˆQ T t + ˆQ T t ) = 0. If ˆQ t is not in prllel with Λ, we cn find Q t ˆQT t > Q t Ψ Λ ˆQT t. It leds to hve negtive vlue for f(1, ˆQ t ). As result, for ll vlues of ˆQ t we obtin f(ρ, ˆQ t ) ρ=1 = f(1, ˆQ t ) 0. Cse 2. when 0 ρ < 1, or in other words: 1 ρ 1 < 0. To investigte this cse, we cn write f s follows f(ρ, ˆQ t ) = f(ρ, ˆQ t ) ρ=1 +(ρ 1) ρ f(ρ, ˆQ t ), where the prtil derivtive of f cn be found s ρ f(ρ, ˆQ t ) = 2( Λ ˆQ T t + Q t Ψ Λ ˆQT t ). If ˆQ t is in prllel with Λ, i.e., ˆQ t = ˆΛ nd thus Ψ Λ = ˆQ T ˆQ t t. We cn write the prtil derivtive of f s ρ f(ρ, ˆQ t ) = 2( ˆQ t ˆQT t + Q t ˆQT t ˆQt ˆQT t ), which is strictly positive, i.e., ρ f(ρ, ˆQ t ) > 0. Since in cse one we obtined f(1, ˆQ t ) 0, fter comprison with f(ρ, ˆQ t ) = f(1, ˆQ t )+(ρ 1) ρ f(ρ, ˆQ t ) for 0 ρ < 1, we find tht f(ρ, ˆQ t ) < 0. If ˆQ t is not in prllel with Λ, we will hve Λ ˆQ T t < Q t Ψ Λ ˆQT t nd therefore, ρ f(ρ, ˆQ t ) will be strictly positive. Similrly, it cn be shown tht for 0 ρ < 1 we hve f(ρ, ˆQ t ) < 0. Hence, QLP is lwys stble for crossbr switch without speedup for ny dmissible trffic, no mtter whether the trffic distribution is uniform or non-uniform. It mens tht the queue length t input buffers does not grow infinity nd there exists finite upper bound B < t which bcklogged queues will settle. B. Discussions In this subsection, we discuss how to find out the queue length of ech flow in GPS. For trcking the queue length of flow F ij, similr to eqution (12) we cn hve n evolution eqution for queue Q ij during intervl [t 1, t 2 ] s follows Q ij (t 2 ) = Q ij (t 1 ) + A ij (t 2, t 1 ) D ij (t 2, t 1 ) (27) where Q ij (t 1 ) is the remining bcklogged queue of F ij t time t 1. We know tht D ij (t 2, t 1 ), the number of deprted bits from prticulr flow F ij during intervl [t 1, t 2 ] in GPS, cn be obtined s D ij (t 2, t 1 ) = t2 t 1 ij(t)dt (28) Assume tht the llocted bndwidth of F ij is fixed to constnt ij during intervl [t 1, t 2 ], i.e., ij (t) = ij, eqution (28) cn be clculted s t2 D ij (t 2, t 1 ) = ijdt = ij (t 2 t 1 ) (29) t 1 Thus Q ij (t 2 ) = Q ij (t 1 ) + A ij (t 2, t 1 ) (ij (t 2 t 1 )) (30) As cn be seen, the length of ech queue Q ij cn be found during ny intervl [t 1, t 2 ].
5 IV. SIMULATION ESULTS In this section, we crry out simultions to verify the theoreticl results in Section III, nd to evlute the performnce of QLP. We consider crossbr switch. Ech input nd output hs bndwidth of = 1 Gbps, nd the crossbr hs speedup of one. We set the pcket length to be distributed between 40 nd 1,500 bytes [26]. For the destintion of the pckets, we consider both uniform trffic nd non-uniform trffic pttern. For uniform trffic, the destintion of new incoming pcket is uniformly distributed mong ll the output ports, i.e., λ ij = η/n, where η is the effective lod nd N is the switch size. The η tkes one of the 10 possible vlues of [0.1,1] with step of 0.1 For non-uniform trffic, we use the sme model s tht in [27]. The trffic rrivl rte λ ij is defined by i, j nd n { unblnced probbility w s follows. ( ) w + 1 w λ ij (t) = N, if i = j 1 w N, if i j In this cse, the η is fixed to 1 nd w tkes one of the 11 possible vlues of [0,1] with step of 0.1. When w = 0, the trffic rrivl is uniformly distributed mong the outputs, i.e., λ ij (t) = /N. Otherwise, the incoming pckets t In i re more directed to Out j rther thn the other outputs, which is clled the hotspot destintion. A specil cse will hppen when w = 1, i.e., λ ii (t) =. To constrin the burstiness of flow F ij, we consider leky bucket model (η λ ij, σ ij ), where σ ij is the burst size of F ij [7]. We set σ ij of every flow to fixed vlue of 10,000 bytes, nd the burst my rrive t ny time during simultion run. To evlute the performnce of our scheme, We compre our simultion dt with Loclized Independent Pcket Scheduling (LIPS), in which n input port or output port mkes scheduling decisions solely bsed on the stte informtion of its locl crosspoint buffers [6]. We consider four different LIPS implementtion versions with different rbitrtion rules s follows: FP (Fixed Priority) ssigns fixed priority order to ll the virtul queues of the sme input to the sme output nd lwys picks the cndidte with the highest priority; D (ndom) mkes the rbitrtion on rndom bsis; (ound obin) lterntively chooses eligible cndidtes in round robin mnner to void strvtion; OPF (Oldest Pcket First) uses the pcket rrivl time s the rbitrtion criterion, i.e., the pcket rriving erlier hs higher priority. Now, we investigte the results on the throughput nd the verge dely. A. Throughput To verify theorem 1, we present the simultion dt to show tht our scheme chieves 100% throughput. Figure 2() displys the throughput under uniform trffic. It cn be seen tht, the throughput of different schemes grows consistently with the effective lod, nd finlly reches 100% when the effective lod becomes 1, only FP slightly decreses when the lod is the mximum. Figure 2(b) shows the throughput under non-uniform trffic. It clerly reflects the non-monotonic performnce vritions of other methods. As expected, QLP significntly yields higher throughput thn the other schemes when the speedup is one. The other schemes Throughput Throughput Switch, Uniform Trffic Lod () Switch, Non-uniform Trffic Unblnced Probbility Fig. 2. Throughput of QLP. () With different lods (b) With different unblnced probbilities. chieve the lowest throughput when the unblnced probbility is round 0.5 nd then, throughput is grdully improved until the unblnced probbility becomes 1. In fct t this point, ll the pckets of In i go to Out j nd no scheduling is necessry. The results confirm tht, QLP chieves 100% throughput nd outperforms the other four methods when the speedup is one. B. Averge Dely Next, we study the dely performnce of QLP. We mesure the totl time tht pcket stys in the switch. It is the intervl from the time tht the lst bit of pcket rrives t its input to the time tht the lst bit of the pcket is sent to the output. We plot the verge dely of different schemes in logrithmic scle nd the verge dely is mesured in seconds. Figure 3() displys the verge dely under uniform trffic. As cn be seen, the dely grows grdully when the effective lod increses, nd jumps when the effective lod becomes 1. Surprisingly, for the effective lods greter thn 0.8, the QLP outperforms the other four schemes. Figure 3(b) depicts the verge dely under non-uniform trffic. As expected, QLP shows n optimistic behvior in comprison with the other four methods nd the dely difference is more thn one decde. The verge dely of other schemes increses with the unblnced probbility nd reches to the mximum when the unblnced probbility is round 0.5. Then, the verge dely (b)
6 Averge Dely (Logrithmic Scle) Averge Dely (Logrithmic Scle) Switch, Uniform Trffic Lod () Switch, Non-uniform Trffic Unblnced Probbility (b) Fig. 3. Averge Dely of QLP. () With different lods (b) With different unblnced probbilities. of ll schemes drops when the unblnced probbility is equl to 1, becuse t this point ll trffic of n input is destined to the sme output nd no switching is necessry. It is observed tht, different unblnced probbilities do not significntly ffect the verge dely of QLP, which demonstrtes tht our scheme works well under non-uniform trffic. V. CONCLUSIONS In this pper, we hve presented the Queue Length Proportionl (QLP) bndwidth lloction scheme for GPS to schedule best effort trffic in crossbr switches without speedup. In QLP, the mount of service tht ech flow receives is proportionl to the length of its bcklogged queue. QLP essentilly fvors the queues with the gretest occupncy nd thus ssists the crossbr switch to be more work-conserving. By theoreticl nlysis, we hve proved tht QLP is strongly stble nd therefore provides 100% throughput for ny dmissible trffic, no mtter whether the trffic distribution is uniform or nonuniform. We hve lso shown tht QLP is fesible, which mens the llocted bndwidth does not exceed the vilble cpcity. Furthermore, we hve discussed how to trck the queue length in GPS. Finlly, we hve conducted simultions to verify the nlyticl results. EFEENCES [1] A. Prekh nd. Gllger, A generlized processor shring pproch to flow control in integrted services networks: the single node cse, IEEE/ACM Trns. Networking, vol. 1, no. 3, pp , Jun [2] A. Demers, S. Keshv nd S. Shenker, Anlysis nd simultion of fir queueing lgorithm, ACM SIGCOMM 89, vol. 19, no. 4, pp. 3-12, Austin, TX, Sept [3] H. Zhng, WF2Q: worst-cse fir weighted fir queueing, IEEE INFO- COM 96, pp , Sn Frncisco, CA, Mr [4] J. Xu nd. J. Lipton, On Fundmentl Trdeoffs between Dely Bounds nd Computtionl Complexity in Pcket Scheduling Algorithms, IEEE/ACM Trns. on Netw., vol. 13, no. 1, pp , Feb [5] S. He, S. Sun, W. Zho, Y. Zheng, nd W. Go, On Gurnteed Smooth Switching for Buffered Crossbr Switches, IEEE/ACM Trnsctions on Networking, vol. 16, no. 3, pp , [6] D. Pn nd Y. Yng, Loclized Independent pcket scheduling for buffered crossbr switches, IEEE Trns. on Comp., vol. 58, Feb [7] J. Kurose nd K. oss, Computer networking: top-down pproch, Addison Wesley, 4th edition, [8] X. Zhng, S.. Mohnty, nd L.N. Bhuyn, Adptive Mx-Min Fir Scheduling in Buffered Crossbr Switches Without Speedup, 26th IEEE Interntionl Conference on Computer Communictions, INFOCOM 07, pp , Qulcomm Inc., Sn Diego, My [9] M.. Hosgrhr nd H. Sethu, Mx-Min Fir Scheduling in Input- Queued Switches, IEEE Trnsctions on Prllel nd Distributed Systems, volume 19, number 4, pp , Apr [10] Gerld. Ash, Trffic engineering nd QoS optimiztion of integrted voice nd dt networks, Morgn Kufmnn, first edition, [11] D. Pn nd Y. Yng, Mx-min fir bndwidth lloction lgorithms for pcket switches, IEEE Int. Pr. nd Dist. Processing Symp. (IPDPS), Long Bech, CA, Mr [12] S. Chung, S. Iyer, nd N. McKeown, Prcticl lgorithms for performnce gurntees in buffered crossbrs, IEEE INFOCOM 05, Mimi, FL, Mrch [13] M. Shreedhr nd G. Vrghese, Efficient fir queuing using deficit round robin, IEEE/ACM Trns. Netw., vol. 4, no. 3, pp , [14] N. Ni nd L. Bhuyn, Fir scheduling for input buffered switches, Cluster Computing, vol. 6, no. 2, pp , Hinghm, MA, Apr [15] X. Zhng nd L. Bhuyn, Deficit round-robin scheduling for inputqueued switches, IEEE Journl on Selected Ares in Communictions, no. 4, pp , My [16] D. Pn nd Y. Yng, Credit bsed fir scheduling for pcket switched networks, IEEE INFOCOM, pp , Mimi, FL, Mrch [17] M. J. Krol, M. J. Hluchyj, nd S. P. Morgn, Input Versus Output Queueing on Spce-Division Pcket Switch, IEEE Trnsctions on Communictions, vol. 35, no. 12, pp , Dec [18] N. McKeown, A. Mekkittikul, V. Annthrm nd J. Wlrnd, Achieving 100% throughput in n input queued switch, IEEE Trnsctions on Communictions, vol. 47, no. 8, pp , [19] D. Stephens nd H. Zhng, Implementing distributed pcket fir queueing in sclble switch rchitecture, IEEE INFOCOM, Sn Frncisco, CA, Mrch [20] X. Zhng nd L. Bhuyn, An Efficient Scheduling Algorithm for Combined-Input-Crosspoint-Queued (CICQ) Switches, IEEE GLOBE- COM, Dlls, TX, November [21] L. Mhmdi nd M. Hmdi, Output queued switch emultion by one-cell-internlly buffered crossbr switch, IEEE GLOBECOM, Sn Frncisco, CA, Dec [22] J. Turner, Strong performnce gurntees for synchronous crossbr schedulers, IEEE/ACM Trnsctions on Networking, to pper, [23] E. Leonrdi, M. Melli, F. Neri, nd M. A. Mrsn, On the stbility of input-queued switches with speed-up, IEEE/ACM Trns. Netw., vol. 9, no. 1, pp , [24] P.. Kumr nd S. P. Meyn, Stbility of queueing networks nd scheduling policies, IEEE Trnsctions on Automt. Control, vol. 40, pp , Feb [25] M. A. Mrsn, et l. Pcket Scheduling in Input-Queued Cell-Bsed Switches, IEEE INFOCOM, Alsk, USA, April [26] G. Psss, M. Ktevenis, Pcket Mode Scheduling in Buffered Crossbr (CICQ) Switches, Proc. IEEE Workshop on High Performnce Switching nd outing (HPS 2006), pp , Poznn, Polnd, June [27] ojs-cess, E. Oki, Z. Jing nd H. J. Cho, CIXB-1: Combined input-once-cell-crosspoint buffered switch, IEEE Workshop on High Performnce Switching nd outing, Dlls, TX, July 2001.
All pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationQoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationPerformance Prediction of Distributed Load Balancing on Multicomputer Systems
Performnce Prediction of Distributed Lod Blncing on Multicomputer Systems Ishfq Ahmd *, Arif Ghfoor+, nd Kishn Mehrotr * * School of Computer nd Informtion Science, Syrcuse University, Syrcuse, NY 13244
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationEconomics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationResearch of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming
Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationTraffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
More informationTITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING
TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationSpace Vector Pulse Width Modulation Based Induction Motor with V/F Control
Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationg(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany
Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationThe Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationDistributions. (corresponding to the cumulative distribution function for the discrete case).
Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive
More informationand thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationLower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines
Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationpiecewise Liner SLAs and Performance Timetagment
i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.
More informationIntegration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
More informationUNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE
UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion
More informationMODULE 3. 0, y = 0 for all y
Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)
More informationExample A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationOnline Multicommodity Routing with Time Windows
Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute
More informationValue Function Approximation using Multiple Aggregation for Multiattribute Resource Management
Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationSPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationBasic Analysis of Autarky and Free Trade Models
Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationModule 2. Analysis of Statically Indeterminate Structures by the Matrix Force Method. Version 2 CE IIT, Kharagpur
Module Anlysis of Stticlly Indeterminte Structures by the Mtrix Force Method Version CE IIT, Khrgpur esson 9 The Force Method of Anlysis: Bems (Continued) Version CE IIT, Khrgpur Instructionl Objectives
More informationDynamic TDMA Slot Assignment in Ad Hoc Networks
Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of
More informationLearner-oriented distance education supporting service system model and applied research
SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More informationLecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationPERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING
PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.6 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING Sid EL KAFHALI Abdelli EL BOUCHTI Mohmed HANINI nd Abdelkrim HAQIQ Computer, Networks, Mobility
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationCHAPTER 11 Numerical Differentiation and Integration
CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More information9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
More informationENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)
ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationSection 7-4 Translation of Axes
62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More information5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.
5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued
More informationPerformance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More information2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration
Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting
More informationEuler Euler Everywhere Using the Euler-Lagrange Equation to Solve Calculus of Variation Problems
Euler Euler Everywhere Using the Euler-Lgrnge Eqution to Solve Clculus of Vrition Problems Jenine Smllwood Principles of Anlysis Professor Flschk My 12, 1998 1 1. Introduction Clculus of vritions is brnch
More informationWeek 11 - Inductance
Week - Inductnce November 6, 202 Exercise.: Discussion Questions ) A trnsformer consists bsiclly of two coils in close proximity but not in electricl contct. A current in one coil mgneticlly induces n
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationCOMPONENTS: COMBINED LOADING
LECTURE COMPONENTS: COMBINED LOADING Third Edition A. J. Clrk School of Engineering Deprtment of Civil nd Environmentl Engineering 24 Chpter 8.4 by Dr. Ibrhim A. Asskkf SPRING 2003 ENES 220 Mechnics of
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationDiscovering General Logical Network Topologies
Discovering Generl Logicl Network Topologies Mrk otes McGill University, Montrel, Quebec Emil: cotes@ece.mcgill.c Michel Rbbt nd Robert Nowk Rice University, Houston, TX Emil: {rbbt, nowk}@rice.edu Technicl
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationbelief Propgtion Lgorithm in Nd Pent Penta
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 375 Itertive Trust nd Reputtion Mngement Using Belief Propgtion Ermn Aydy, Student Member, IEEE, nd Frmrz Feri, Senior
More information4.11 Inner Product Spaces
314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces
More informationProject Recovery. . It Can Be Done
Project Recovery. It Cn Be Done IPM Conference Wshington, D.C. Nov 4-7, 200 Wlt Lipke Oklhom City Air Logistics Center Tinker AFB, OK Overview Mngement Reserve Project Sttus Indictors Performnce Correction
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More informationReputation management for distributed service-oriented architectures
Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More information19. The Fermat-Euler Prime Number Theorem
19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout
More informationModeling POMDPs for Generating and Simulating Stock Investment Policies
Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo
More informationORBITAL MANEUVERS USING LOW-THRUST
Proceedings of the 8th WSEAS Interntionl Conference on SIGNAL PROCESSING, ROBOICS nd AUOMAION ORBIAL MANEUVERS USING LOW-HRUS VIVIAN MARINS GOMES, ANONIO F. B. A. PRADO, HÉLIO KOII KUGA Ntionl Institute
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationDeployment Strategy for Mobile Robots with Energy and Timing Constraints
Proceedings of the 2005 IEEE Interntionl Conference on Robotics nd Automtion Brcelon, Spin, April 2005 Deployment Strtegy for Mobile Robots with Energy nd Timing Constrints Yongguo Mei, Yung-Hsing Lu,
More informationAllocation Strategies of Virtual Resources in Cloud-Computing Networks
RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,
More information9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
More informationLectures 8 and 9 1 Rectangular waveguides
1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves
More informationHow To Understand The Theory Of Inequlities
Ostrowski Type Inequlities nd Applictions in Numericl Integrtion Edited By: Sever S Drgomir nd Themistocles M Rssis SS Drgomir) School nd Communictions nd Informtics, Victori University of Technology,
More informationEE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown
EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros
More informationThe mean-variance optimal portfolio
ALEXANDRE S. DA SILVA is vice president in the Quntittive Investment Group t Neuberger ermn in New York, NY. lexndre.dsilv@nb.com WAI LEE is the chief investment officer nd hed of the Quntittive Investment
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationOptiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds
Optiml Control of Seril, Multi-Echelon Inventory/Production Systems with Periodic Btching Geert-Jn vn Houtum Deprtment of Technology Mngement, Technische Universiteit Eindhoven, P.O. Box 513, 56 MB, Eindhoven,
More information