A novel algorithm for dynamic admission control of elastic flows
|
|
- Sheila Manning
- 5 years ago
- Views:
Transcription
1 A novel algorithm for dynamic admission control of elastic flows Franco Blanchini, Daniele Casagrande and Pier Luca Montessoro Abstract The task of assigning part of the forwarding capability of a router to different flows, usually called admission control, is considered and an algorithm to handle the requests is developed. The idea is to admit not only the acceptance and the rejection answers but also a third kind of answer that occurs when there is no available share of the resource at the instant of the request but there may be a quote of resource available in a determined time-window in the future, provided that the active flows are suitably decreased. The algorithm guarantees both the fair occupancy of the resource and the optimality of its usage. Moreover, the only information on which the algorithm relies is the number of flows, and for each one, the minimum bandwidth needed and the desired bandwidth. Index terms Bandwidth assignment, admission control, elastic flow. I. INTRODUCTION When a resource is shared among several users, managing the allocation of the resource to the users requesting becomes adifficult task if fairness among users and the maximization of the usage are to be guaranteed. In this article we consider the task, performed by a router, of assigning part of its forwarding capability to different flows, usually called admission control, and we develop an algorithm to handle the requests. In the literature, diverse algorithms are available for admission control [1], [2], [3], [4], [5], [6]. However, to the best of these authors knowledge, all the available methods perform a straight rejection, i.e. either the router admits a new flow and assign to it some rate of transmission, or the request is rejected. On the contrary, the idea developed herein is to admit also a third kind of answer when there is no available share of the resource at the instant of the request but there may be a quote of resource available in a determined time-window in the future, provided that the active flows are suitably decreased. In this way a user, the request of which is unsatisfied, can decide to wait and try again after a given time-interval. The algorithm described herein guarantees both the fair occupancy of the resource and the optimality of its usage. The control works on a per-flow dynamic resource reservation schema, made scalable by the underlying algorithm REBOOK [7], that provides constant cost for flow table access regardless the number of active flows. Moreover, another advantage of the proposed algorithm is that the only information on which it relies consists is the number of flows, and for each one, the minimum quote, namely the minimum bandwidth needed for the source to be able to deliver the service, and the desired quote, namely the bandwidth requested by the source for optimal quality level. The task of the router is modeled making use of two different discrete time scales. The first, with a smaller time period, corresponds to the time scale of the communication between the router and the end nodes; this is also the time scale of the upgrading of the flow information table. The second time scale, with a larger time period, corresponds to the action of the control law. The event of a new source requesting the use of the channel and the event of a source stopping using it are treated asynchronously with respect to the time scale of the control law and, more importantly, no assumption is made on the statistics of the requests; hence, the validity of the method is general. II. NOTATION The following notation is used throughout the article. n(t) is the total number of sources transmitting to the router at time t; l i [, 1], i = 1,...,n(t), denotes the minimum level of transmission rate of the i-th source, namely the transmission rate below which the source cannot transmit; r i [, 1] denotes the transmission rate requested by the i-th source; obviously r i l i ; x i (t) [,r i l i ] is the quote, namely the amount of transmission rate at time t, associated with the i-th source, that can be assigned managed by the controller; R i (t) =x i (t)+l i denotes the total transmission rate assigned at the instant t to the i-th source; R i (t) [l i,r i ]; y(t) denotes the overall transmission rate at time t, thatis n(t) y(t) = R i (t). We assume that all the quantities are normalized, namely that the capacity of the channel is 1. III. STEADY STATE In this section we describe a model for the dynamics of the manageable amounts of transmission rate x i in the simplified scenario in which no new request occur. Obviously, this is not the final purpose of this work; however, this first result is accessory for the theory that is developed in the remainder of the article. To begin with, we make the ideal assumption that all the quantities vary continuously with time and we suppose that the router can behave as a control system, namely that it can affect the time-variation of the rate of transmission assigned to each source, thus obtaining the following model: ẋ i (t) =u i (t), (1) Page 11
2 where u i (t) is the input (decided by the controller). If the number of sources using the channel is constant, namely that n(t) =n for all t, then the following result holds. Proposition 3.1: If there exist x i,fori =1,...,n,such that x i [,r i l i ] and n ( x i + l i ) 1, then the input u i (t) =α( x i x i (t)), (2) where α is a positive constant, is such that x i is an equilibrium for Equation (1) and the equilibrium is exponentially stable. Proof It is sufficient to consider the error variable e i (t) x i x i (t). Its dynamics are ė i (t) = αe i (t), what implies that e(t) tends to zero exponentially. We mentioned in the Introduction that according to the model considered herein, the router has the information about the minimum transmission rate l i and the requested transmission rate r i associated with each flow; a reasonable choice for the steady-state values of the transmission rates may be based on these data. In particular, we define the steady-state fair distribution factor (SSFDF) F SS = and we choose 1 if n r i < 1, 1 n l i n (r i l i ), otherwise, (3) x i =(r i l i )F SS. (4) The choice (4) guarantees a fair share of the resource among the users. However, the maximization of the resource usage is also guaranteed, as the following result show. Proposition 3.2: The control law (2) with x i given by (4) is such that the occupancy of the channel is optimized. Proof. The time-variation of the occupancy of the channel is ẏ(t) = n n ẋ i = α ( x i x i (t)) = = α ( F SS n (r i l i ) ) n x i (t). Two cases are possible. If n r i < 1, thenf SS =1, x i = r i l i and the steady state value of y, i.e. the occupancy of the channel at the equilibrium, is ȳ = n (l i + x i )= n r i, which means that each flow is assigned its maximum request. Otherwise, if n r i 1, then we obtain ( ) n n ẏ(t) =α 1 l i x i (t) and the equilibrium value for y is ȳ = n (l i + x i )= n l i + F = n (r i l i )= ( n l i + 1 namely the full occupancy of the channel. ) n l i =1, The control law considered in Proposition 3.2 is different for each flow and depends, for the i-th flow, on the equilibrium values x i, namely on r i and l i, which are an information needed by the router to compute the SSFDF. Moreover, the router has to communicate to the sources the value of the current SSFDF, which is constant in the simplified scenario considered in this section but, in a real-world application, varies in time. The computation and the transmission to the active sources of the SSFDF at any time instant can be avoided by using a different control law, based only on the number of sources, n, and on the occupancy of the channel, y(t), as shown by the following result. Proposition 3.3: Let { n } ȳ min r i, 1. (5) The input {, if xi (t) =r u i (t) = i l i, (6) α(ȳ y(t))/n, otherwise, where α is a positive constant, is such that the occupancy of the channel is optimized. Proof. With the control laws (6) the dynamic equation for the total occupancy of the channel is n n ẏ(t) = Ṙ i (t) = ẋ i (t) = α (ȳ y(t)), (7) n i L(t) where L(t)={i : x i (t) r i l i }. Hence there are two stable conditions, namely L(t) =, meaning that each source is assigned its maximal quote, or y(t) =ȳ. In turn, the latter case can be split into two sub-cases; if ȳ =1 the channel is fully occupied; if ȳ 1 each source is assigned its maximal quote. Remark 3.1: By (5), we always have ȳ y(t). This property, in turn, implies that u i (t) is always positive, namely that x i (t) reaches its equilibrium value increasing monotonically. The model (1)-(2) does not consider that other sources may request the usage of the channel. To take into account this occurrence we may operate as follows. Suppose that a new source, described by parameters l n+1 and r n+1, requests to use the channel at time τ. Then three case are possible. Refusal. If l n+1 is such that n+1 l i > 1, then there exists no condition in which the n +1 sources can all use the resource; the request must be refused. Page 111
3 Acceptance. If y(τ)+l n+1 1, then the new source can be assigned a rate of transmission R n+1 such that l n+1 R n+1 1 y(τ); this can be done without affecting the transmission rate assigned to the other users. In principle, any criterion could be used to choose R n+1 ; however, to keep the distribution of the bandwidth fair we introduce an additional variable, named the dynamic fair assignment factor (DFAF), denoted by F DA, that is updated at any instant in the timescale of the controller, and we set R n+1 =min{1 y(τ),l n+1 + F DA (r n+1 l n+1 }. Delayed request. The third case is when n+1 l i < 1, which means that in principle the n +1 users could all use the channel at the same time, but y(τ) +l n+1 > 1, which means that the active n users at time τ are not leaving enough resource share for the n +1-th user. In this case the router needs to design a strategy in order to reduce (at least some of) the quotes x i,fori =1,...,n, in order to meet, after T time units, the condition y(τ + T )+l n+1 1. As a consequence, the n +1-th source cannot use the channel at time τ but will be allowed to use it at time τ + T. Its request is delayed of T time units. We describe the third occurrence more into details in the following section. IV. NEW REQUESTS AND DROPPINGS To properly model the scenario in which the router is endowed with a controller, we suppose that the time scale of the router is continuous while the controller performs its action periodically every T C time-units, thus its dynamics is modeled in a discrete-time environment. Moreover, in order to design a control law taking care of the requests of new sources, we use an additional input variable d, accounting for unsatisfied demands, the dynamics of which are constructed as follows. Denote by W h the (continuous) time interval between (h 1)T C and T C, namely W h {t R + :(h 1)T C t ht C }. Let n E (h) the number of new users requesting the use of the resource in W h, namely the flows trying to enter the channel, and by n L (h) the number of users that stop using the resource in W h, namely the flows leaving the channel. Clearly =n(h 1) n L (h). Finally, denote by l N (h) the sum of the minimum levels of transmission of the users trying to access the resource in the time-interval W h and let l A (h) the additional needed resource, namely l A (h) =l N (h) (1 ȳ). We assign to the additional input d, the discrete dynamics described, for k h, by d(k +1)=γd(k)+[l A (h)/]δ(k h), (8) where γ (, 1), δ(k h) =1if k = h and δ(k h) =if k h. The solution of equation (8), for k>his d(k) =γ k h 1 [l A (h)/+γd(h)]. (9) Equation (9) implies, in particular, d(k) > for all k>h, hence d can be used to make the quotes assigned to the active y β α Fig. 1. Time history of the channel occupancy in three different cases First case (bold line): α =.488, β =.1. Second case (dashed line): α =.488, β =1. Third case (solid line): α =.198, β =.1. sources decrease. For instance, we may choose the dynamics of the i-th quote, for i =1,...,n, to be described by x i (k +1)=x i (k)+u i (k) σ i (k)βd(k)/s(k), (1) where β is a positive coefficient, { 1, if xi (k) >, σ i (k) = (11), if x i (k) =, S(k) = σ i(k), and { α[ȳ y(k)]/n (k), if xi (k) <r u i (k) = i, (12), if x i (k) =r i, with 1 α (, 1) and N(k) is the cardinality of L(kT C ). Assumption 1: For t ht C no new request of usage arrives and no user stops using the channel, i.e. the number of active users is constant, and equal to, forallt ht C. If Assumption 1 holds, then for k>hthedynamic equation for the total occupancy of the channel is n(k) y(k +1)= (x i (k +1)+l i )= = y(k)+ α (ȳ y(k)) βd(k). (13) N(k) i L(kT C ) By introducing the variable w = y ȳ, Equation (13) can be rewritten as w(k +1)=(1 α)w(k) βd(k). (14) An example of the time-variation of y for different values of α and β is reported in Figure 1. By numerical evaluation of the minimum position and the minimum value for different values 1 See the proof of Theorem 4.1. Page 112
4 of α and β it can be noted that as α decreases the minimum is reached later and the smaller is the value of α the lower is the value of the minimum. On the contrary, the higher is the value of β the lower is the value of the minimum. Therefore, one can first fix the optimal value of α guaranteeing that the minimum is reached after a prescribed time interval; then the value of β can be tuned to fix the value of the minimum. In order to prove the main results of the article, the following additional assumption is needed. Assumption 2: For t = ht C the system is at the equilibrium, namely w(h) =and d(h) =. Theorem 4.1: If Assumptions 1 and 2 hold, if x i evolves according to the dynamics (1), with d(k) described by (9) and u i (k) described by (12), and if l i + l N (h) < 1, then there exist α (, 1), β> and γ> such that: i) y( k)+l N (h) < 1, forsome k >h, ii) y(k) l i,forallk h. Proof. i) In the domain of the Z transforms, Equations (8) and (14) are D(z) = 1 ( zd(h)+ l ) A(h) z γ and zw(h) βd(z) W (z) =, z 1+α respectively. If γ = 1 α, then the Z transform of w(k) corresponding to the initial conditions w(h) =and d(h) = is W (z) = βl A(h) 1 (z 1+α) 2. By computing the inverse Z transform one obtains w(k) = βl A(h) (k h 1)(1 α) k h 2. (15) If α =ᾱ 1 e 1/m for some m N, thenw(k) reaches the minimum for k = k m + h +1 and we have w( k) = βl A (h)m(1 ᾱ) m 1 /. (16) Finally, if β>β min m(1 ᾱ) m 1, we obtain w( k) < l A (h), what, in turn, implies y( k) =w( k)+ȳ< l A (h)+ȳ = l N (h)+1, hence the claim. ii) The condition l i + l N (h) < 1 implies and, in turn, ȳ l i > ȳ + l N (h) 1=l A (h) l i β max ȳ l A (h) β min >β min. Hence, if β>β min, then (16) yields w(k) > l i ȳ, for all k>h, hence the claim. A result analogous to Theorem 4.1 holds when the control law (12), which is the same for all the fluxes, is substituted with a control law depending on the equilibrium value of the flux to which it is assigned, as the following result shows. Theorem 4.2: The claims of Theorem 4.1 hold, for the same hypotheses, also when (12) is substituted with { α( xi x u i (k) = i (k)), if x i (k) <r i,, if x i (k) =r i. Proof. The dynamic equation for the total occupancy of the channel is y(k +1)= (x i (k +1)+l i )= = y(k)+ α( x i x i (k)) βd(k) = i L(k) = y(k)+α ( x i x i (k)) βd(k) = = y(k)+α(ȳ y(k)) βd(k), which is equal to (14). Therefore the proof of Theorem 4.1 can be repeated. Remark 4.1: The previous result, namely Theorems 4.1 and 4.2 have been obtained by supposing that Assumptions 1 and 2 hold. However, even in a more general case, where several new requests and droppings out occur (in different instants) the method is effective. In fact, if a new request occurs when fluxes are in the decreasing phase an additional impulse appears in (8), what speed up the decreasing process and make new requests more likely to be accepted; if a drop out occurs, then there is more bandwidth available and again new requests are more likely to be accepted. Obviously, several new requests and droppings out affect the precision of equation (16) which is based on the values of l a and n at the instant h in which the first request occur (see again equation (8)). V. CONTROLLER ALGORITHM The previous results, and in particular Theorem 4.1, lead to the following algorithm. STEP.A Choose m N and let α =1 e 1/m.Letγ =1 α. Compute β min and β max and choose β (β min,β max ). Let n be the number of active fluxes at the initial instant. Page 113
5 STEP.B Initialize all the x i,fori =1,...,n, to zero. Initialize d, u i,fori = i...,n,andl A to zero. STEP 1 Evaluate n L, namely the number of sources that stopped using the resource in the interval W h (this quantity is an exogenous input, namely a variable passed to the algorithm from outside it). Evaluate the boolean variable MIS RES (missing resource), which is one if some unsatisfied request occurred in W h (this quantity is also an exogenous input). IF n L OR MIS RES,THEN Update the information table, namely the number of active sources n and the quantities l i and r i for i = 1,...,n. Update F SS, ȳ, l N, l A,and x i,fori =1,...,n. STEP 2 Let x i,fori =1,...,n, evolve according to (1), with u i given by (12), and let d evolve according to (8), namely 2 n n n L, d γ d + MIS RES l A /n, IF x i = r i THEN u i =, ELSE u i = α (ȳ y)/n, x i x i + u i β d, F DA = x 1 /(r 1 l 1 ). Go back to STEP 1. A. Request handling algorithm The overall algorithm to handle new requests can be modeled as follows. If at some time-instant τ a new sender, with minimum level of transmission rate l n+1 and requested transmission rate r n+1, requests to use the channel, DO IF 1 ȳ F DA (r n+1 l n+1 )+l n+1 ACCEPT, Update the information table. Update F SS, ȳ, l N, l A,and x i. x n+1 (τ) =F DA (r n+1 l n+1 ), ELSEIF 1 ȳ l n+1 AND 1 ȳ F (r n+1 l n+1 )+l n+1, DELAY, MIS RES 1, ELSE, REFUSE, MIS RES 1, VI. A SIMULATED SCENARIO To test the effectiveness of the proposed algorithm, a scenario with ten flows described by the parameters specified in Table I has been simulated. The total (not normalized) capacity of the channel is 37. The main events can be described as follows. At the instants 1, 12 and 18 the fluxes F1, F2 and F3 request to use the channel; the request is ACCEPTED and the fluxes are assigned their requested quote, since the sum does not exceeds 37, namely the capacity of the channel. 2 The choice of computing F DA from x 1, l 1 and r 1 in the last assignment is arbitrary; any i {1,...,n} could be used. Flux requests at l i r i drops at F F F F F F F F F F TABLE I PARAMETERS OF THE DATA FLUXES. At time 3 the F4 requests to use the channel; the request is ACCEPTED and F4 is assigned a bandwidth of 7, that is the maximum available. However, since the FDF is updated (see Figure 4), from this instant on F1, F2 and F3 are requested to decrease their bandwidth to leave more band for F4, what is a consequence of the fair distribution policy (see Figure 2 where the instant 3 is denoted by the vertical dashed line on the left). d is kept to zero because there is no missing resource (see Figure 3). At time 5, F5 requests to use the channel; since R 1 (5) + R 2 (5) + R 3 (5) + R 4 (5) = 37 there is no more band to assign and the request cannot be accepted at this time. However, since l 1 + l 2 + l 3 + l 4 + l 5 < 37, the request could possibly be satisfied and is DELAYED. Meanwhile, F1, F2, F3 and F4 are requested to decrease their value (see the vertical dashed line in Figure 2) with the help of the control variable d that is now different from zero (see again Figure 3). In the simulation the value of β is very large and hence the time-behaviour of the fluxes experiences a steep decrement. At time 65, F6 requests to use the channel 3.SinceF1,F2, F3 and F4 are assigned their minimum, there is enough band for F6, which is ACCEPTED and assigned its minimum as well (fairness). At time 7, F7 requests to use the channel. The request is ACCEPTED and F7 is assigned its minimum. From this time on, the control algorithm allows the sources to increase the fluxes up to the full occupancy of the channel at time 15. At time 2 and 21, F1 and F2 drops out, thus making more bandwidth available for the remaining users which are allowed to increase their data fluxes. At time 23, F8 makes a request. All the fluxes are assigned (almost) the band they request since F DA 1 (see Figure 4) and the request is ACCEPTED assigning to F8 (almost) its maximum. At time 24, F9 makes a request, which is DELAYED. At time 25, F1 makes a request, which is ACCEPTED and F1 assigned (almost) its minimum since F DA. Finally, from 25 on, the sources are allowed to gradually increase their fluxes up to the full occupancy of the channel. 3 There is no pre-booking, hence flux F6 is not necessary coming from the same source requesting F5. Page 114
6 d y F1, F F2, F8 F Fig. 3. Time history of d (magnified 5 times) and y. F F F SS F DA F Fig. 4. Time history of F SS and F DA. Fig. 2. Time history of the fluxes. VII. CONCLUSIONS We have described a method to optimize the usage of a shared resource in a dynamic scenario, namely when, asynchronously, new requests occur or current users stop using the resource. The algorithm has been designed in particular for the specific case of data flows in a channel. Its input variables are the minimum and the desired amount of bandwidth requested by each user. The algorithm guarantees both the optimization of the resource and the fair distribution among the users. REFERENCES [1] J.W. Roberts and L. Massoulié, Bandwidth sharing and admission control for elastic traffic, in Proc. of ITC Specialists Seminar, Yokohama, Japan, [2] N. Benameur, S. Ben Fredi, S. Oueslati-Boulahia, and J.W. Roberts, Quality of service and flow level admission control in the internet, Computer Networks, vol. 4, pp , 22. [3] S.Y. Nam, S. Kim, and D.K. Sung, Measurement-based admission control at edge routers, IEEE/ACM Transactions on Networking, vol. 16, no. 2, pp , April 28. [4] S. Jamin, P.B. Danzig, S.J. Shenker, and L. Zhang, A measurementbased admission control algorithm for integrated services packet networks, IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 56 7, February [5] Z. Dziong, M. Juda, and L. Mason, A framework for bandwidth management in atm networks aggregate equivalent bandwidth estimation approach, IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp , February [6] F.P. Kelly, P.B. Key, and S. Zachary, Distributed admission control, IEEE Journal on Selected Areas in Communications, vol. 18, no. 12, pp , December 2. [7] P.L. Montessoro and D. De Caneva, REBOOK: a deterministic, robust and scalable resource booking algorithm, Journal of Network and Systems Management, vol. 18, no. 4, pp , 21. Page 115
An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks
An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationMin Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min
JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science
More informationSingular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.
Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationBurst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks
Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University
More informationTHE Internet is increasingly being used in the conduct of
94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,
More informationAn approach to service provisioning with quality of service requirements in ATM networks
Journal of High Speed Networks 6 1997 263 291 263 IOS Press An approach to service provisioning with quality of service requirements in ATM networks Panagiotis Thomas Department of Electrical Engineering
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationM/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS
M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu
More informationInternet Congestion Control: Equilibrium and Dynamics
Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)
More informationCongestion Control 1: The Chiu-Jain Model
Mathematical Modelling for Computer Networks- Part I Spring 2013 (Period 4) Congestion Control 1: The Chiu-Jain Model Lecturers: Laila Daniel and Krishnan Narayanan Date:11th March 2013 Abstract This lesson
More informationKCV Kalyanarama Sesha Sayee and Anurag Kumar
Adaptive Algorithms for Admission of Elastic Sessions in the Internet KCV Kalyanarama Sesha Sayee and Anurag Kumar Abstract In the Internet, the majority of the traffic consists of elastic transfers. Users
More informationcommunication networks
Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth
More informationCOMP9334: Capacity Planning of Computer Systems and Networks
COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationEfficient Nonlinear Optimizations of Queuing Systems
Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment
More informationAnalysis of the Increase and Decrease. Congestion Avoidance in Computer Networks
Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks Dah-Ming Chiu, Raj Jain Presented by: Ashish Vulimiri Congestion Control Congestion Avoidance Congestion Avoidance
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationA Generalized FAST TCP Scheme
A Generalized FAST TCP Scheme Cao Yuan a, Liansheng Tan a,b, Lachlan L. H. Andrew c, Wei Zhang a, Moshe Zukerman d,, a Department of Computer Science, Central China Normal University, Wuhan 430079, P.R.
More informationIEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 5, MAY 1998 631 Centralized and Decentralized Asynchronous Optimization of Stochastic Discrete-Event Systems Felisa J. Vázquez-Abad, Christos G. Cassandras,
More informationDelay bounds (Simon S. Lam) 1
1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More information1.225 Transportation Flow Systems Quiz (December 17, 2001; Duration: 3 hours)
1.225 Transportation Flow Systems Quiz (December 17, 2001; Duration: 3 hours) Student Name: Alias: Instructions: 1. This exam is open-book 2. No cooperation is permitted 3. Please write down your name
More information384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP
384Y Project June 5, 00 Stability of Congestion Control Algorithms Using Control Theory with an application to XCP . Introduction During recent years, a lot of work has been done towards the theoretical
More information3. ESTIMATION OF SIGNALS USING A LEAST SQUARES TECHNIQUE
3. ESTIMATION OF SIGNALS USING A LEAST SQUARES TECHNIQUE 3.0 INTRODUCTION The purpose of this chapter is to introduce estimators shortly. More elaborated courses on System Identification, which are given
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most
More informationA Virtual Queue Approach to Loss Estimation
A Virtual Queue Approach to Loss Estimation Guoqiang Hu, Yuming Jiang, Anne Nevin Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology, Norway
More informationCompetitive Management of Non-Preemptive Queues with Multiple Values
Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem
More informationChapter 5 A Modified Scheduling Algorithm for The FIP Fieldbus System
Chapter 5 A Modified Scheduling Algorithm for The FIP Fieldbus System As we stated before FIP is one of the fieldbus systems, these systems usually consist of many control loops that communicate and interact
More informationA Mechanism for Pricing Service Guarantees
A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationA Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale
222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior
More informationAppendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers
Appendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers Sandjai Bhulai, Ger Koole & Auke Pot Vrije Universiteit, De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands Supplementary Material
More informationStatistical Considerations for Maximizing Channel Density on Embedded Systems
Freescale Semiconductor Application Note AN301 Rev. 0, 10/005 Statistical Considerations for Maximizing Channel Density on Embedded Systems By Lúcio F. C. Pessoa This application note provides an overview
More informationSession-Based Queueing Systems
Session-Based Queueing Systems Modelling, Simulation, and Approximation Jeroen Horters Supervisor VU: Sandjai Bhulai Executive Summary Companies often offer services that require multiple steps on the
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationLocal and Global Stability of Symmetric Heterogeneously-Delayed Control Systems
Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract
More informationCharging and rate control for elastic traffic
Charging and rate control for elastic traffic Frank Kelly University of Cambridge Abstract This paper addresses the issues of charging, rate control and routing for a communication network carrying elastic
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationMicroeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)
Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center
More informationDynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement
Submitted to imanufacturing & Service Operations Management manuscript MSOM-11-370.R3 Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement (Authors names blinded
More informationYEQT, , Eindhoven
in in YEQT, 11-11-2015, Eindhoven out 1 / 39 in in out What are vehicle sharing systems? 2 / 39 in Vehicle Sharing Systems in out Figure: Autolib and Velib stations in Paris. 3 / 39 in Vehicle Sharing
More informationStability of IS-856 CDMA Networks with non-fully Buffered Users: A Fair Rate Allocation Strategy
49th IEEE Conference on Decision and Control December 5-7, Hilton Atlanta Hotel, Atlanta, GA, USA Stability of IS-856 CDMA Networks with non-fully Buffered Users: A Fair Rate Allocation Strategy Kian Jalaleddini,
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationAnalysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function
Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function K. Avrachenkov 1, L. Finlay 2, and V. Gaitsgory 2 1 INRIA Sophia Antipolis, France
More informationOn the stability of flow-aware CSMA
On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .
More informationDiscrete-event simulations
Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;
More informationThe Multi-Path Utility Maximization Problem
The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationGame Theoretic Approach to Power Control in Cellular CDMA
Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University
More informationA Signal Processing Approach to the Analysis of Chemical Networking Protocols
Laurea Specialistica 19 July 2010 A Signal Processing Approach to the Analysis of Chemical Networking Protocols Author Supervisors Prof. Marco Luise Prof. Filippo Giannetti (University of Pisa) (University
More informationA STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL
A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL by Rodney B. Wallace IBM and The George Washington University rodney.wallace@us.ibm.com Ward Whitt Columbia University
More information6 Solving Queueing Models
6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationUtility, Fairness and Rate Allocation
Utility, Fairness and Rate Allocation Laila Daniel and Krishnan Narayanan 11th March 2013 Outline of the talk A rate allocation example Fairness criteria and their formulation as utilities Convex optimization
More informationInventory optimization of distribution networks with discrete-event processes by vendor-managed policies
Inventory optimization of distribution networks with discrete-event processes by vendor-managed policies Simona Sacone and Silvia Siri Department of Communications, Computer and Systems Science University
More informationWIRELESS cellular networks derive their name. Call Admission Control in Mobile Cellular Systems Using Fuzzy Associative Memory
ICCCN 23 Call Admission Control in Mobile Cellular Systems Using Fuzzy Associative Memory Sivaramakrishna Mopati, and Dilip Sarkar Abstract In a mobile cellular system quality of service to mobile terminals
More informationSection 3.3: Discrete-Event Simulation Examples
Section 33: Discrete-Event Simulation Examples Discrete-Event Simulation: A First Course c 2006 Pearson Ed, Inc 0-13-142917-5 Discrete-Event Simulation: A First Course Section 33: Discrete-Event Simulation
More informationReliable Data Transport: Sliding Windows
Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time
More informationA Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems
More informationOn the Resource Utilization and Traffic Distribution of Multipath. Transmission Control
On the Resource Utilization and Traffic Distribution of Multipath Transmission Control UMass Computer Science Technical Report UM-CS-2011-005 Bo Jiang 1, Yan Cai 2, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu
More informationA Retrial Queueing model with FDL at OBS core node
A Retrial Queueing model with FDL at OBS core node Chuong Dang Thanh a, Duc Pham Trung a, Thang Doan Van b a Faculty of Information Technology, College of Sciences, Hue University, Hue, Viet Nam. E-mail:
More informationManagement of intermodal container terminals using feedback control
Management of intermodal container terminals using feedback control A. Alessandri, S. Sacone $, S.Siri $ Institute of Intelligent Systems for Automation ISSIA-CNR National Research Council of Italy Via
More informationGeometric Capacity Provisioning for Wavelength-Switched WDM Networks
Geometric Capacity Provisioning for Wavelength-Switched WDM Networks Li-Wei Chen and Eytan Modiano Abstract In this chapter, we use an asymptotic analysis similar to the spherepacking argument in the proof
More informationChapter 6 Queueing Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation
Chapter 6 Queueing Models Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Purpose Simulation is often used in the analysis of queueing models. A simple but typical queueing model: Queueing
More informationAnalysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming
Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Min Dai Electrical Engineering, Texas A&M University Dmitri Loguinov Computer Science, Texas A&M University
More informationJob Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)
Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference
More informationSlides 9: Queuing Models
Slides 9: Queuing Models Purpose Simulation is often used in the analysis of queuing models. A simple but typical queuing model is: Queuing models provide the analyst with a powerful tool for designing
More informationSimplification of Network Dynamics in Large Systems
Simplification of Network Dynamics in Large Systems Xiaojun Lin and Ness B. Shroff Abstract In this paper we show that significant simplicity can be exploited for pricing-based control of large networks.
More informationOn the Resource Utilization and Traffic Distribution of Multipath Transmission Control
On the Resource Utilization and Traffic Distribution of Multipath Transmission Control Bo Jiang 1, Yan Cai, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu ycai@ecs.umass.edu University of Massachusetts,
More informationA Stackelberg Network Game with a Large Number of Followers 1,2,3
A Stackelberg Network Game with a Large Number of Followers,,3 T. BAŞAR 4 and R. SRIKANT 5 Communicated by M. Simaan Abstract. We consider a hierarchical network game with multiple links, a single service
More informationOn Allocating Cache Resources to Content Providers
On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationDIMENSIONING BANDWIDTH FOR ELASTIC TRAFFIC IN HIGH-SPEED DATA NETWORKS
Submitted to IEEE/ACM Transactions on etworking DIMESIOIG BADWIDTH FOR ELASTIC TRAFFIC I HIGH-SPEED DATA ETWORKS Arthur W. Berger * and Yaakov Kogan Abstract Simple and robust engineering rules for dimensioning
More informationA Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window
A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window Costas Busch 1 and Srikanta Tirthapura 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY
More informationStrong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers
Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathan Turner Washington University jon.turner@wustl.edu January 30, 2008 Abstract Crossbar-based switches are commonly used
More informationScheduling Periodic Real-Time Tasks on Uniprocessor Systems. LS 12, TU Dortmund
Scheduling Periodic Real-Time Tasks on Uniprocessor Systems Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 08, Dec., 2015 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 38 Periodic Control System Pseudo-code
More informationDynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement
Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Wyean Chan DIRO, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal (Québec), H3C 3J7, CANADA,
More informationON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM ALGORITHMS
K Y B E R N E T I K A V O L U M E 4 7 ( 2 0 1 1 ), N U M B E R 6, P A G E S 9 3 0 9 4 3 ON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM
More informationSINCE the passage of the Telecommunications Act in 1996,
JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 20XX 1 Partially Optimal Routing Daron Acemoglu, Ramesh Johari, Member, IEEE, Asuman Ozdaglar, Member, IEEE Abstract Most large-scale
More informationMASTER THESIS. Development and Testing of Index Policies in Internet Routers
Universidad del País Vasco / Euskal Herriko Unibertsitatea MASTER THESIS Development and Testing of Index Policies in Internet Routers Author: Josu Doncel Advisor: Peter Jacko Urtzi Ayesta Leioa, September
More informationInequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers
IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract
More informationNode-Based Distributed Optimal Control of Wireless Networks
Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu
More informationHow to deal with uncertainties and dynamicity?
How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling
More informationCooperative Communication with Feedback via Stochastic Approximation
Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu
More informationIntroduction to Markov Chains, Queuing Theory, and Network Performance
Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation
More informationEfficient Mechanism Design
Efficient Mechanism Design Bandwidth Allocation in Computer Network Presenter: Hao MA Game Theory Course Presentation April 1st, 2014 Efficient Mechanism Design Efficient Mechanism Design focus on the
More informationCPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017
CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer
More informationOptimal Sequences and Sum Capacity of Synchronous CDMA Systems
Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of
More information1 Column Generation and the Cutting Stock Problem
1 Column Generation and the Cutting Stock Problem In the linear programming approach to the traveling salesman problem we used the cutting plane approach. The cutting plane approach is appropriate when
More informationCoordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.
Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationAN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS
1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a
More informationRobust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals
Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals Xiaoming Wang Joint work with Zhongmei Yao, Yueping Zhang, and Dmitri Loguinov Internet Research Lab Computer Science
More informationScalable Scheduling with Burst Mapping in IEEE e (Mobile) WiMAX Networks
Scalable Scheduling with Burst Mapping in IEEE 802.16e (Mobile) WiMAX Networks Mukakanya Abel Muwumba and Idris A. Rai Makerere University P.O. Box 7062 Kampala, Uganda abelmuk@gmail.com rai@cit.mak.ac.ug
More information