Virtual trunk simulation

Size: px
Start display at page:

Download "Virtual trunk simulation"

Transcription

1 Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne 26 August 1997 Abstract One of the activities of the ACTS project EXPERT is to perform trias demonstrating the use of advanced Resource Management and Routing (RM&R) agorithms in ATM networks. The RM&R mode chosen for those trias is based on the Virtua Trunk (VT) concept. In ATM networks, a VT is a virtua path connection setup by the network for reducing connection awareness at the transit nodes. A virtua trunk is considered as a connection by the network supporting it (the VP network), and as a ogica trunk by the connections supported. In this context, VTs are considered to be VBR connections. In order to adapt the VT eve to the changes in traffic, we use dynamic virtua trunks. In this paper, we compare the VBR-over-VBR approach to a more traditiona VBR-over-CBR approach. The comparison is based on the simuations performed in the EXPERT project by WP3.2. In addition, a dynamic VP bandwidth aocation method is demonstrated by simuations. 1 Introduction One of the main difficuties in designing and operating connection oriented networks, such as ATM networks, is the compexity required for supporting connections [GGL95]. Every connection estabished through the network is associated at every node with abe swapping tabes, capacity reserved in the queues and connection contro bocks (or equivaent denominations) used by the signaing or contro protoco. The connection estabishment and maintenance require considerabe processing [GG93]. Moreover the management of each singe connection requires maintaining a arge amount of structures. The consequence is that the connection handing capabiities of the network nodes are imited. Such imits depend strongy on the node design and configuration (such as the amount of memory instaed, or the number of ports or port cards [GGL95]). Additiona factors, such as the ink capacity are responsibe of those imits [FOR95, ALL95]. In particuar the resource management in ATM networks starts to be difficut when ink resources are aocated to individua connections. In the iterature, severa approaches use the VP concept to bunde individua connections. The approach deveoped in [GLOR97] was chosen as a basis for the simuations performed in the EXPERT project by WP3.2. This approach is based on the Virtua Trunk (VT) concept. In ATM networks, a VT is a Virtua Path Connection (VPC) setup by the network for reducing the connection awareness in transit nodes. A VPC is a connection for the network supporting it (the VP network), and it is considered as a ogica trunk by the Virtua Channe Connections (VCC) supported. Here, for each VPC, we have a tunneing scenario where a number of VBR VCCs are mutipexed onto a VBR VPC at a node that acts as a genera shaper, and the VBR VPCs are mutipexed on the network. This is caed the VBR-over-VBR approach. In the more traditiona VBR-over-CBR approach, VBR VCCs are mutipexed onto a CBR VPC. In this case, it is not any more possibe to mutipex the VPCs on the network. * This work was competed whie the first author was at VTT Information Technoogy. 1

2 To better adapt to the changes in traffic, the resources shoud not be aocated to the VPs staticay but in a dynamic way. In the VBR-over-VBR approach, as specified in [GLOR97], the resources are aocated on-demand, reaizing the Compete Sharing (CS) poicy. Another possibiity is to reaocate the resources at reguar intervas. With a short time interva, these two methods are quite simiar but, with a ong interva, the atter method becomes rather static corresponding to the Compete Partitioning (CP) poicy. In this paper, we compare the nove VBR-over-VBR approach to the more traditiona VBR-over-CBR approach. The comparison is based on the simuations performed in the EXPERT project by WP3.2. In these simuations, the dynamicity in resource aocation is achieved by a periodic bandwidth aocation scheme originay deveoped in [BAMS94], [BMPS95], [MPS95] and [MPS96]. The simuation resuts presented here show that the VBR VPCs perform better than the CBR VPCs, even if the gain we obtained was not very high. We beieve that this is mainy due to the rather inefficient method used to mutipex the VPCs on the network. 2 Virtua Trunk mode The VT approach uses the concepts of arriva curve and extended service curve, defined in the Network Cacuus theory [LEB96]. An arriva curve is an upper bound to the traffic sent by an input stream. Thus, as defined in [CRU95], given a wide-sense increasing function α, we say that a fow with arriva function R has an arriva curve α, if and ony if, for a t and s t, Rt () Rs () α ( t s). An extended service curve is a ower bound to the service offered at a system S. Thus, as defined in [LEB96], the system S with output function R* offers an extended service curve σ to a fow with arriva function R, if and ony if, for a t there exists some t0 0, t0 t, such that R ( t) R( t0) σ ( t t0). Starting from these two definitions, the Network Cacuus theory provides powerfu toos to manage guaranteed services. B α σ Figure 1 VT Reference Mode: the input fows with aggregate arriva curve α are mutipexed onto a VT with arriva curve σ. The shaper node offers to the input fow service described by the service curve σ. The maximum backog is indicated by B. The VT is defined in terms of two sets of parameters, a connection descriptor and a trunk state [GLOR97]. The trunk state describes the characteristics of the traffic mutipexed onto the VT. It is given in terms of an aggregate arriva curve, α, of the fows incuded. The connection descriptor describes the characteristic of the VT. It is given in terms of a shaping curve, σ, of the shaper. Theorem 6 of [LEB96] says that a shaper node with shaping curve σ (that is the VT arriva curve) offers to the input fow a service curve equa to σ. Thus, by Theorem 1 of [netcac97], the backog R(t) - R*(t) has the foowing upper bound for any t: 2

3 (1) Rt () R*() t sup s 0{ α() s σ ()}. s The mutipexing node acts as a genera shaper with shaping curve σ, and generates a fow described by the output function R*, as in the basic mode depicted in Figure 1. With a buffer of size given by (1), there wi be no osses in the mutipexing node. 3 Simuation scenario The simuation scenario consists of two overaid networks, the physica network and the ogica (VP) network. The underying physica network is assumed to consist of nodes (ATM-switches), which are competey connected by identica physica inks. The physica inks are characterized by giving the capacity (bandwidth) of the ink and the size of the ink buffer. In the simpest case, there are three nodes connected together as a triange, see figure 2. Figure 2 Three nodes connected together as a triange. A the traffic is modeed to arrive from reguated VBR sources. Each connection is assumed to be symmetric (with identica traffic parameters for forward and backward streams) beonging to one of the traffic casses. Each traffic cass is characterized by its traffic descriptor (incuding PCR, SCR and BT) and the statistics characteristics (the mean hoding time, the arriva rate of connection requests). The atter are used for the generation of traffic. The traffic sources are reguated so that they conform to GCRA(1/PCR,0) and GCRA(1/SCR,BT). The VCC connection requests are assumed to arrive according to a stationary Poisson process. Thus, no transient effects due to variations in the traffic oad are taken into account. The hoding times are samped independenty from an exponentia distribution. In addition, the traffic pattern is thought to be even, i.e. the source and the destination of a VCC connection request are samped from a uniform distribution. Each traffic cass is assumed to be served by its own ogica network consisting of VPC inks. Thus, we have taken the traffic separation approach. Aso the ogica networks are modeed to be competey connected. So, each VPC traverses through exacty one physica ink, and each physica ink conveys as many VPCs as there are different traffic casses. In figure 2, there are two traffic casses, and, thus, two ogica triange networks. The structure of the ogica networks is assumed to be stabe. Thus, no new VPCs are estabished nor any of the existing VPCs are torn down during the simuation. 3

4 4 Resource Management agorithms used in simuations In the setting presented in section 3, the purpose of the resource management is to aocate bandwidth to the VPCs. The periodic aocation scheme used in the simuations is described beow in section 4.1. Once aocated an amount of bandwidth, it is possibe to cacuate how many VCC connections (beonging to the cass considered) the VPC can support. This is the task of the CAC function. As mentioned in the introduction, two different approaches to the connection admission contro have been impemented: VBR-over-CBR and VBR-over-VBR. These are described more detaied in section 4.2. We note that these approaches assume that at each period the resources (shaping buffer, maximum burst toerance) are competey avaiabe, ike at the initia time. This is, of course, not true in a rea scenario, but we beieve that, in the scenario under consideration, we can make this assumption. In fact we introduce severa factors of overestimation: the input fows are described by means of their arriva curves (VBR traffic descriptors), which are upper bounds to the generated input traffic; the VT is described by means of its service curve (a CBR or a VBR traffic descriptor), which is a ower bound to the service offered; and, finay, we use a worst case approach to optimize the VT parameters. A these steps add some approximation to agorithms used in simuations. 4.1 Dynamic, periodic bandwidth aocation scheme In this centraized RM method, VPC bandwidths are reaocated at periodic intervas. In the seque, the updating interva is denoted by t u. The objective is to aocate for each VPC just as much bandwidth as needed to satisfy the stationary bocking probabiity target, which may be cass-specific. Thus, it may happen that not a the capacity of the physica inks is aocated to VPCs. The origina references are [BDMS94], [BMPS95], [MPS95] and [MPS96]. The method is based on the knowedge of the number of active connections per each VPC. In addition, the average ca arriva intensities and the mean hoding times for a traffic streams are needed. The method incudes the foowing three phases. 1st phase Aocation is first made for each VPC separatey. Consider a VPC. Let n denote the number of active VCC connections conveyed by the VPC. Denote by λ and T the arriva rate and the mean hoding time of such VCC connection requests, respectivey. In the simuations, the two statistica parameters λ and T are assumed to be known. Let ρ = λt. What is first cacuated is the maximum number, N, of connections the VPC shoud support during the next updating interva in order that the bocking probabiity during the interva be ess than ε/2, 1 where ε is the target bocking probabiity for the cass. For this we need the foowing function: N = transienterangrequirement( n, ρ, ε / 2, t / T). In principe, there are precise numerica methods to impement this function [VA97]. However, these methods are far too time-consuming for our purposes. Thus a simpe approximation is needed. In the simuations, the foowing (rather crude) approximation is used: 2 where pt () = exp( t) and N= npt ( / T) + N ( 1 pt ( / T)), u N = stationaryerangrequirement( ρ, ε / 2 ). u u 1 The (vague) heuristic behind this is as foows: the upper imit N for N is chosen so that the proportion of time when there are N active connections is (approximatey) ε/2. In this state, a the incoming connection requests are rejected. On the other hand, when there are ess than N active connections, the proportion of time for which is 1-ε/2, the dimensioning is made so that the proportion of rejected connection requests woud be ε/2. Thus, the overa bocking probabiity becomes (approximatey) ε / 21 + ( 1 ε / 2) ε / 2 ε. 2 According to the simuations made, this dimensioning formua seems to function when t u /T is great enough, say 1. However, with smaer vaues, the aocations seem to be too sma. 4

5 The function stationaryerangrequirement utiizes the ordinary Erang bocking formua, stationaryerangrequirement( ρ, ε) = min{ N Erang( N, ρ) ε}. 2nd phase In the second phase aocation is made for each physica ink separatey. Consider a physica ink. Let C denote its capacity (bandwidth), and denote by K the number of VPCs conveyed. The VPCs are indexed by k. As the resut of the first phase we have the maximum number N k of connections to be supported by each individua VPC k. This is converted into a bandwidth requirement C k. For this we need the CAC function caed requiredbandwidth (see section 4.2), C = requiredbandwidth ( N ). k k k After the bandwidth requirements are cacuated we have to check whether the ink capacity is sufficient, i.e. Ck C. k If this is true, we can step into the fina phase. Otherwise the aocations must be adjusted not to exceed the capacity avaiabe. In the atter case, we first cacuate the bandwidth requirements c k of the existing connections. For this we need the number n k of active connections and (again) the CAC function requiredbandwidth (see section 4.2), The remaining capacity is denoted by R, c = requiredbandwidth ( n ). k k k R C ck k =. It is shared as fairy as possibe, the fair share for VPC k defined by Thus, we have the foowing adjusted capacities: Note that Ck ck C c i i ~ C c R C k c k k = k +. Ci ci i k ~ C k i. = C. By using the (inverse) CAC function caed aowednrcas (see section 4.2), we may cacuate the adjusted maximum number ~ N k of connections to be supported by VPC k, ~ N = aowednrcas ( C ~ ). k k k After this, the (rea) capacity aocations are as foows: ~ C = requiredbandwidth ( N ~ ), k k k which is ess than or equa to ~ C k. Thus, there may sti remain some capacity eft over, namey 5

6 ~ ~ R C = C k. This remaining capacity may sti be utiized by traffic casses with ower bandwidth demands. 3rd phase Finay, VPC bandwidths are adjusted at the network eve. However, since in our setting each VPC traverses exacty one physica ink, no more adjustments are needed. k 4.2 CAC functions The purpose of the CAC functions is to cacuate the required bandwidth given the number of homogeneous connections and their cass, or to cacuate the aowed number of homogeneous connections given the bandwidth avaiabe and the traffic cass. The former function is caed requiredbandwidth and the atter one aowednrcas. The mode is defined in section 2. Beow we describe the two approaches to the connection admission contro used in the simuations, first the traditiona VBR-over-CBR approach and then the nove VBR-over-VBR approach. VBR-over-CBR approach This is a modified peak rate aocation method that takes into account the shaping buffers of VPCs when avaiabe. The node reference configuration used in the simuation is shown in figure 3. A mutipexer, fed with a number of input connections of VBR type, mutipexes them into one CBR virtua trunk, using a shaping buffer of size B. The shaper guarantees that the buffer output conforms to GCRA(1/R 0,0). Figure 3 CBR Node Reference Configuration. Denote by N the number of homogeneous VBR VCC connections (with peak rate R, sustainabe ce rate m and maximum burst ength t) sharing the VPC. The connection between the maximum burst ength t and the burst toerance τ is as foows (see [GLOR97]): t = τ m /( R m). Denote further by C the bandwidth avaiabe for the VPC, and by B the size of the shaping buffer connected to the VPC. The VT attributes are defined by: Trunk state z = ( N, R, m, τ ). Connection descriptor y = R 0. To get the aggregate arriva curve α corresponding to the trunk state z, we assume (as in [GLOR97]) that a the VBR sources are of the deterministic on-off type with active and ide periods of ength t and τ, respectivey. The worst case is that the active periods of the sources start at the same time. As a consequence, we have Note that α s { NRs Nm τ + s } [ ) [ ) ( τ), ( + τ), ( + τ) +, ( + ) ( + τ) + ( + )( + τ) NR s k s k t k t t α() s =. NR k 1 t, s k t t, k 1 t. () min, ( ). 6

7 On the other hand, the service curve σ offered by the simpe shaper to the input fow is as foows: σ () s = R 0 s. Now it foows from equation (1) that R0 = max { NR B / t, Nm}. This is the minimum vaue of R 0 that guarantees no osses with a shaping buffer of size B. Finay we concude that the two CAC functions needed in the bandwidth aocation are as foows: { NR B/ t, Nm}, max{ nr B/ t, nm} requiredbandwidth( N, R, m, t, B) = max aowednrcas( C, R, m, t, B) = max{ n C}. Note that by omitting the shaping buffer (B = 0) we resut in the ordinary peak rate aocation method. VBR-over-VBR approach This is an advanced aocation method that takes into account both the shaping buffers of VPCs and the ink buffers of physica inks when avaiabe. In addition, the target ce oss probabiity is needed. The node reference configuration used in the simuation is shown in figure 4. A mutipexer, fed with a number of input connections of the VBR type, mutipexes them into one VBR connection (the VBR trunk), using a buffer of size B. The shaper used in the simuations is not a buffered eaky bucket reguator but just a simpe shaper guaranteeing that the buffer output conforms to GCRA(1/R 0, 0). However, due to the reguated nature of the input fow, it is possibe to find parameters m 0 and τ 0 such that the output conforms aso to GCRA(1/m 0,τ 0 ). Figure 4 VBR Node Reference Configuration. Denote by δ the target ce oss probabiity. In addition, et B denote the size of the ink buffer. In this case the VT attributes are defined by: Trunk state z = ( N, R, m, τ ). Connection descriptor y = ( R, m, τ ) As above, to get the aggregate arriva curve α corresponding to the trunk state z, we assume that the VCC connections are of the same deterministic on-off type. Thus, [ ) [ ) ( τ), ( + τ), ( + τ) +, ( + ) ( + τ) + ( + )( + τ) NR s k s k t k t t α() s =. NR k 1 t, s k t t, k 1 t. Since we used a simpe shaper pus a buffered eaky bucket reguator in the simuations, the service curve σ is as foows: { τ } σ() s = min R0s, m0( 0 + s). So it foows (again) from equation (1) that R0 = max { NR B / t, Nm}. 7

8 Since we assumed that the service rate of the shaping buffer is R 0 and a the bursts of the underying VCC connections start at the same asting the maximum time t, the output from the shaper ooks ike another deterministic on-off source with sustainabe rate m 0 and burst ength t 0. The tripe (R 0,m 0,t 0 ) is further mapped to an equivaent capacity needed for the bandwidth aocation by using the function equivaentcapacity originay defined in [GAN91] as foows: ( ) / equivaentcapacity( R, m, t, X, ) R Y X + Y X + 4 XYm 0 R δ = 0, 2Y where Y = n( δ ) t 0 ( R 0 m 0 ). This is the rate necessary for achieving a desired buffer overfow probabiity δ on a given physica ink, given a physica ink buffer of size X and the traffic descriptor (R 0,m 0,t 0 ). From that we derive given by: m0 = Nm, t0 = NRt / R0. Finay we concude that τ 0 = t 0 ( R 0 m 0 ) / m 0. Thus, the two CAC functions are in this case as foows: requiredbandwidth( NRmtBB,,,,,, δ) = equivaentcapacity( R0( N), m0( N), t0( N), B, δ), aowednrcas( CRmtBB,,,,,, δ) = max{ n equivaentcapacity( R( n), m( n), t( n), B, δ) C} Here R 0 (N) and R 0 (n) correspond to peak rates cacuated from the previous formua by assuming that the number of active connections is N and n, respectivey. The same is true aso for the functions m 0 and t 0. Note that by omitting the ink buffer (B = 0) we obtain the same CAC functions as in the CBR-over- VBR approach described above. 5 Simuation trias The foowing two simuation trias were performed: Tria 1: the nove VBR-over-VBR approach was compared to the traditiona VBR-over-CBR approach. Tria 2: the ength of the updating interva was varied. Two different (abeit rather artificia) traffic casses were considered, one with a high bandwidth demand and the other with a ow bandwidth demand. The constant parameters of the two casses are given in tabe 1. In particuar, we see from the definitions beow that the maximum burst ength (with fu ce rate) is 20 ce eve time units 3 for both casses. During a burst of a connection beonging to cass 1, ces may arrive at maximum rate 10 ces per ce eve time unit, impying that the maximum burst size is 200 ces. For cass 2 the corresponding vaues are 1 ce per ce eve time unit and 20 ces. Note further that the mean hoding time, which is the average ength of a connection, is chosen to be 1 ca eve time unit 4 for both casses. The network considered consists of three nodes connected together with identica physica inks as a triange. In fact, the network configuration is as aready presented in figure 2. The capacity (bandwidth) of physica inks is assumed to be 100 ces per ce eve time unit in every case. 3 The ce eve time unit can be chosen freey, e.g. a miisecond. 4 Aso the ca eve time unit can be chosen freey, e.g. a minute. In particuar, it does not need to be the same as the ce eve time unit. 8

9 Parameter cass 1 cass 2 peakcerate sustainabecerate bursttoerance maxburstlength bockingthreshod celossthreshod meanhodingtime 1 1 Tabe 1 The two traffic casses used in the simuations. In the simuations we used the dynamic, periodic bandwidth aocation scheme by Mocci et. a. described earier in section 4.1. In addition, a connection requests accepted were routed aong the direct paths, which impies that, in fact, the resuts of the simuations are independent of the size of the network. In each tria, mutipe simuation runs were performed with varying offered traffic oad. The traffic oad of each cass was taken to be equa. The foowing parameters were considered as a resut of each simuation run: the percentage of average free capacity (i.e. the part of the capacity of physica inks not aocated to VPCs) in the physica network, the percentage of rejected cas (from a cas offered) for each traffic cass, In the appendices, where the resuts of the simuation runs are given, these parameters are presented as a function of the offered traffic oad. By the traffic oad we mean the ratio of the traffic offered (from a casses together) to a physica ink and the capacity of a physica ink (expressed in percents). Thus, if the offered traffic oad is said to be 50, it means that, on the average, the traffic offered requires haf of the capacity in each physica ink. In these figures, the percentage of average free capacity is potted in a norma inear scae, whereas the percentage of rejected cas is presented in a og-inear scae. 5.1 Tria 1: VBR-over-VBR vs. VBR-over-CBR In this tria the nove VBR-over-VBR approach was compared to the traditiona VBR-over-CBR approach. In both approaches we further studied the effect of a shaping buffer. Thus we had four aternatives to be compared. The parameters of these aternatives are given in tabe 2. Parameter VBR-over-CBR no shaping shaping VBR-over-VBR no shaping shaping shapingbuffer inkbuffer Tabe 2 Parameters for the four aternatives in tria 1. Shaping buffers are assumed to be identica for a VPCs. Correspondingy, ink buffers are assumed to be identica for a physica inks. The buffer sizes are given in number of ces. Note that a shaping buffer of 200 ces can incude 1 burst of cass 1 or 10 bursts of cass 2. Correspondingy, a ink buffer of 1000 ces can incude 5 bursts of cass 1 or 50 bursts of cass 2. In the simuations we used the 9

10 dynamic, periodic bandwidth aocation scheme by Mocci et. a. described earier in section 4.1 with updating interva 1 ca eve time unit. The resuts of the simuations are presented in Appendix A. As expected, the VBR-over-VBR approach resuts in a better performance. However, the difference between the two approaches does not seem to be very arge. This is party due to the rather inefficient method for cacuating the effective bandwidth. By introducing more advanced methods, better resuts may be achieved by the VBR-over-VBR approach. On the other hand, by introducing shaping buffers it is possibe to increase remarkaby the performance of both approaches. However, this requires that the traffic shaped is not critica for deays. In addition, the simuations show that the dynamic bandwidth aocation method functions as expected. With ight or medium traffic oad, the bocking probabiity is in the target area varying from 0.5 % to 2 %. The deviation from the exact target of 1 % is party due to random variations, which coud be diminshed by having onger simuation runs. Note that the stabiity in the bocking probabiity is achieved by an increasing use of network resources: the percentage of the average free capacity fas from 100 % down to 0 % when the traffic oad is increased. With heavy traffic oad, the bocking probabiity naturay grows because of the ack of network resources. 5.2 Tria 2: Varying updating interva of VPC capacities In this tria the ength of the updating interva of VPC capacities, which reates to the dynamic, periodic bandwidth aocation scheme by Mocci et. a., was varied. The comparison was made between three different vaues of the ength parameter (updatinginterva): 1.0, 0.5 and 0.1 ca eve time units. A connection requests accepted were routed aong the direct paths. In the simuations we used the VBRover-CBR approach as regards the CAC functions. The resuts of the simuations are presented in Appendix B. The resuts show ceary that the approximative method for the bandwidth aocation used in the simuations functions ony if the updating interva is great enough (1 ca eve time unit or greater). With smaer vaues, the aocations are too sma. 6 Summary and discussion We presented two simuation trias of the RM&R agorithms impemented in the EXPERT project. In the first one, VBR-over-VBR vs. VBR-over-CBR, we found that the nove approach using VBR VTs performs better than the traditiona one using CBR VTs. The gain in our exampe is not very high, perhaps because of the rather inefficient method (Equivaent Capacity) that used for cacuating the effective bandwidth. By introducing more advanced methods, better resuts may be achieved by the VBR-over-VBR approach. The second tria was performed to evauate the accuracy of the approximative bandwidth aocation function presented in section 4.1. The resuts showed that the approximative method functions ony if the updating interva is great enough (typicay of the size of one average hoding time). Thus, further deveopment is needed. 7 Acknowedgements This work has been carried out as part of the ATCS project EXPERT, in which VTT Information Technoogy participated as subcontractor of NOKIA Corporation, and LRC-EPFL participated as subcontractor of ASCOM Technoogy. References [ALL95] A. Aes, Interworking with ATM, InterOp proceedings,

11 [BAMS94] C. Bruni, P. D Andrea, U. Mocci and C. Scogio, Optima capacity management of virtua paths in ATM networks, IEEE Gobecom 94, San Francisco, November 1994, vo. 1, pp [BMPS95] C. Bruni, U. Mocci, P. Pannunzi and C. Scogio, Efficient capacity assignment for ATM virtua paths, RACE Workshop, ATM hot topics on Traffic and Performance: from RACE to ACTS, Mian, June 1995, paper 11. [CRU95] D. Cruz, Quaity of service guarantees in virtua circuit switched networks, IEEE JSAC, pp August [FOR95] R. Forberg, Where is the atency in ATM?, Data Communications Magazine, [GAN91] R. Guerin, H. Ahmadi and M. Naghshineh, Equivaent capacity and its appication to bandwidth aocation in high-speed networks, IEEE JSAC 9, 7, , [GG93] L Gun and R. Guerin, Bandwidth management and congestion contro framework in broadband networks architecture, Computer Network and ISDN Systems, vo. 26 (1), [GGL95] E. Gauthier, S. Giordano, J.-Y. Le Boudec, Reduce Connection Awareness, High-Speed Networking for Mutimedia Appications, W. Effesberg, O. Spanio, A. Danthine, D. Ferrari (eds.), [GLOR97] S. Giordano, J.-Y. Le Boudec, P. Oechsin and S. Robert, VBR over VBR: the homogeneous, oss-free case, INFOCOM 97. [LEB96] J.-Y. Le Boudec, Network Cacus made easy, EPFL TR [MPS95] U. Mocci, P. Perfetti and C. Scogio, VP capacity management in ATM networks for short and ong term traffic variations, COST242 TD(95)59, September [MPS96] U. Mocci, P. Pannunzi and C. Scogio, Adaptive capacity management of Virtua Path networks, IEEE Gobecom 96, London, November [VA97] J. Virtamo and S. Aato, Bocking probabiities in a transient system, COST257 TD(97)14, January

12 Appendix A Resuts of tria 1: VBR-over-VBR vs. VBR-over-CBR Percentage of average free capacity vs. traffic oad (both casses) Percentage of rejected cas vs. traffic oad (cass 1) Percentage of rejected cas vs. traffic oad (cass 2)

13 Appendix B Resuts of tria 2: Varying updating interva Percentage of average free capacity vs. traffic oad (a casses) Percentage of rejected cas vs. traffic oad (cass 1) Percentage of rejected cas vs. traffic oad (cass 2)

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas August 15, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate reserves

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Income Protection Options

Income Protection Options Income Protection Options Poicy Conditions Introduction These poicy conditions are written confirmation of your contract with Aviva Life & Pensions UK Limited. It is important that you read them carefuy

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

GWPD 4 Measuring water levels by use of an electric tape

GWPD 4 Measuring water levels by use of an electric tape GWPD 4 Measuring water eves by use of an eectric tape VERSION: 2010.1 PURPOSE: To measure the depth to the water surface beow and-surface datum using the eectric tape method. Materias and Instruments 1.

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey by Linda Drazga Maxfied and Virginia P. Rena* Using data from the New Beneficiary Survey, this artice examines

More information

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market Structura Deveopments and Innovations in the Asset- Backed Commercia Paper arket ark H. Adeson anaging Director, Asset-Backed Commercia Paper oody s Investors Service Strategic Research Institute 1997

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

Advance PLM Software Solutions for Complex Business Processes

Advance PLM Software Solutions for Complex Business Processes Advance PLM Software Soutions for Compex Business Processes Abstract As customers word-wide camour for more technoogicay rich products, be it a car, or a smartphone, manufacturers are having to contend

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

FUNDING FOR RETAINED WORKERS COMPENSATION EXPOSURES. Brian Z. Brown Michael D. Price

FUNDING FOR RETAINED WORKERS COMPENSATION EXPOSURES. Brian Z. Brown Michael D. Price FUNDING FOR RETAINED WORKERS COMPENSATION EXPOSURES Brian Z. Brown Michae D. Price Funding for Retained Workers Compensation Exposures ABSTRACT by Brian Z. Brown and Michae D, Price The sef-insured workers

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

Application and Desktop Virtualization

Application and Desktop Virtualization Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

Industry guidance document Checkout workstations in retail - safe design and work practices

Industry guidance document Checkout workstations in retail - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices WorkSafe Contents Foreword...

More information

Discounted Cash Flow Analysis (aka Engineering Economy)

Discounted Cash Flow Analysis (aka Engineering Economy) Discounted Cash Fow Anaysis (aka Engineering Economy) Objective: To provide economic comparison of benefits and costs that occur over time Assumptions: Future benefits and costs can be predicted A Benefits,

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

European Journal of Operational Research

European Journal of Operational Research European Journa of Operationa Research 198 (2009) 435 446 Contents ists avaiabe at ScienceDirect European Journa of Operationa Research journa homepage: www.esevier.com/ocate/ejor Production, Manufacturing

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,

More information

Chapter 3: Investing: Your Options, Your Risks, Your Rewards

Chapter 3: Investing: Your Options, Your Risks, Your Rewards Chapter 3: Investing: Your Options, Your Risks, Your Rewards Page 1 of 10 Chapter 3: Investing: Your Options, Your Risks, Your Rewards In This Chapter What is inside a mutua fund? What is a stock? What

More information

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04 STICHTING VAN DE ARBEID REVISION VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS June 2004 - pubication no. 8A/04 Vaue transfer of pension rights in the Netherands 1. Introduction The opportunity to

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Assessing Network Vulnerability Under Probabilistic Region Failure Model

Assessing Network Vulnerability Under Probabilistic Region Failure Model 2011 IEEE 12th Internationa Conference on High Performance Switching and Routing Assessing Networ Vunerabiity Under Probabiistic Region Faiure Mode Xiaoiang Wang, Xiaohong Jiang and Achie Pattavina State

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

SABRe B2.1: Design & Development. Supplier Briefing Pack.

SABRe B2.1: Design & Development. Supplier Briefing Pack. SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used

More information

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions Mean-fied Dynamics of Load-Baancing Networks with Genera Service Distributions Reza Aghajani 1, Xingjie Li 2, and Kavita Ramanan 1 1 Division of Appied Mathematics, Brown University, Providence, RI, USA.

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

On Capacity Scaling in Arbitrary Wireless Networks

On Capacity Scaling in Arbitrary Wireless Networks On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Estimation of Liabilities Due to Inactive Hazardous Waste Sites. by Raja Bhagavatula, Brian Brown, and Kevin Murphy

Estimation of Liabilities Due to Inactive Hazardous Waste Sites. by Raja Bhagavatula, Brian Brown, and Kevin Murphy Estimation of Liabiities Due to Inactive Hazardous Waste Sites by Raja Bhagavatua, Brian Brown, and Kevin Murphy ESTIMATION OF LIABILITIES DUE TO INACTIVE HAZARDOUS WASTE SITJZS Abstract: The potentia

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

GreenTE: Power-Aware Traffic Engineering

GreenTE: Power-Aware Traffic Engineering GreenTE: Power-Aware Traffic Engineering Mingui Zhang zmg6@mais.tsinghua.edu.cn Cheng Yi yic@emai.arizona.edu Bin Liu iub@tsinghua.edu.cn Beichuan Zhang bzhang@arizona.edu Abstract Current network infrastructures

More information

Passive Fire Protection

Passive Fire Protection Acceptance Criteria for Damaged and Repaired Passive Fire Protection Diane Kerr 1,*, Deborah Wioughby 1, Simon Thurbeck 2 and Stephen Connoy 3 1 Heath and Safety Laboratory, Process Safety Section, UK

More information

The Web Insider... The Best Tool for Building a Web Site *

The Web Insider... The Best Tool for Building a Web Site * The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

Pricing and hedging of variable annuities

Pricing and hedging of variable annuities Cutting Edge Pricing and hedging of variabe annuities Variabe annuity products are unit-inked investments with some form of guarantee, traditionay sod by insurers or banks into the retirement and investment

More information

Chapter 3: Authentication and Resource Protection in Windows 2000

Chapter 3: Authentication and Resource Protection in Windows 2000 Chapter 3: Authentication and Resource Protection in Windows 2000 Page 1 of 23 Chapter 3: Authentication and Resource Protection in Windows 2000 Because this is a user administration book, not a security

More information

Recent Trends in Workers Compensation Coverage by Brian Z. Brown, FCAS Melodee J. Saunders, ACAS

Recent Trends in Workers Compensation Coverage by Brian Z. Brown, FCAS Melodee J. Saunders, ACAS Recent Trends in Workers Compensation Coverage by Brian Z. Brown, FCAS Meodee J. Saunders, ACAS TITLE: RECENT TRENDS IN WORKERS COMPENSATION COVERAGE BY: Ms. Meodee J. Saunders, A.C.A.S., M.A.A.A. Mr.

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 TREATMENT TMENT OF GOODWILL IN ACCOUNTING Mohammad Taha GOODWILL is usuay ony recorded in an accounting system when a company purchases an unincorporated

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

Insertion and deletion correcting DNA barcodes based on watermarks

Insertion and deletion correcting DNA barcodes based on watermarks Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen

More information

Uncertain Bequest Needs and Long-Term Insurance Contracts 1

Uncertain Bequest Needs and Long-Term Insurance Contracts 1 Uncertain Bequest Needs and Long-Term Insurance Contracts 1 Wenan Fei (Hartford Life Insurance) Caude Fuet (Université du Québec à Montréa and CIRPEE) Harris Schesinger (University of Aabama) Apri 22,

More information

The Domain Name System (DNS)

The Domain Name System (DNS) D 1 The Domain Name System (D) Prof. Jean-Yves Le Boudec Prof. ndrzej Duda IC, EPFL CH-1015 Ecubens http://cawww.epf.ch o o Domain Name System: D Objective of D support user friendy naming of resources:

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information