Is Information-Centric Multi-Tree Routing Feasible?
|
|
- Jessie Whitehead
- 5 years ago
- Views:
Transcription
1 Is Information-Centric Multi-Tree Routing Feasible? ICN workshop 2013 Michele Papalini (University of Lugano) joint work with: Antonio Carzaniga (University of Lugano) Koorosh Khazaei (University of Lugano) Alexander L. Wolf (Imperial College London)
2 Traditional Networking Information-Centric Networking
3 Traditional Networking addressing end-points addressing information Information-Centric Networking
4 Traditional Networking How do we address information? How do we obtain information? (Architectural questions) Information-Centric Networking
5 Traditional Networking How do we address information? Tags How do we obtain information? Push/Pull Information-Centric Networking
6 Traditional Networking How do we address information? Tags Scalable Routing How do we get information? Push/Pull (System/Evaluation questions) Information-Centric Networking
7 How do we address information?
8 Solution I: name the data
9 Solution I: name the data flat, not human readable identifiers 1DB76EB8DFD6B0B92A293AADC BDE73CB6 hierarchical, meaningful structured names /ch/usi/inf/papalini/picture.jpg
10 /ch/usi/inf/papalini/picture.jpg
11 /ch/usi/inf/papalini/picture.jpg /nytimes/sport/baseball/mets /cnn/us/sport/baseball/mets
12 /ch/usi/inf/papalini/picture.jpg /nytimes/sport/baseball/mets /cnn/us/sport/baseball/mets /youtube/la dolce vita/hd
13 baseball scores for NY Mets
14 baseball scores for NY Mets la dolce vita in HD with english subtitles
15 Solution II: describe the data
16 Solution II: describe the data with set of tags baseball, new york, mets la dolce vita, HD, en-sub
17 Tags
18 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg
19 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg more aggregation sport, new, football Lugano, sport, activities sport
20 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg more aggregation sport, new, football Lugano, sport, activities sport sport
21
22 How do we obtain information?
23 PULL
24 PULL producer consumer
25 PULL producer register(descriptors) forwarding tables consumer
26 PULL producer register(descriptors) forwarding tables consumer interest: content-descriptor
27 PULL producer register(descriptors) data:content forwarding tables consumer interest: content-descriptor
28 PUSH
29 PUSH producer consumer
30 PUSH producer forwarding tables consumer subscribe(descriptors)
31 PUSH producer notification:descriptor forwarding tables consumer subscribe(descriptors)
32 PU LL SH
33 PU LL SH Node A Node B
34 PU LL SH Node A register(descriptors) forwarding tables Node B
35 PU LL SH Node A register(descriptors) forwarding tables Node B message: content-descriptor +data request: content-descriptor
36 PU LL SH Node A register(descriptors) reply:data forwarding tables Node B message: content-descriptor +data request: content-descriptor
37 Node A register(descriptors) reply:data forwarding tables PU LL SH Node B message: content-descriptor +data request: content-descriptor ICN 2011: Content-Based Publish/Subscribe Networking and Information-Centric Networking
38 Node A forwarding tables PU LL SH Node B register(descriptors) How do we route? message: content-descriptor +data reply:data request: content-descriptor
39 Routing schema based on multiple trees Main contribution
40 Main contribution Routing schema based on multiple trees Scalability analysis Additional cost (hops/state) using multiple trees FIBs size using a realistic workload
41 Routing
42 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
43 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
44 router b: tree T,next-hop w predicate P T,w (FIB) T 1, router c p c b: next-hop p g p h w predicate P w T 1,(FIB) f p f cp j p kc p g p h T 1, e p a fp d p ef p ij p k T 2, c p c ep h p ga p d p e p i T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
45 router b: tree T,next-hop w predicate P T,w (FIB) T 1, router c p c b: next-hop p g p h w predicate P w T 1,(FIB) f p f cp j p kc p g p h T 1, e p a fp d p ef p ij p k T 2, c p c ep h p ga p d p e p i T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
46 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
47 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k Stretched Paths a b c d e f g h i j k
48 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Load k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
49 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Multiple k T 1, etrees p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k
50 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
51 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Memory k T 1, ecomplexity p a p d p e p i Problem T 2, c p c p hg p gh T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
52 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
53 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
54 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
55 router b: tree,next-hop predicate T,w router b: tree T,next-hop w predicate P T,w (FIB) T 1, c c g (FIB) c p h 1 c p f h p j g T k 1, f p 1 f p a j p d k e T i 1, e p 2 c a p c d p h e p i T g 2, e p 2 a p a d p d e p e f p f i p i j p j k k a b c b d e f g h i j k
56 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k
57 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c c g T,w (FIB) c p h 1 c p f h p j g T k 1, f p 1 f p a j p d k e T i 1, e p 2 c a p c d p h e p i T g 2, e p 2 a p a d p d e p e f p f i p i j p j k k a b c b d e f g h i j k
58 router router b: next-hop b: tree T w,next-hop predicate w predicate P T,w P T,w (FIB) (FIB) c pt c 1, cp h p gc p g p h f (TT 1, f p f ) p f (T 1 p j pp j ) k (T 1 p k ) e (TT 1, e p a ) p a (T 1 p d p d p) e (T p i 1 p e ) (T 1 p i ) (TT 2, c p a ) p c (T 2 p h p d p) g (T 2 p e ) (T 2 p i ) (TT 2, e p f ) p a (T 2 p d p j p) e (T p f2 p i k ) p j p k a b c b d e f g h i j k
59 router router b: next-hop b: tree T w,next-hop predicate w predicate P T,w P T,w (FIB) (FIB) c pt c 1, cp h p gc p g p h f (TT 1, f p f ) p f (T 1 p j pp j ) k (T 1 p k ) e (TT 1, e p a ) p a (T 1 p d p d p) e (T p i 1 p e ) (T 1 p i ) (TT 2, c p a ) p c (T 2 p h p d p) g (T 2 p e ) (T 2 p i ) (TT 2, e p f ) p a (T 2 p d p j p) e (T p f2 p i k ) p j p k a b c b d e f g h i j k
60 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k a b c b d e f g h i j k
61 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k a b c b d e f g h i j k
62 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k coming soon: new data structure a b c b d e f g h i j k
63 Evaluation
64 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet?
65 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate?
66 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate? We need a workload
67 Topology What do we need?
68 What do we need? Topology Distribute users on the nodes
69 What do we need? Topology Distribute users on the nodes Assign applications to users
70 What do we need? Topology Distribute users on the nodes Assign applications to users Create the registrations
71 What do we need? Topology AS-level Internet topology Distribute users on the nodes Assign applications to users Create the registrations
72 What do we need? Topology Distribute users on the nodes assigned to each AS according to the estimated population Assign applications to users Create the registrations
73 What do we need? Topology Distribute users on the nodes Assign applications to users selected according to the real number of users Create the registrations
74 What do we need? Topology Distribute users on the nodes Assign applications to users Create the registrations???
75 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users
76 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users Push content web content and blog posts short messages (tweets)
77 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users Push content web content and blog posts short messages (tweets) Pull content videos
78 Goal: Understand users interests Web Content
79 Web Content Goal: Understand users interests Users Bookmarks (Delicious) bookmarks = subscription
80 Application User Registration Delicious 1M 124M Blogs 60K 180K Video 1K 10K Twitter Graph 41M 1B Twitter Messages 400K 500K
81 Data Amplification
82 Data Amplification Multiple languages replicate the data for the 25 most spoken languages language is chosen according to the popularity
83 Data Amplification Multiple languages replicate the data for the 25 most spoken languages language is chosen according to the popularity Synonyms for each word we define synonyms synonyms are randomly chosen
84 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate?
85 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)
86 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)
87 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)
88 Tree aggregation in FIBs with k = 8, 16, 32, 64, 128 trees Distinct Trees per Interface
89 Tree aggregation in FIBs with k = 8, 16, 32, 64, 128 trees Distinct Trees per Interface
90 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)
91 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)
92 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)
93 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)
94 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB) Aggregation Factor
95 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB) Bloom Filter size = 400 bits
96 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Current Work
97 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Current Work
98 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Update time (average): 6 µsec per descriptor Current Work
99 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Update time (average): 6 µsec per descriptor Matching time Current Work Time (us) Tags
100 Conclusion Routing scheme: tag-based address push-pull communication
101 Conclusion Routing scheme: tag-based address push-pull communication Scalability: AS-topology can be cover with few trees FIB size is reasonable
102 Conclusion Routing scheme: tag-based address push-pull communication Scalability: AS-topology can be cover with few trees FIB size is reasonable Workload
A Quantitative View: Delay, Throughput, Loss
A Quantitative View: Delay, Throughput, Loss Antonio Carzaniga Faculty of Informatics University of Lugano September 27, 2017 Outline Quantitative analysis of data transfer concepts for network applications
More informationOn Content Indexing for Off-Path Caching in Information-Centric Networks
On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich
More informationProbe Placement Problem
Dimitri Papadimitriou (Alcatel-Lucent - Bell Labs) NMRG Meeting IETF 89 London (UK) Mar.2-7, 2014 Outline 1 Introduction 2 Model 3 Preliminary Results 4 Analysis and Conclusion imitri Papadimitriou (Alcatel-Lucent
More informationImpact of traffic mix on caching performance
Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationTelecommunication Services Engineering (TSE) Lab. Chapter IX Presence Applications and Services.
Chapter IX Presence Applications and Services http://users.encs.concordia.ca/~glitho/ Outline 1. Basics 2. Interoperability 3. Presence service in clouds Basics 1 - IETF abstract model 2 - An example of
More information7600 Series Routers Adjacency Allocation Method
7600 Series Routers Adjacency Allocation Method Document ID: 118393 Contributed by Amit Goyal and Ruchir Jain, Cisco TAC Engineers. Nov 06, 2014 Contents Introduction Background Information Adjacency Entry
More informationImpression Store: Compressive Sensing-based Storage for. Big Data Analytics
Impression Store: Compressive Sensing-based Storage for Big Data Analytics Jiaxing Zhang, Ying Yan, Liang Jeff Chen, Minjie Wang, Thomas Moscibroda & Zheng Zhang Microsoft Research The Curse of O(N) in
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationCS6220: DATA MINING TECHNIQUES
CS6220: DATA MINING TECHNIQUES Mining Graph/Network Data Instructor: Yizhou Sun yzsun@ccs.neu.edu November 16, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining Matrix Data Decision
More informationVisualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka
Visualizing Big Data on Maps: Emerging Tools and Techniques Ilir Bejleri, Sanjay Ranka Topics Web GIS Visualization Big Data GIS Performance Maps in Data Visualization Platforms Next: Web GIS Visualization
More informationCS249: ADVANCED DATA MINING
CS249: ADVANCED DATA MINING Graph and Network Instructor: Yizhou Sun yzsun@cs.ucla.edu May 31, 2017 Methods Learnt Classification Clustering Vector Data Text Data Recommender System Decision Tree; Naïve
More informationReal-time Sentiment-Based Anomaly Detection in Twitter Data Streams
Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams Khantil Patel, Orland Hoeber, and Howard J. Hamilton Department of Computer Science University of Regina, Canada patel26k@uregina.ca,
More informationHow to deal with uncertainties and dynamicity?
How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling
More informationOn Allocating Cache Resources to Content Providers
On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource
More informationPart 2: Random Routing and Load Balancing
1 Part 2: Random Routing and Load Balancing Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.uk http://www.cl.cam.ac.uk/~ckc25/teaching Problem: Traffic Routing 2 Suppose you are in charge of transportation. What do
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More informationContent-based Publish/Subscribe using Distributed R-trees
Content-based Publish/Subscribe using Distributed R-trees Silvia Bianchi, Pascal Felber and Maria Gradinariu 2 University of Neuchâtel, Switzerland 2 LIP6, INRIA-Université Paris 6, France Abstract. Publish/subscribe
More informationHow does Google rank webpages?
Linear Algebra Spring 016 How does Google rank webpages? Dept. of Internet and Multimedia Eng. Konkuk University leehw@konkuk.ac.kr 1 Background on search engines Outline HITS algorithm (Jon Kleinberg)
More informationAn Early Traffic Sampling Algorithm
An Early Traffic Sampling Algorithm Hou Ying ( ), Huang Hai, Chen Dan, Wang ShengNan, and Li Peng National Digital Switching System Engineering & Techological R&D center, ZhengZhou, 450002, China ndschy@139.com,
More informationUtility Maximizing Routing to Data Centers
0-0 Utility Maximizing Routing to Data Centers M. Sarwat, J. Shin and S. Kapoor (Presented by J. Shin) Sep 26, 2011 Sep 26, 2011 1 Outline 1. Problem Definition - Data Center Allocation 2. How to construct
More informationCS6220: DATA MINING TECHNIQUES
CS6220: DATA MINING TECHNIQUES Mining Graph/Network Data Instructor: Yizhou Sun yzsun@ccs.neu.edu March 16, 2016 Methods to Learn Classification Clustering Frequent Pattern Mining Matrix Data Decision
More informationUnSAID: Uncertainty and Structure in the Access to Intensional Data
UnSAID: Uncertainty and Structure in the Access to Intensional Data Pierre Senellart 3 July 214, Univ. Rennes 1 Uncertain data is everywhere Numerous sources of uncertain data: Measurement errors Data
More informationEfficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation
Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,
More informationDiscovering Geographical Topics in Twitter
Discovering Geographical Topics in Twitter Liangjie Hong, Lehigh University Amr Ahmed, Yahoo! Research Alexander J. Smola, Yahoo! Research Siva Gurumurthy, Twitter Kostas Tsioutsiouliklis, Twitter Overview
More informationGeneralized DCell Structure for Load-Balanced Data Center Networks
Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee, Jun Li, Xinchao Zhang, Chuanxiong Guo, David Rincón Swarthmore College, Duke University, Fudan University, Shanghai
More informationRouting Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur
Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed
More informationThe Bloom Paradox: When not to Use a Bloom Filter
1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and
More information1/30/2012. Reasoning with uncertainty III
Reasoning with uncertainty III 1 Temporal Models Assumptions 2 Example First-order: From d-separation, X t+1 is conditionally independent of X t-1 given X t No independence of measurements Yt Alternate
More informationMobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL
MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,
More informationECE 669 Parallel Computer Architecture
ECE 669 Parallel Computer Architecture Lecture Interconnection Network Performance Performance Analysis of Interconnection Networks Bandwidth Latency Proportional to diameter Latency with contention Processor
More informationUsing Social Media for Geodemographic Applications
Using Social Media for Geodemographic Applications Muhammad Adnan and Guy Lansley Department of Geography, University College London @gisandtech @GuyLansley Web: http://www.uncertaintyofidentity.com Outline
More informationSOCIAL MEDIA IN THE COMMUNICATIONS CENTRE
SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE Karen Gordon Gordon Strategy www.gordonstrategy.ca v 1 WHAT WE ARE GOING TO TALK ABOUT TODAY T h e s o c i a l m e d i a i n c i d e n t W h a t c a n h a p p
More informationInnovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager
Innovation The Push and Pull at ESRI September 2004 Kevin Daugherty Cadastral/Land Records Industry Solutions Manager The Push and The Pull The Push is the information technology that drives research and
More informationYour World is not Red or Green. Good Practice in Data Display and Dashboard Design
Your World is not Red or Green Good Practice in Data Display and Dashboard Design References Tufte, E. R. (2). The visual display of quantitative information (2nd Ed.). Cheshire, CT: Graphics Press. Few,
More information(P ) Minimize 4x 1 + 6x 2 + 5x 3 s.t. 2x 1 3x 3 3 3x 2 2x 3 6
The exam is three hours long and consists of 4 exercises. The exam is graded on a scale 0-25 points, and the points assigned to each question are indicated in parenthesis within the text. Problem 1 Consider
More informationNetwork Design Problems Notation and Illustrations
B CHAPTER 2 Network Design Problems Notation and Illustrations In Chapter 1, we have presented basic ideas about communication and computer network design problems that a network provider is likely to
More informationCongestion Control In The Internet Part 1: Theory. JY Le Boudec 2018
Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase
More information2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51
2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More informationModeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications
Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Sarker Tanzir Ahmed and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas
More informationJoint MISTRAL/CESI lunch workshop 15 th November 2017
MISTRAL@Newcastle Joint MISTRAL/CESI lunch workshop 15 th November 2017 ITRC at Newcastle ITRC at Newcastle MISTRAL at Newcastle New approach to infrastructure data management to open-up analytics, modelling
More informationIR: Information Retrieval
/ 44 IR: Information Retrieval FIB, Master in Innovation and Research in Informatics Slides by Marta Arias, José Luis Balcázar, Ramon Ferrer-i-Cancho, Ricard Gavaldá Department of Computer Science, UPC
More informationBig Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016)
Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Week 12: Real-Time Data Analytics (2/2) March 31, 2016 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo
More informationAnalysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming
Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Min Dai Electrical Engineering, Texas A&M University Dmitri Loguinov Computer Science, Texas A&M University
More informationRedesde Computadores(RCOMP)
Redesde Computadores(RCOMP) Theoretical-Practical (TP) Lesson 12 2016/2017 Exam style practical exercise. (IPv4 networks dimensioning; static routeing tables design; CISCO IOS Access Control Lists) Instituto
More informationSPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING
SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING Nicolas Hohn 1 Darryl Veitch 1 Tao Ye 2 1 CUBIN, Department of Electrical & Electronic Engineering University of Melbourne, Vic 3010 Australia
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More informationPart A. P (w 1 )P (w 2 w 1 )P (w 3 w 1 w 2 ) P (w M w 1 w 2 w M 1 ) P (w 1 )P (w 2 w 1 )P (w 3 w 2 ) P (w M w M 1 )
Part A 1. A Markov chain is a discrete-time stochastic process, defined by a set of states, a set of transition probabilities (between states), and a set of initial state probabilities; the process proceeds
More informationModeling the dynamics of caching in. content-based publish/subscribe systems
Modeling the dynamics of caching in 1 content-based publish/subscribe systems Vasilis Sourlas, Georgios S. Paschos, Petteri Mannersalo, Paris Flegkas and Leandros Tassiulas Department of Computer & Communication
More informationArcgis Enterprise Performance And Scalability Best Practices
Arcgis Enterprise Performance And Scalability Best Practices We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer,
More informationMin Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min
JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science
More informationSelf Similar (Scale Free, Power Law) Networks (I)
Self Similar (Scale Free, Power Law) Networks (I) E6083: lecture 4 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA {predrag}@ee.columbia.edu February 7, 2007
More informationarxiv: v3 [cs.dc] 13 Oct 2016
Correction to the article Dynamic power management in energy-aware computer networks and data intensive computing systems published in Future Generation Computer Systems journal arxiv:1610.02551v3 [cs.dc]
More informationSupplementary Technical Details and Results
Supplementary Technical Details and Results April 6, 2016 1 Introduction This document provides additional details to augment the paper Efficient Calibration Techniques for Large-scale Traffic Simulators.
More informationDegree (k)
0 1 Pr(X k) 0 0 1 Degree (k) Figure A1: Log-log plot of the complementary cumulative distribution function (CCDF) of the degree distribution for a sample month (January 0) network is shown (blue), along
More informationTHE DESIGN AND IMPLEMENTATION OF A WEB SERVICES-BASED APPLICATION FRAMEWORK FOR SEA SURFACE TEMPERATURE INFORMATION
THE DESIGN AND IMPLEMENTATION OF A WEB SERVICES-BASED APPLICATION FRAMEWORK FOR SEA SURFACE TEMPERATURE INFORMATION HE Ya-wen a,b,c, SU Fen-zhen a, DU Yun-yan a, Xiao Ru-lin a,c, Sun Xiaodan d a. Institute
More informationSemantic Web SPARQL. Gerd Gröner, Matthias Thimm. July 16,
Semantic Web SPARQL Gerd Gröner, Matthias Thimm {groener,thimm}@uni-koblenz.de Institute for Web Science and Technologies (WeST) University of Koblenz-Landau July 16, 2013 Gerd Gröner, Matthias Thimm Semantic
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More information4 : Exact Inference: Variable Elimination
10-708: Probabilistic Graphical Models 10-708, Spring 2014 4 : Exact Inference: Variable Elimination Lecturer: Eric P. ing Scribes: Soumya Batra, Pradeep Dasigi, Manzil Zaheer 1 Probabilistic Inference
More informationBurst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks
Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University
More informationRandom Target Lemma. Sucharita Jayanti. February 21, 2013
Random Target Lemma Sucharita Jayanti February 21, 2013 Abstract The well known Random Target Lemma states that if one starts at a node i in a connected graph, selects a target node at random (according
More informationBehavioral Simulations in MapReduce
Behavioral Simulations in MapReduce Guozhang Wang, Marcos Vaz Salles, Benjamin Sowell, Xun Wang, Tuan Cao, Alan Demers, Johannes Gehrke, Walker White Cornell University 1 What are Behavioral Simulations?
More informationGENERALIZATION IN THE NEW GENERATION OF GIS. Dan Lee ESRI, Inc. 380 New York Street Redlands, CA USA Fax:
GENERALIZATION IN THE NEW GENERATION OF GIS Dan Lee ESRI, Inc. 380 New York Street Redlands, CA 92373 USA dlee@esri.com Fax: 909-793-5953 Abstract In the research and development of automated map generalization,
More informationWhat Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol?
What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? Timothy G. Griffin Computer Laboratory University of Cambridge, UK timothy.griffin@cl.cam.ac.uk Advanced Networks
More informationModeling population growth in online social networks
Zhu et al. Complex Adaptive Systems Modeling 3, :4 RESEARCH Open Access Modeling population growth in online social networks Konglin Zhu *,WenzhongLi, and Xiaoming Fu *Correspondence: zhu@cs.uni-goettingen.de
More informationDistributed Algorithmic Mechanism Design: Recent Results and Future Directions
Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Joan Feigenbaum Yale Scott Shenker ICSI Slides: http://www.cs.yale.edu/~jf/dialm02.{ppt,pdf} Paper: http://www.cs.yale.edu/~jf/fs.{ps,pdf}
More informationSpatial Analytics Workshop
Spatial Analytics Workshop Pete Skomoroch, LinkedIn (@peteskomoroch) Kevin Weil, Twitter (@kevinweil) Sean Gorman, FortiusOne (@seangorman) #spatialanalytics Introduction The Rise of Spatial Analytics
More informationVery Large Scale Integration (VLSI)
Very Large Scale Integration (VLSI) Lecture 4 Dr. Ahmed H. Madian Ah_madian@hotmail.com Dr. Ahmed H. Madian-VLSI Contents Delay estimation Simple RC model Penfield-Rubenstein Model Logical effort Delay
More informationSlides based on those in:
Spyros Kontogiannis & Christos Zaroliagis Slides based on those in: http://www.mmds.org High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering
More informationTAKING INFORMATION INTO ACCOUNTS
MICHEL BIEZUNSKI, AI CAMP, UN NEW YORK JULY 12, 2016 TAKING INFORMATION INTO ACCOUNTS The Data Projection Model INTRO Information is abundant. Information is messy. There are multiple ways to view the
More informationScalable Mesh Networks and The Address Space Balancing Problem. Andrea Lo Pumo Girton College
Scalable Mesh Networks and The Address Space Balancing Problem Andrea Lo Pumo Girton College A dissertation submitted to the University of Cambridge in partial fulfilment of the requirements for the degree
More informationSignalling Analysis for Adaptive TCD Routing in ISL Networks *
COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationArup Nanda Starwood Hotels
Arup Nanda Starwood Hotels Why Analyze The Database is Slow! Storage, CPU, memory, runqueues all affect the performance Know what specifically is causing them to be slow To build a profile of the application
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationCharter for the. Information Transfer and Services Architecture Focus Group
for the Information Transfer and Services Architecture Focus Group 1. PURPOSE 1.1. The purpose of this charter is to establish the Information Transfer and Services Architecture Focus Group (ITSAFG) as
More informationDM-Group Meeting. Subhodip Biswas 10/16/2014
DM-Group Meeting Subhodip Biswas 10/16/2014 Papers to be discussed 1. Crowdsourcing Land Use Maps via Twitter Vanessa Frias-Martinez and Enrique Frias-Martinez in KDD 2014 2. Tracking Climate Change Opinions
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationOnline Dictionary Learning with Group Structure Inducing Norms
Online Dictionary Learning with Group Structure Inducing Norms Zoltán Szabó 1, Barnabás Póczos 2, András Lőrincz 1 1 Eötvös Loránd University, Budapest, Hungary 2 Carnegie Mellon University, Pittsburgh,
More informationECEN 689 Special Topics in Data Science for Communications Networks
ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University Lecture 13 Measuring and Inferring Traffic Matrices
More informationDESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS
University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses 2017 DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS Mostafa Dehghan Shirehpaz University
More informationHW 3: Heavy-tails and Small Worlds. 1 When monkeys type... [20 points, collaboration allowed]
CS/EE/CMS 144 Assigned: 01/18/18 HW 3: Heavy-tails and Small Worlds Guru: Yu Su/Rachael Due: 01/25/18 by 10:30am We encourage you to discuss collaboration problems with others, but you need to write up
More informationCHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM
16 CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 2.1 INTRODUCTION Load flow analysis of power system network is used to determine the steady state solution for a given set of bus loading
More informationUnderstanding Sharded Caching Systems
Understanding Sharded Caching Systems Lorenzo Saino l.saino@ucl.ac.uk Ioannis Paras i.psaras@ucl.ac.uk George Pavlov g.pavlou@ucl.ac.uk Department of Electronic and Electrical Engineering University College
More information1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007
Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can
More informationAn Efficient reconciliation algorithm for social networks
An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation
More informationCoding for loss tolerant systems
Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon
More informationECS 253 / MAE 253, Lecture 11 May 3, Bipartite networks, trees, and cliques & Flows on spatial networks
ECS 253 / MAE 253, Lecture 11 May 3, 2016 group 1 group group 2 Bipartite networks, trees, and cliques & Flows on spatial networks Bipartite networks Hypergraphs Trees Planar graphs Cliques Other important
More informationExascale I/O challenges for Numerical Weather Prediction
Exascale I/O challenges for Numerical Weather Prediction A view from ECMWF Tiago Quintino, B. Raoult, S. Smart, A. Bonanni, F. Rathgeber, P. Bauer, N. Wedi ECMWF tiago.quintino@ecmwf.int SuperComputing
More informationSOFTWARE ARCHITECTURE DESIGN OF GIS WEB SERVICE AGGREGATION BASED ON SERVICE GROUP
SOFTWARE ARCHITECTURE DESIGN OF GIS WEB SERVICE AGGREGATION BASED ON SERVICE GROUP LIU Jian-chuan*, YANG Jun, TAN Ming-jian, GAN Quan Sichuan Geomatics Center, Chengdu 610041, China Keywords: GIS; Web;
More informationNetworks: space-time stochastic models for networks
Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive
More informationCongestion Control. Need to understand: What is congestion? How do we prevent or manage it?
Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur
More informationThe Giving Game: Google Page Rank
The Giving Game: Google Page Rank University of Utah Teachers Math Circle Nick Korevaar March, 009 Stage 1: The Game Imagine a game in which you repeatedly distribute something desirable to your friends,
More informationIntroduction to Randomized Algorithms III
Introduction to Randomized Algorithms III Joaquim Madeira Version 0.1 November 2017 U. Aveiro, November 2017 1 Overview Probabilistic counters Counting with probability 1 / 2 Counting with probability
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationUniversity of Illinois at Urbana-Champaign. Midterm Examination
University of Illinois at Urbana-Champaign Midterm Examination CS410 Introduction to Text Information Systems Professor ChengXiang Zhai TA: Azadeh Shakery Time: 2:00 3:15pm, Mar. 14, 2007 Place: Room 1105,
More informationLinear Programming Models for Traffic Engineering Under Combined IS-IS and MPLS-TE Protocols
Linear Programming Models for Traffic Engineering Under Combined IS-IS and MPLS-TE Protocols D. Cherubini 1 A. Fanni 2 A. Frangioni 3 C. Murgia 4 M.G. Scutellà 3 P. Zuddas 5 A. Mereu 2 1 Tiscali International
More informationDecember 3, Dipartimento di Informatica, Università di Torino. Felicittà. Visualizing and Estimating Happiness in
: : Dipartimento di Informatica, Università di Torino December 3, 2013 : Outline : from social media Social media users generated contents represent the human behavior in everyday life, but... how to analyze
More information