On Buffer Limited Congestion Window Dynamics and Packet Loss

Size: px
Start display at page:

Download "On Buffer Limited Congestion Window Dynamics and Packet Loss"

Transcription

1 On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result of this paper is an analytic formula describing the packet loss probability in a buffer as a function of the length of the buffer and the probability of external packet loss. This formula makes it possible to calculate the total loss along a multi-buffer, multi-link route. Also, ne types of congestion indo distributions are discovered hen the packet loss in the buffer is large. These are different from the usual Gaussian type single humped distributions and can help to develop a qualitative classification of indo distributions. TCP B Buffer 3 Link delay, D Packet size, P Loss rate, p Bandidth, C Sink Fig.. The finite buffer model. In numerical s packet size P = 5 byte and bandidth C = 56 kb/s has been used. I. INTRODUCTION Recently, a lot of study has been carried out to clarify the dynamics of TCP congestion control mechanism. The congestion indo distribution of idealized TCP has been investigated ith constant packet loss in [] and ith variable packet loss in []. Average indo size and throughput have been calculated in [3 5]. A stochastic Ito calculus has been developed in [6]. These studies considered persistent file transfers. In [7] short file transfers and the effect of slo start mechanism has been taken into account. The role of the exponential backoff mechanism in pseudo self-similar traffic has been analyzed in [8 ]. In [, ] the authors investigated a model here parallel TCP flos shared a common buffer. They supposed that the investigated common buffer as not a bottleneck buffer. The other extreme case, a severely loaded bottleneck buffer as investigated in []. While these models describe the dynamics of TCP in the presence of external packet loss quite accurately, little or no progress has been made to understand the detailed mechanism of packet loss in IP netorks. Packet loss in current netorks is generated by overloaded buffers predominantly. This is an inherent property of TCP congestion control mechanism since TCP increases its packet sending rate until packet loss occurs in one of the buffers along the route beteen the source and the destination. In this paper e take the first step to give a detailed mathematical description of the packet loss mechanism. We investigate the dynamics of TCP in the presence of a finite buffer and e derive analytic formulas for the packet loss and the congestion indo distribution. The ne formulas and distributions are validated by direct. II. THE FINITE BUFFER MODEL In this section e introduce a model for finite buffers. In our idealized model (Fig. ) one TCP injects packets into a buffer of size B [5, 6, ]. The remaining part of the netork is modeled by a fixed delay D, constant bandidth or link capacity C and random loss probability of p per packet. This probability represents the chance of link and hardare failures [3], incorrect handling of arriving packets by routers, losses and time variations due to ireless links in the path of the connection [3], and the likelihood of congestion in the buffers other than the modeled one. The buffer is large enough such that the TCPs can operate in congestion avoidance mode, but it is finite, so that packet loss can occur in it. According to the model to practically important cases ill be investigated in this paper: ) Local Area Netork (LAN) traffic, hen the bandidth delay product DC is small, only a fe packets can be out in the link and the buffer is never empty. ) Wide Area Netork (WAN) traffic, hen the bandidth delay product is large, packets are in the link and the buffer is mostly empty. From no on e ill refer to systems ith small and large bandidth delay products as LAN and WAN respectively. III. DYNAMICS OF A SINGLE TCP IN LOCAL AREA NETWORKS In this section e present an analysis of a typical LAN scenario ith a single TCP here the link delay is small and packet delay is caused mostly by buffering. The congestion indo counts the number of unacknoledged packets, and these packets can be found on the link and in the buffer. First e suppose that the link delay D is zero, and e discuss the effect of nonzero link delay later. At each packet-shift-time unit a packet is shifted from the buffer onto the link. The round trip time of a freshly sent packet ill be the time it should ait for the shifting of all previously sent packets in the system, hich is in turn measured by the congestion indo τ RTT =. Applying this equation, the congestion indo is governed by the differential equation d dτ =, () here [, B]. This equation can be solved and e obtain the time development of the congestion indo beteen losses: i (τ) = i () + τ, i [, B], ()

2 here i () is the congestion indo value after the i th packet loss event. Since one packet is shifted out from the buffer onto the link in each time unit, and each packet might get lost ith the same probability p, in our continuous fluid model the inter-loss time intervals (τ i ) are independent, exponentially distributed random variables ith mean /p and probability distribution p(τ i ) = p exp( pτ i ), i Æ. (3) Note the folloing important property of this distribution: Suppose that a certain length of time has been elapsed since a packet loss. Then the probability distribution of the time interval remaining until the next packet loss is still given by (3) regardless of the elapsed time. We no derive the formula hich connects consecutive indo values before losses. Let s denote by bli the indo value immediately before the i th loss event and by i( bli ) the distribution of bli. If the value of the random variable τ i is small enough, the next bli+ can be obtained from (). Hoever, if τ i is so large that the indo ould gro above the buffer size then packets ill be dropped at the buffer, and the indo ill be set to B. Accordingly, a mapping can be given hich connects the consecutive bli values: f τi ( bli ) = bli /4 + τ i if τ i < B bli /4, B if τ i B bli /4. Such a ay, the time elapsed until the next packet loss might be smaller than τ i if τ i is too large. Due to the property of the distribution (3) noted above, at the succeeding application of (4) the next τ i+ time interval can be dran from distribution (3) again. The next indo distribution i+ ( bli+ ) can no be calculated by the Perron Frobenius operator, L, of the mapping: i+ ( bli+ ) = L i( bli ) = (5) = B δ ( bli+ f τi ( bli ) ) i( bli )p(τ i )dτ i d bli here δ() is the Dirac-delta distribution and e averaged over the distribution (3). The integration in τ i can be carried out. The stationary distribution ( bl ) is the fix point of (5). The stationary distribution ( bl ) can be ritten in the form (4) ( bl ) = A(p, B)δ( bl B) + f( bl ), (6) here f : Ê Ê continuous regular function and A(p, B) is a constant. For all n Æ e define the folloing functions: f n : ] B/ n+, B/ n] Ê; f(), (7) The pieceise solution of (5) on the disjoint intervals can be ritten in the form n f n ( bl ) = Ck n (p, B)p ble p bl 4k /. (8) k= Substituting (6), (7) and (8) into (5), recursive formulas for the constants Ck n(p, B) can be derived. The initial term C (p, B) of the iteration can be expressed by A(p, B) hich can be calculated [4] self-consistently from (5). With the folloing abbreviations: c L = k=, F(x) = e x/8 e x/ and 4 k G(x) = k= F ( x/4 k) k i= 4 e obtain i A ( pb ) = c L c L F ( pb ) G( pb ). (9) The numerical value of c L is approximately.454. Note that in this equation the parameters appear only ( in the pb combination. Consequently the constant C ) k n pb also depends on the pb product only, not separately on p or B. The pb expression is the control parameter in our model. Systems in hich external packet losses and buffer sizes differ, but the pb product is the same, are similar in the sense that they can be described ith the same constants Ck n. A. The Interpretation of A ( pb ) and the Effective Loss No e present a brief explanation of the meaning of A ( pb ). If e calculate the average time elapsed beteen to packet-loss events, e obtain τ = A( pb ) p () The meaning of this simple expression becomes clearer if e recognize that / τ is the probability of packet loss per unit time p : p = τ = p A(pB ). () This equation can also be ritten as p = ( A ( pb )) p and A ( pb ) can be interpreted as the ratio of the number of packets hich lost on the link and the total amount of lost packets. Similarly, A ( pb ) is the ratio of the number of packets hich are lost in the buffer to the total number of packet losses. The possibility that this ratio can be estimated from our model is the main result of this section. This interpretation and the exact knoledge of the form of A ( pb ) allos us to treat buffer-losses as if they ere link-losses. It also makes possible to calculate the total loss along a multi-buffer, multi-link route. According to () the measured p/p expression should be equal to A ( pb ) and it should not depend on p and B separately, only on the pb product. In order to verify () e implemented our model in Netork Simulator v..b7a (ns) [5] and carried out a number of s ith different B and p parameter values in the pb parameter range. The link capacity, link delay and packet size ere fixed in the study of LAN and only buffer size B and loss probability p ere varied. During the comparison of the s and the formulas e have to take into account that in reality the system can store more packets than the actual buffer size. For example the receiver is processing one packet, and one acknoledgment packet is traversing back to the sender during the file transfer increasing the maximum number of unacknoledged packets in the system by to. In other ords, the TCP behaves as if the buffer ould be bigger than it really is.

3 p/p A ( p(b + b) ) B = 3 B = 4 B = 5 B = 6 B = p(b + b) Fig.. Comparison of the theoretical function A p(b + b) and the p/p expression obtained from numerical s (a) pb =. In order to treat this problem e assumed that e have to set the congestion indo limit to B + b and e must replace B ith B + b on our expressions: p/p = A ( p(b + b) ). () Number of s ere carried out for different buffer sizes B, and the unknon parameter b as fitted ith the help of (). It as found that b is constant and practically independent of B. The parameter b as set to the average of the estimated values obtained from s, b = Simulation results are shon in Fig., here e compared the theoretical A ( p(b + b) ) and the measured p/p. We got an almost perfect match. At the end of this subsection e sho the estimated effective loss p in the pb limit. This is the extreme bottleneck buffer case, hen packets get lost only in the buffer. It is easy to verify that p = 8 3B holds in the pb limit. This formula has been calculated in [6] for the same bottleneck scenario. This is a further indication that our calculation is correct. Since e obtained the above expression as a limit of our model, our ork can be vieed as a generalization of previous studies. So far e presented the analytic form of the distribution of before-loss values of the congestion indo. In practice the distribution of the congestion indo at an arbitrary moment is relevant. We calculated this distribution, and e obtained = f() A(pB ), (3) It can be seen that the final distribution is proportional to the regular part of the before-loss distribution, and there is no Dirac-delta distribution in (3). To verify our results e carried out s by ns. During the s at least, loss events ere recorded to obtain statistically reliable results. We varied the pb control parameter through the pb range and the buffer size B beteen 3 and 7. The actual buffer size has been shifted to B + b in accordance ith Subsection III-A. For demonstration e compare the results and our model in Fig. 3 at pb =. and 4. parameter values and at B = 7 buffer size (b) pb = 4. Fig. 3. Comparison of results and theoretical model at buffer size B = 7. i(), i N denote pieces of the congestion indo distribution i() = f i ()/ A pb. For the interpretation of the results e have consider to minor effects: ) after a packet loss TCP does not increase its cnd instantly, but keeps it at a constant value for a small amount of time generating small plateaus in the time evolution of cnd. We supposed in the calculations that TCP increases its indo immediately. So, these plateaus ere filtered out during the preparation of the histograms in Fig. 3. ) TCP does not simply take the half of the congestion indo, but it also takes its integer part. This and the discrepancy beteen the fluid and the discrete model makes it necessary to shift the histogram to the right along the -axis by units. Keeping in mind the above empirical corrections, e obtain very impressive agreement beteen the s and the analytical calculations. B. Discussion of the Model Traditionally it is assumed that the congestion indo distributions in systems ith random packet loss are single humped Gaussian like functions []. Hoever this is not the case in general in systems here finite buffers dominate the in-

4 do evolution. No e are in the position to investigate the qualitatively different types of congestion indo distributions. The distribution is non-zero only on the [, B] interval, and e can classify the histograms according to the monotonity of the last segment of the pieceise distribution, = f ()/ ( A ( pb )). It can be shon that the folloing three situations are possible: pb : the last segment is monotonously increasing in this parameter range (see Fig. 3(a)). The total packet loss is dominated by the buffer in this range. < pb < 4 : the maximum of the last segment is beteen B/ and B The buffer and external losses are comparable in this case. 4 pb < + : the last segment is monotonously decreasing in this case. In this parameter range the buffer plays a limited role. The congestion indo is mostly limited by the external loss(see Fig. 3(b)). We have assumed in the previous analysis that the link delay is zero. We can easily extend the validity of the results for situations here the link delay is non-zero. In this case in addition to the buffer, N l = CD/P number of packets and acknoledgments can be found on the link here C, D and P are the link capacity, the link delay and the packet size respectively. The congestion indo limit in this situation must be set to the total number of packets B + N l in the system and the link can be treated as a part of the buffer. IV. DYNAMICS OF A SINGLE TCP IN WIDE AREA NETWORKS In this section e present the analysis of an idealized WAN scenario here buffering delay is small compared to the link delay. In an ideal WAN scenario the buffer size ould be zero. Hoever, in ns simulator the buffer must be set to a small finite number B, otherise the packets cannot pass over the buffer in the simulator. In WAN situation the round-trip time of a freshly injected packet is approximately constant, τ RTT N l, if e neglect the buffering delay, and the development of the congestion indo can be given by bli (τ i ) = bli () + N l τ i. bli [, B + N l ], (4) here /λ is the average time beteen external losses. The Perron Frobenius equation (5) can be solved, and the stationary distribution ( bl ) can be ritten in the form (6) again. No the pieceise components of the regular part of the stationary distribution, f n : ] (B + N l )/ n+, (B + N l )/ n] Ê; bl f( bl ), can be given by f n ( bl ) = n Ck n (λn l(b + N l ))λn l e λn l bl k. (6) k= With the ne definitions of c W = k=, F(X) = k e X/ e X and G(X) = k= F(X/k ) k i= get A(X) = i e c W c W F( X) G( X), (7) here X = λn l (B + N l ), and the numerical value of c W is approximately With the help of A(λN l (B + N l )) the coefficients C n k (λn l(b + N l )) can be calculated recursively. The average time elapsed beteen to consecutive packet losses can be calculated similarly to (). The probability of packet loss per unit time λ can be expressed by the inverse of this average: λ = τ = λ A(λN l (B + N l )). (8) According to (8) the measured λ/λ should be equal to A(λN l (B + N l )). While both λ and λ are loss probabilities per unit time, their ratio is simply the ratio of the external and the total packet loss: p/p = λ/λ. The value of λ appearing in A(λN l (B + N l )) is the number of the packets lost on the link divided by the time TCP actively transferred packets. This time is the total time minus the inactive periods (plateaus in cnd) after packet losses discussed at the end of Section III- A. Simulation results are shon in Fig 4, here e compared the theoretical A(λN l (B + N l )) and the measured p/p. The measured data point fit A(λN l (B + N l )) almost perfectly. In s the link capacity, packet size and buffer size ere fixed, and only the link delay D and the external packet loss probability p ere altered. The corresponding mapping, hich connects the consecutive bli values and analogous to (4), can be given by.8 A(λN l(b + N l)) B + N l = 63 f τi ( bli ) = { bli + τi τ RTT B + N l if τ i < τ RTT (B + N l bli ), if τ i τ RTT (B + N l bli ). The difficulty of the WAN scenario is that the distribution of times beteen packet losses cannot be given by a simple formula like (3) exactly. There are periods, hen there is no queue in the buffer, and packets cannot get lost. In order to handle the model analytically, e assumed that the distribution of times beteen consecutive losses can be approximated ith an effective exponential distribution p(τ i ) = λe λτi, (5) p/p λn l (B + N l ) Fig. 4. Comparison of the theoretical function A(λN l (B + N l )) and the p/p expression obtained from numerical s.

5 Finally, the distribution of the congestion indo at an arbitrary moment as calculated, and as the result of the calculations e get = f() A(λN l (B + N l )) (9) similarly to the LAN case. As a demonstration of formula (9) e carried out WAN s here maximum N l = 6 TCP and acknoledgment packets could be on the link simultaneously and the buffer size as set to B = 3. The parameter λ has been determined as the ratio of the external losses and the active TCP time. The external loss rate as varied in the pn l (B + N l ) range, all other parameters ere fixed. The theoretical distributions and histograms obtained from ns s can be seen in Fig. 5. Our model gives a qualitatively correct description of the WAN situation (a) λn l (B + N l ) = (b) λn l (B + N l ) = 3.4 Fig. 5. Comparison of results and theoretical model. The link could carry maximal N l = 6 number of TCP and ACK packets. i(), i N denote pieces of the congestion indo distribution i() = f i ()/ ( A(λN l (B + N l ))). V. CONCLUSIONS In this paper e investigated the TCP congestion avoidance algorithm in netorks here the finite buffer size limits the maximal achievable congestion indo size. This ork is the first attempt to treat mathematically the buffer-limited behavior of TCP. The stationary probability distribution of the congestion indo process as presented in LAN and WAN situations. The calculations ere validated by computer s and it as shoed that our analysis agrees ith the s properly. The most important development accomplished by this study is that the total loss felt by the TCP, including the buffer and the external packet loss, can be predicted from the netork parameters. The presented analytical expression, A(x), can be computed numerically ithout difficulty and the total loss can be calculated by a simple formula. It as also shon that A(x) and the coefficients that appear in the probability distributions depend only on a certain combination of the parameters. This combination is the control parameter in our model. Netorks ith the same control parameter are equivalent in the sense that the same portion of the total packet loss occur at the buffer, and the coefficients are the same in the distribution function. We hope that this model can be used as the base element of a more complex netork and it can be extended to more complicated systems. REFERENCES [] T. J. Ott, J. H. B. Kemperman, and M. Mathis, The stationary behavior of ideal TCP congestion avoidance, in Proceedings of IEEE INFOCOM 99, Ne York, 999. [] Archan Misra and Teunis Ott, The indo distribution of idealized TCP congestion avoidance ith variable packet loss, in INFOCOM 99, March 999. [3] T. V. Lakshman and Upamanyu Madho, The performance of TCP/IP for netorks ith high bandidth-delay products and random loss, IEEE/ACM Transactions on Netorking, June 997. [4] Eitan Altman, Konstantin Avrachenkov, and Chadi Barakat, Stochastic model of TCP/IP ith stationary random losses, in ACM SIGCOMM,. [5] Patric Bron, Resource sharing of TCP connections ith different round trip times, in INFOCOM,. [6] V. Misra, W. Gong, and D. Tosley, Stochastic differential equation modeling and analysis of TCP indosize behavior, in Proc. Performance 99, Istambul, Turkey, october 999. [7] N. Cardell, S. Savage, and T. Anderson, Modeling TCP latency, in IEEE Infocom, Tel-Aviv, Israel, March. [8] L. Guo, M. Crovella, and I. Matta, TCP congestion control and heavy tails, Tech. Rep. BUCS-TR--7, Computer Science Dep., Boston University,. [9] D. R. Figueiredo, B. Liu, V. Mishra, and D. Tosley, On the autocorrelation structure of TCP traffic, Tech. Rep. -55, Dep. of Computer Science, University of Massachusetts, Amherst, November. [] A. Fekete and G. Vattay, Self-similarity in bottleneck buffers, in Globecom, November. [] A. Misra, T. Ott, and J. Baras, The indo distribution of multiple TCPs ith random queues, in IEEE GLOBECOM, December 999. [] A. Fekete, G. Vattay, and A. Veres, Improving the / p la for single and parallel TCP flos, in 7th International Teletraffic Congress, December. [3] J. Bolot, End-to-end packet delay and loss behavior in the Internet, in ACM SIGCOMM, 993. [4] A. Fekete and G. Vattay, On buffer limited congestion indo dynamics and packet loss, Tech. Rep., Communication Netorks Laboratory,, [5] Ucb/lbnl/vint netork simulator ns (version ), [6] M. Mathis, J. Semke, J. Mahdavi, and T. Ott, The macroscopic behavior of the TCP congestion aviodance algorithm, Computer Communications Revie, vol. 7, pp. 3, July 997.

A Stochastic Model for TCP with Stationary Random Losses

A Stochastic Model for TCP with Stationary Random Losses A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline

More information

Using Partial Differential Equations to Model TCP Mice and Elephants in Large IP Networks

Using Partial Differential Equations to Model TCP Mice and Elephants in Large IP Networks Using Partial Differential Equations to Model TCP Mice and Elephants in Large IP Netorks M.Ajmone Marsan, M.Garetto, P.Giaccone, E.Leonardi, E.Schiattarella, A.Tarello Dipartimento di Elettronica, Politecnico

More information

TCP modeling in the presence of nonlinear window growth

TCP modeling in the presence of nonlinear window growth TCP modeling in the presence of nonlinear window growth Eitan Altman, Kostia Avrachenkov, Chadi Barakat Rudesindo Núñez-Queija Abstract We develop a model for TCP that accounts for both sublinearity and

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

Markovian Model of Internetworking Flow Control

Markovian Model of Internetworking Flow Control Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University

More information

THE prediction of network behavior is an important task for

THE prediction of network behavior is an important task for TCP Networ Calculus: The case of large delay-bandwidth product Eitan Altman, Konstantin Avrachenov, Chadi Baraat Abstract We present in this paper an analytical model for the calculation of networ load

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan

More information

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

A Mathematical Model of the Skype VoIP Congestion Control Algorithm A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision

More information

AIMD, Fairness and Fractal Scaling of TCP Traffic

AIMD, Fairness and Fractal Scaling of TCP Traffic AIMD, Fairness and Fractal Scaling of TCP Traffic Francois Baccelli & Dohy Hong INRIA-ENS, ENS, 45 rue d Ulm 755 Paris, France, Francois.Baccelli, Dohy.Hong@ens.fr Abstract We propose a natural and simple

More information

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv:191.4654v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science,

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

COS 424: Interacting with Data. Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007

COS 424: Interacting with Data. Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007 COS 424: Interacting ith Data Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007 Recapitulation of Last Lecture In linear regression, e need to avoid adding too much richness to the

More information

Mice and Elephants Visualization of Internet

Mice and Elephants Visualization of Internet Mice and Elephants Visualization of Internet Traffic J. S. Marron, Felix Hernandez-Campos 2 and F. D. Smith 2 School of Operations Research and Industrial Engineering, Cornell University, Ithaca, NY, 4853,

More information

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

TCP-friendly SIMD Congestion Control and Its Convergence Behavior Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University

More information

TCP throughput and timeout steady state and time-varying dynamics

TCP throughput and timeout steady state and time-varying dynamics TCP throughput an timeout steay state an time-varying ynamics Stephan Bohacek an Khushboo Shah Dept. of Electrical an Computer Engineering Dept. of Electrical Engineering University of Delaare University

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Tsuyoshi Ito and Mary Inaba Department of Computer Science, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Network Traffic Characteristic

Network Traffic Characteristic Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW

More information

A flow-based model for Internet backbone traffic

A flow-based model for Internet backbone traffic A flow-based model for Internet backbone traffic Chadi Barakat, Patrick Thiran Gianluca Iannaccone, Christophe iot Philippe Owezarski ICA - SC - EPFL Sprint Labs LAAS-CNRS {Chadi.Barakat,Patrick.Thiran}@epfl.ch

More information

On Tandem Blocking Queues with a Common Retrial Queue

On Tandem Blocking Queues with a Common Retrial Queue On Tandem Blocking Queues with a Common Retrial Queue K. Avrachenkov U. Yechiali Abstract We consider systems of tandem blocking queues having a common retrial queue. The model represents dynamics of short

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

Analysis of TCP Westwood+ in high speed networks

Analysis of TCP Westwood+ in high speed networks Analysis of TCP Westwood+ in high speed networks 1 E. Altman, C. Barakat, S. Mascolo, N. Möller and J. Sun Abstract TCP Westwood+ is modelled and analyzed using stochastic recursive equations. It is shown

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

A Stochastic Model of TCP/IP with Stationary Random Losses

A Stochastic Model of TCP/IP with Stationary Random Losses 1 A Stochastic Model of TCP/IP with Stationary Random Losses Eitan Altman, Konstantin Avrachenkov, Chadi Barakat INRIA, 24 route des Lucioles, 692 Sophia Antipolis, France Email:{altman,kavratch,cbarakat}@sophiainriafr

More information

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,

More information

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,

More information

A turbulence closure based on the maximum entropy method

A turbulence closure based on the maximum entropy method Advances in Fluid Mechanics IX 547 A turbulence closure based on the maximum entropy method R. W. Derksen Department of Mechanical and Manufacturing Engineering University of Manitoba Winnipeg Canada Abstract

More information

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Modelling multi-path problems

Modelling multi-path problems 1 Modelling multi-path problems Richard Gibbens Computer Laboratory, University of Cambridge 2nd Annual Conference on Information Sciences and Systems Princeton University 19 21 March 2 2 Multi-path flow

More information

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes

Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes Yury Audzevich, Levente Bodrog 2, Yoram Ofek, and Miklós Telek 2 Department of Information Engineering and Computer Science, University

More information

Endogeny for the Logistic Recursive Distributional Equation

Endogeny for the Logistic Recursive Distributional Equation Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, 237 25 DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional

More information

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic

More information

Models and Techniques for Network Tomography

Models and Techniques for Network Tomography Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

Pareto-Improving Congestion Pricing on General Transportation Networks

Pareto-Improving Congestion Pricing on General Transportation Networks Transportation Seminar at University of South Florida, 02/06/2009 Pareto-Improving Congestion Pricing on General Transportation Netorks Yafeng Yin Transportation Research Center Department of Civil and

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Modeling and Stability of PERT

Modeling and Stability of PERT Modeling Stability of PET Yueping Zhang yueping@cs.tamu.edu I. SYSTEM MODEL Our modeling of PET is composed of three parts: window adjustment ED emulation queuing behavior. We start with the window dynamics.

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

jwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false

jwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false jwperiod. font=smalllabelsep=jwperiodjustification=justifiedsinglelinecheck=false 1 EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. : 2?? Published online in Wiley InterScience www.interscience.wiley.com

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

Nonlinear Instabilities in TCP-RED

Nonlinear Instabilities in TCP-RED Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H. Abed and Richard J. La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network

More information

IN today s high speed telecommunication networks, a large

IN today s high speed telecommunication networks, a large State-dependent M/G/ type queueing analysis for congestion control in data networks Eitan Altman, Kostya Avrachenkov, Chadi Barakat, Rudesindo Núñez-Queija Abstract We study in this paper a TCP-like linear-increase

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

Continuous-time hidden Markov models for network performance evaluation

Continuous-time hidden Markov models for network performance evaluation Performance Evaluation 49 (2002) 129 146 Continuous-time hidden Markov models for network performance evaluation Wei Wei, Bing Wang, Don Towsley Department of Computer Science, University of Massachusetts,

More information

be a deterministic function that satisfies x( t) dt. Then its Fourier

be a deterministic function that satisfies x( t) dt. Then its Fourier Lecture Fourier ransforms and Applications Definition Let ( t) ; t (, ) be a deterministic function that satisfies ( t) dt hen its Fourier it ransform is defined as X ( ) ( t) e dt ( )( ) heorem he inverse

More information

Utility Analysis of Simple FEC Schemes for VoIP

Utility Analysis of Simple FEC Schemes for VoIP Utility Analysis of Simple FEC Schemes for VoIP Parijat Dube and Eitan Altman,2 INRIA, BP93, 692 Sophia-Antipolis, France{pdube,altman}@sophiainriafr 2 CESIMO, Facultad de Ingeneria, Universidad de Los

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Artificial Neural Networks. Part 2

Artificial Neural Networks. Part 2 Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological

More information

IN THIS PAPER, we describe a design oriented modelling

IN THIS PAPER, we describe a design oriented modelling 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

MMSE Equalizer Design

MMSE Equalizer Design MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Extended Analysis of Binary Adjustment Algorithms

Extended Analysis of Binary Adjustment Algorithms 1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX

More information

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networs Xiang Yu, Yang Chen and Chunming Qiao Department of Computer Science and Engineering State University of New Yor

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm

Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm Symbolic Dynamical odel of Average Queue Size of Rom Early Detection Algorithm Charlotte Yuk-Fan Ho Telehone: 44 () 788 5555 ext. 4333 Fax: 44 () 788 7997 Email: c.ho@mul.ac.uk School of athematical Sciences

More information

CSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to

CSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to CSC21 - Metric Embeddings Lecture 8: Sparsest Cut and Embedding to Notes taken by Nilesh ansal revised by Hamed Hatami Summary: Sparsest Cut (SC) is an important problem ith various applications, including

More information

Optimal Measurement-based Pricing for an M/M/1 Queue

Optimal Measurement-based Pricing for an M/M/1 Queue Optimal Measurement-based Pricing for an M/M/1 Queue Yezekael Hayel 1 and Bruno Tuffin 1 IRISA-INRIA Rennes, Campus universitaire de Beaulieu 3542 Rennes Cedex - FRANCE {yhayel,btuffin}@irisa.fr tel: (+33)299847134

More information

Exploring regularities and self-similarity in Internet traffic

Exploring regularities and self-similarity in Internet traffic Exploring regularities and self-similarity in Internet traffic FRANCESCO PALMIERI and UGO FIORE Centro Servizi Didattico Scientifico Università degli studi di Napoli Federico II Complesso Universitario

More information

Packet Size

Packet Size Long Range Dependence in vbns ATM Cell Level Trac Ronn Ritke y and Mario Gerla UCLA { Computer Science Department, 405 Hilgard Ave., Los Angeles, CA 90024 ritke@cs.ucla.edu, gerla@cs.ucla.edu Abstract

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Nonlinear Instabilities in TCP-RED

Nonlinear Instabilities in TCP-RED Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H Abed and Richard J La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Analysis of two competing TCP/IP connections

Analysis of two competing TCP/IP connections Performance Evaluation 49 (2002 43 55 Analysis of two competing TCP/IP connections E. Altman a,b,, T. Jiménez b, R. Núñez-Queija c,d a INRIA, 2004 Route des Lucioles, 06902 Sophia Antipolis, France b CESIMO,

More information

On Tandem Blocking Queues with a Common Retrial Queue

On Tandem Blocking Queues with a Common Retrial Queue On Tandem Blocking Queues with a Common Retrial Queue K. Avrachenkov U. Yechiali Abstract We consider systems of tandem blocking queues having a common retrial queue, for which explicit analytic results

More information

Use. of a Computer and Vehicle Loop Detectors To Measure Queues and Delays At Signalized Intersections

Use. of a Computer and Vehicle Loop Detectors To Measure Queues and Delays At Signalized Intersections Use. of a Computer and Vehicle Loop Detectors To Measure Queues and Delays At Signalized ntersections A. CHRSTENSEN, Computing Devices of Canada, Ottaa A computer program has been developed to obtain from

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

M/G/1/MLPS compared to M/G/1/PS

M/G/1/MLPS compared to M/G/1/PS Operations Research Letters 33 (25) 519 524 Operations Research Letters www.elsevier.com/locate/orl M/G/1/MLPS compared to M/G/1/PS Samuli Aalto a,, Urtzi Ayesta b, Eeva Nyberg-Oksanen a,1 a Networking

More information

Preliminaries. Definition: The Euclidean dot product between two vectors is the expression. i=1

Preliminaries. Definition: The Euclidean dot product between two vectors is the expression. i=1 90 8 80 7 70 6 60 0 8/7/ Preliminaries Preliminaries Linear models and the perceptron algorithm Chapters, T x + b < 0 T x + b > 0 Definition: The Euclidean dot product beteen to vectors is the expression

More information

Modelling the Arrival Process for Packet Audio

Modelling the Arrival Process for Packet Audio Modelling the Arrival Process for Packet Audio Ingemar Kaj and Ian Marsh 2 Dept. of Mathematics, Uppsala University, Sweden ikaj@math.uu.se 2 SICS AB, Stockholm, Sweden ianm@sics.se Abstract. Packets in

More information

Scalable Scheduling in Parallel Processors

Scalable Scheduling in Parallel Processors 00 Conference on Information Sciences and Systems, Princeton University, March 0, 00 Scalable Scheduling in Parallel Processors Jui Tsun Hung Hyoung Joong Kim Thomas G Robertai 3 Abstract A study of scalable

More information

Modelling an Isolated Compound TCP Connection

Modelling an Isolated Compound TCP Connection Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Competitive Management of Non-Preemptive Queues with Multiple Values

Competitive Management of Non-Preemptive Queues with Multiple Values Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

3-D FINITE ELEMENT MODELING OF THE REMOTE FIELD EDDY CURRENT EFFECT

3-D FINITE ELEMENT MODELING OF THE REMOTE FIELD EDDY CURRENT EFFECT 3-D FINITE ELEMENT MODELING OF THE REMOTE FIELD EDDY CURRENT EFFECT Y. Sun and H. Lin Department of Automatic Control Nanjing Aeronautical Institute Nanjing 2116 People's Republic of China Y. K. Shin,

More information

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7. Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also

More information

On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks

On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks 2014 IEEE 15th International Conference on High Performance Sitching and Routing (HPSR) On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Netorks Chenyang Zhou, Anisha

More information

Adaptive Noise Cancellation

Adaptive Noise Cancellation Adaptive Noise Cancellation P. Comon and V. Zarzoso January 5, 2010 1 Introduction In numerous application areas, including biomedical engineering, radar, sonar and digital communications, the goal is

More information

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,

More information

1 Effects of Regularization For this problem, you are required to implement everything by yourself and submit code.

1 Effects of Regularization For this problem, you are required to implement everything by yourself and submit code. This set is due pm, January 9 th, via Moodle. You are free to collaborate on all of the problems, subject to the collaboration policy stated in the syllabus. Please include any code ith your submission.

More information

Modèles stochastiques II

Modèles stochastiques II Modèles stochastiques II INFO 154 Gianluca Bontempi Département d Informatique Boulevard de Triomphe - CP 1 http://ulbacbe/di Modéles stochastiques II p1/50 The basics of statistics Statistics starts ith

More information

Definition of a new Parameter for use in Active Structural Acoustic Control

Definition of a new Parameter for use in Active Structural Acoustic Control Definition of a ne Parameter for use in Active Structural Acoustic Control Brigham Young University Abstract-- A ne parameter as recently developed by Jeffery M. Fisher (M.S.) for use in Active Structural

More information

Exact Sampling of TCP Window States

Exact Sampling of TCP Window States UNPUBLISHED MANUSCRIPT 1 Exact Sampling of TCP Window States Ashish Goel University of Southern California Michael Mitzenmacher Harvard University Abstract We demonstrate how to apply Coupling from the

More information

ON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM ALGORITHMS

ON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM ALGORITHMS K Y B E R N E T I K A V O L U M E 4 7 ( 2 0 1 1 ), N U M B E R 6, P A G E S 9 3 0 9 4 3 ON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

A NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC

A NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC Proceedings of IEEE Conference on Local Computer Networks, Tampa, Florida, November 2002 A NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC Houssain Kettani and John A. Gubner

More information

CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION

CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION Jericho L. P. Reyes, Chih-Ying Chen, Keen Li and Roland N. Horne Stanford Geothermal Program,

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity

More information

Homework 6 Solutions

Homework 6 Solutions Homeork 6 Solutions Igor Yanovsky (Math 151B TA) Section 114, Problem 1: For the boundary-value problem y (y ) y + log x, 1 x, y(1) 0, y() log, (1) rite the nonlinear system and formulas for Neton s method

More information