Theoretical study of cache systems

Size: px
Start display at page:

Download "Theoretical study of cache systems"

Transcription

1 Theoretical study of cache systems Dmitry G. Dolgikh Samara State erospace University, Moscow sh., 34a, Samara, , Russia and ndrei M. Sukhov Samara Institute of Transport Engineering, Bezymyannyi per., 8, Samara, , Russia bstract The aim of this paper is a theoretical study of a cache system in order to find a way for optimization of proxy systems and to modernize construction principles. Two types of the correlations, Zipf-like distribution and normalizing conditions, play a role of fundamental laws. Corresponding system of equations allows to describe basic effects like ratio between construction parts, steady-state performance, optimal size, etc. Modification of the fundamental laws leads to a new effect of documents renewal in global network. Keywords: Cache proxy, Zipf-like distribution, cache optimization, steady-state performance, renewal of Web documents Inroduction Rapid development of computer technologies in the end of the last millennium leads to appearance of a virtual world with its own laws. Unfortunately, in this period too few attention was given to studying of fundamental principles of virtual life. The main constructions of the virtual world base on the concrete algorithms intended for providing vital functions. The easiest and obvious principles were used for constructing and modernizing of these algorithms. During their implementation weren t any time for studying and optimization. Often their low performance was compensated with growing power of computers. The main thing was that the new constructions of the virtual world allowed to manage the raising problems. Now days we can afford some respite and part of forces should be transferred to studying of fundamental laws and to optimization of vital systems on a base of recent knowledge. Frankly speaking, any research area may be considered as scientific field if and only if its basic principles are enveloped in a mathematical form and new rules may be predicted on a base of known facts. The aim of this paper is a theoretical study of a cache system in order to find a way for optimization of proxy systems and to modernize construction principles. Principles that should be used for a model is discussing as well. universal model can be easy generalized to any applications based on Zipf-like distri- corresponding author: sukhov@ssau.ru bution like Content distribution Networks (CDN) [8], peer-to-peer systems [, ], Internet search engine, etc. Model parameters In this section definitions of variables are given and basic approaches and terminus has been analyzed. ll network users are considered as one collective user. This user sends all requests to a global network as it is shown on the Fig.. Some documents are requested several times and therefore they should be held in a cache system. s it was reported in Refs. [, 3, 0] the relative frequency of requests to Web pages follows Zipf-like distribution [4]. This distribution states that the relative probability of a request for the i th most popular page is ϑ i = i α, () where = ϑ is the probability of the most popular item and α is positive exponential value less then unity. Let the users ask for K documents during time t: K(ν out, t) = Cν out t. () This result depends on aggregated bandwidth ν out, on time t and a constant C. The constant C from Eq. () is an inverse proportion of a mean size E(C) of documents received from the global network: C = E(C) (3) In Ref. [3] a number of received documents K is defined by request stream from a population of N users K(λ, N, t) = λnt, (4) where λ is average client request rate. Let p documents be unique and M be equal to quantity of documents that can be requested from the cache system as it has shown on the Fig.. Then an efficiency of the system or a hit ratio can be defined as H = k p M K = dx (5) xα

2 Figure : Scheme of the proxy cache the ratio of non-unique cacheable documents k p = k M x dx to their total number K. α Wolman et al. [3] examined steady-state or limiting performance of caching schemes. Their model of steady-state performance assumes that a cache can store all cacheable documents in the Web and there isn t any capacity misses in workload. The probability that a requested document is cacheable is p c, (k = p c K). With this assumptions the maximal rates of H is identical with p c, i.e. the ideal hit rate for cacheable documents H i = H/p c would approach 00%. key difference between the models presented by Breslau at al [3] and by Wolman et al [3] is that document rate of change has been incorporated into the model rather than assuming that documents are static. In order to describe this effect an additional multiplier has been included to a integral from Eq. (5): λnp i /(λnp i + µ), (6) where µ is an exponential parameter of interarrival times for object requests and updates, p i is proportional to /i α. This multiplier throws off one effective query of any document from cache during time T ch = /µ between its changes. Such an updating request must be redirected to the global network to get the renewed Web page. 3 The analytical laws and the special points n analytical model is constructed with a goal to predict behaviour of the investigated systems on the base of the analytical laws written in a mathematical form and to find ways for optimization. Mathematical constructions of computer models remind laws of the thermodynamics and the molecular physics in many respects. There are two directions of modeling: macroscopic and microscopic approaches. In the first case the corresponding laws are formulated for parameters describing cache systems as an Figure : Special points of cache system indivisible object. The following values should be considered as macroscopic parameters: hit ratio H, Zipf exponent α, the number of unique documents p, M, etc. The microscopic description assumes an analysis on a level of transmitting IP packets, of requests to the global network, i.e. huge number of the events. In this case investigators have to apply the theory of stochastic processes such as Poisson s distribution or Markov s chain. The main problem of this approach is a right interpretation of analytical results and their generalization, i.e in a limit passage from microscopic values to macrolaws. Usually the macroscopic dependencies operate with values that are measured directly. Unfortunately, corresponding laws are not yet found for the main part of the virtual world therefore a particular attention should be given to their search. Proxy cache is a pleasant exception to the general rule. Two types of correlations pretend to a role of fundamental laws described cache systems [5]: Zipf-like distribution, see Eq. () Normalizing conditions or a sum of the probability to request the universe of n k objects. Mentioned laws could be applied to the special points of Zipf distribution. s it is shown on the Fig. there are a few special points but only two of them, M and p, are used for construction of the theory. Then the Zipf-like distribution leads to k M α =, (7) k p α =. (8) Normalizing conditions for the first M and p documents from a cache give M x α dx = H i (9)

3 p dx = (0) xα Here H i is an ideal (steady-state) performance for cacheable documents. For a real system the Eq. (9) has been transformed to H = p c S k dx, () xα where S k is a number of cache objects requested repeatedly. Five Egs. (7-) allow to describe the basic effects, to predict parameters value, ways of optimization, etc. Modification of this system of five equations would lead to finding of new effects. 4 Elements of cache construction This section discusses which elements are compulsory for cache system. lso possible ratios between these elements should be investigated. Three main parts are distinguished in any cache system: kernel S k that contains popular documents with ϑ i. n accessory part S u that keeps unpopular documents requested from the Internet once, i.e. ϑ i =. managing part S m that contains statistics of requests and rules for replacement of cache objects. Now we can study mathematical correlations between cache elements S k, S u, S m. With help of the Eqs. (7, 8) p = /α M, () and with analyzing log files of proxy cache a mean lifetime t u can be calculated for those documents, which popularity is ϑ i =. Such a statistic determines also lifetime T eff of cache objects with a citing index ϑ i =, i.e. those items that have been stored in proxy cache, requested one time from a proxy and have been deleted subsequently. It is easy to see that a number of documents in a cache kernel S k is a value M(T eff ) corresponding to the statistic for time T eff, and S u depends on p, M, t u : S k = M(T eff ), (3) S u = p(t u ) M(t u ), (4) The following ratio between the part S k, S u has been found in Ref. [?] with help of Eqs. (), (): S k T eff = (5) S u ( /α )t u nother useful relation is given as a solution of a system of Eqs. (7,9) concerning variable M: M = ( α)h K (6) This means that only each 5th document should be stored in the cache among all documents requested from the global network (for typical values α 0.7, H 35%). The Eq. (5) gives a criteria for optimal using of a storage capacity. This criteria allows to plane an experiment: how does efficiently of cache replacement algorithm depend on correlation of the proxy parts? The analysis of log files from Samara State erospace University proxy [6] gives the equality T eff t u. It means that only 40% of storage capacity has been used as the kernel of the proxy cache. It should be noted this result as well as the experiment plan is the consequence of the theoretical study. 5 Steady-state performance In this section we examine steady-state or limiting performance of caching schemes. Wolman et al model [3] of steady-state performance assumes that a cache can store all cacheable documents in the Web and there aren t any capacity misses in the workload. With this assumption, they conceive that in the long term the hit rate H i for cacheable documents would approach 00%. However, considerable part of cacheable documents p M is requested from the global network only one time as it is shown on Fig. that illustrate Zipf-like distribution. More accurate expression for ideal hit ratio H i may be written after receiving correlation between p and k from system of Eqs.(8,0): k = p α, (7) which is used for experimental search of α. With help of Eqs.(,6) H i (α )/α, (8) that gives 80% for α = 0.75 or 84% for α = 0.8. The alternative expression for ideal hit ratio H i follows from Fig. : H i p M k = ( α)( /α ) (9) The hit rate H of web cache is considered to grow in a log-like fashion as a function of cache size [, 3, 4]. From analyzes of the Eq. () for cache performance the following dependence appears H H = ( S S that allows to talk about power fashion. ) α, (0)

4 6 Optimization of cache systems fine tuning of cache that increases hit ratios by only several percentage points would be equivalent to a several-fold increase in cache size. In order to determine an optimal cache size Kelly and Reeves [9] are guided on economical methods like monetary cost of memory and bandwidth. The aim of our theoretical investigation is a search of dependencies between cache size S = S k + S u and other macroscopic parameters like internal bandwidth ν int, maximum hit ratio H i, Zipf s exponent α, etc. s it is shown in Ref. [5] a ratio of effective size of cache system S eff to aggregated bandwidth of external links ν int can be considered as a constant: S eff ν int = τ. () Our goal is to calculate a lower limit τ(µ, α) when the performance mounts to the 35% level (H eff 35%) of well working system. Eqs.(8,9) give the following estimation for a real system with α 0.7, p c = 0.6: p c H i H eff 35% () Eqs.(9,) allow to calculate the correlation between documents number in a real cache kernel S k and a number M max corresponding to limiting performance H i : where S k = /((α )) M max (3) M max = ( α)p ch i ν out T ch (4) Parameter T ch = /µ u = 86 days is the time between renewal of unpopular documents [3]. If H eff = 0.35, then τ(µ u, α) = /α /((α )) α.6µ u. (5) It is easy to calculate τ = 6, 0 days for α = 0.8. Figure 3: The renewal effect The key formulas from Wolman et al. C N = C = n n ( Cx α + µcxα λn ) dx (6) dx (7) xα yield C N, the aggregate object hit ratio considering only cacheable objects. Document rates of change µ were considered to take two different values, one for popular documents µ p and another for unpopular documents µ u. In present paper we assume that the document rate of change µ(i) depends on its popularity i. Mathematical equivalent of this assertion is that the steady-state process is again described by Zipf distribution with a small α R as it is shown of Fig. 3. difference between limiting performance of a cache system and its real value has been conditioned by renewal of documents in the global network and can be investigated in an experimental way. We have to explore the log file collected for the time T st T eff from Eq. (3), so that M(T st ) S k. Then the ideal hit ratio H i corresponds to the upper line on Fig. 3 with exponent α, but the real hit ratio H determines α R as 7 Renewal of Web documents α R = M HK = p HK + p M (8) In the previous section we based our analysis on the model presented by Breslay et al [3] and extended by Wolman et al. [3] to incorporate document rate of change. The Wolman model yields formulas to predict steady-state properties of Web caching systems parameterized by population size N, population request rates λ, document rate of change µ, size of object universe n and a popularity distribution for objects. Now it is easy to find µ i µ(i) = ϑid i ϑ R i T st = (p/i)α (p/i) αr T st (9) It should be noted again that the experiment s plan is the consequence of the theoretical study. Finally, the system of Eqs. (7-) must be modernized by change of variables α on α R.

5 8 Discussion and feature work The aim of this paper is a theoretical study of a cache system in order to optimize proxy cache systems and to modernize construction principles. Two types of correlations, Zipf-like distribution and normalizing conditions, play a role of the fundamental laws. corresponding system of equations allows to describe the basic effects like ratio between construction parts, steady-state performance, optimal size, etc. modification of the fundamental laws leads to the new effect of documents renewal in the global network. The main result of any research of cache systems is finding a way for increasing hit ratio. Our theoretical study leads to the criteria for an optimal using of storage capacity. This criteria allows to plane several experiment on the base of the mathematical analysis. In order to find a ratio between the parts of cache construction we analyze the cache log files [6]. The mean lifetime t u has been calculated for those documents, which popularity is ϑ i =. Such statistics determine also the lifetime T eff for cache objects with the citing index ϑ i =, i.e. those items that have been stored in proxy cache, requested one time from the proxy, and deleted subsequently. nalysis of the experimental data leads to the facts that variables t u and T eff can be considered as coincided values. In other words the kernel and the accessory part are approximately correlated as 40:60 or only 40% of storage capacity is used for the basic goal of storing repeatedly requested documents. We see the two basic directions for increasing hit ratio. The first conjecture is the hit rate H increases with growth of S k /S u. The second one is based on the general feature of the existing cache algorithms that the only documents requested two times and more during the time t u are included in the kernel S k. Therefore we conclude that caching algorithm based on the rigid tie of the main cache parameters to the time t u is low effective. Our approach is to separate the requests statistics from the time t u, i.e. cache system operates with controlling information collected for the period longer then t u. The current situation can be resolved with the new construction principles for cache systems. Those principles are suggested in [7]. The most important one is that fixed ratio between cache parts must be guaranteed. The statistics of requests must be kept for long time for all cacheable documents including delayed ones. n inseparable part of the new construction is the replacement algorithm based on Zipf law. t this time we have prepared the corresponding application for an international patent. in: IEEE International Conference in Parallel and Distributed Information Systems, Miami Beach, Florida, US, December, 996 [] V. lmeida, M. Cesirio, R. Canado, W. Junior, C. Murta, nalyzing the behavior of a proxy server in the light of regional and cultural issues, 3rd International WWW Caching Workshop, Manchester, England, June 998 [3] L. Breslau, P. Cao, L. Fan, G. Phillips, S. Shenker, Web Caching and Zipf-like Distribution: Evidence and Implications, in: IEEE Infocom, vol. XX, no. V, 999, pp. -9 [4] P. Cao, S. Irani, Cost-aware WWW-proxy caching algoritms, Proceedings of the USENIX Symposium on Internet technology and Systems, December 997, pp [5] D.G. Dolgikh,.M. Sukhov, Parameters of cache system based on a Zipf-like distribution, Computer Networks, 37(6), 00, pp.7-76 [6] D. Dolgikh,. Sukhov, The measurements, parameters and construction of Web proxy cache, submitted to 7th International Workshop on Web Content Caching and Distribution (WCW), ddolgikh/constparameters.pdf [7] D. Dolgikh,. Sukhov, New principles of Web cache construction, submitted to HotNets-I0, ddolgikh/cachepatent.pdf [8] S. Gadge, J. Chase, M. Rabinovich, Web caching and content distribution: a view from interior, Computer Communications, 4(), 00, pp. -3 [9] T. Kelly, D. Reeves, Optimal Web cache sizing: scalable method for exact solutions, Computer Communications, 4(), 00, pp [0] N. Nishikawa, T. Hosokawa, Ya. Mori, K. Yoshidab, H. Tsujia, Memory-based architecture for distributed WWW caching proxy, in: The 7th WWW Conference, pril 998 [] M. Ripeanu, I. Foster,. Iamnitchi, Mapping the Gnutella Network: Properties of Large Scale Peerto-Peer Systems and Implications for System Design, matei/ppers/ic.ps [] K. Sripanidculchai, The popularity of Gnutella queries and its implications on scalability, February 00, kunwadee/research/pp/ gnutella.html [3]. Wolman, G. Voelker, N. Sharma, N. Cardwell,. Karlin, H. Levy, On the scale and performance of cooperative Web proxy caching, Operating Systems Review, 34(5), Dec.999, pp.6-3 [4] G.K. Zipf, Relativity frequency as a determinant of phonetic change, Reprinted from the Harvard Studies in Classical Philology, Vol. XL, 99 References [] V. lmeida,. Bestavros, M. Crovella, and. De Oliveira, Characterizing reference locality in the WWW,

arxiv:cs/ v1 [cs.ni] 18 Mar 2003

arxiv:cs/ v1 [cs.ni] 18 Mar 2003 The measurements, parameters and construction of Web proxy cache Dmitry Dolgikh arxiv:cs/030302v [cs.ni] 8 Mar 2003 Samara State Aerospace University, Moscovskoe sh. 34a, Samara, 443086, Russia Andrei

More information

Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling

Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling Di Xiao, Xiaoyong Li, Daren B.H. Cline, Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering

More information

Maximizing Data Locality in Distributed Systems

Maximizing Data Locality in Distributed Systems Maximizing Data Locality in Distributed Systems Fan Chung a, Ronald Graham a, Ranjita Bhagwan b,, Stefan Savage a, Geoffrey M. Voelker a a Department of Computer Science and Engineering University of California,

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

Stochastic Fluid Models for Cache Clusters

Stochastic Fluid Models for Cache Clusters Stochastic Fluid Models for Cache Clusters Florence Clévenot, Philippe Nain INRIA, BP 93, 692 Sophia Antipolis, France. Keith W. Ross Polytechnic University, Six MetroTech Center, Brooklyn, NY 1121, USA

More information

On Allocating Cache Resources to Content Providers

On Allocating Cache Resources to Content Providers On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource

More information

ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT

ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT (The 4th New York Metro Area Networking Workshop, New York City, Sept. 2004) ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT Ibrahim Hökelek 1, Mariusz A. Fecko 2, M. Ümit Uyar 1

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Understanding Sharded Caching Systems

Understanding Sharded Caching Systems Understanding Sharded Caching Systems Lorenzo Saino l.saino@ucl.ac.uk Ioannis Paras i.psaras@ucl.ac.uk George Pavlov g.pavlou@ucl.ac.uk Department of Electronic and Electrical Engineering University College

More information

Age-Optimal Constrained Cache Updating

Age-Optimal Constrained Cache Updating 17 IEEE International Symposium on Information Theory (ISIT) -Optimal Constrained Cache Updating Roy D. Yates, Philippe Ciblat, Aylin Yener, Michèle Wigger Rutgers University, USA, ryates@winlab.rutgers.edu

More information

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast 1 / 24 Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast 1, Benny Van Houdt 2 ITC 2016 September 13-15, Würzburg, Germany 1 Inria 2

More information

On the Response Time of Large-scale Composite Web Services

On the Response Time of Large-scale Composite Web Services On the Response Time of Large-scale Composite Web Services Michael Scharf Institute of Communication Networks and Computer Engineering (IKR) University of Stuttgart, Pfaffenwaldring 47, 70569 Stuttgart,

More information

Optimal Geographical Caching in Heterogeneous Cellular Networks

Optimal Geographical Caching in Heterogeneous Cellular Networks 1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous

More information

Prioritized Garbage Collection Using the Garbage Collector to Support Caching

Prioritized Garbage Collection Using the Garbage Collector to Support Caching Prioritized Garbage Collection Using the Garbage Collector to Support Caching Diogenes Nunez, Samuel Z. Guyer, Emery D. Berger Tufts University, University of Massachusetts Amherst November 2, 2016 D.

More information

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 Today we ll talk about a topic that is both very old (as far as computer science

More information

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science Response Time in Data Broadcast Systems: Mean, Variance and Trade-O Shu Jiang Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 7784-11, USA Email: fjiangs,vaidyag@cs.tamu.edu

More information

Approximate Analysis of LRU in the Case of. Short Term Correlations

Approximate Analysis of LRU in the Case of. Short Term Correlations Approximate Analysis of LRU in the Case of Short Term Correlations Antonis Panagakis, Athanasios Vaios, and Ioannis Stavrakakis Dept. of Informatics & Telecommunications National & Kapodistrian University

More information

Weighted Bloom Filter

Weighted Bloom Filter Weighted Bloom Filter Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Department of Electrical Engineering, California Institute of Technology. bruck@paradise.caltech.edu. Department of Computer Science,

More information

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Mostafa Dehghan 1, Weibo Chu 2, Philippe Nain 3, Don Towsley 1 1 University of Massachusetts, Amherst, USA 2 Northwestern Polytechnical

More information

Network Traffic Characteristic

Network Traffic Characteristic Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Homework 4 due on Thursday, December 15 at 5 PM (hard deadline).

Homework 4 due on Thursday, December 15 at 5 PM (hard deadline). Large-Time Behavior for Continuous-Time Markov Chains Friday, December 02, 2011 10:58 AM Homework 4 due on Thursday, December 15 at 5 PM (hard deadline). How are formulas for large-time behavior of discrete-time

More information

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic Hybrid Systems: Applications to Communication Networks research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Deterministic

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

Near-optimal policies for broadcasting files with unequal sizes

Near-optimal policies for broadcasting files with unequal sizes Near-optimal policies for broadcasting files with unequal sizes Majid Raissi-Dehkordi and John S. Baras Institute for Systems Research University of Maryland College Park, MD 20742 majid@isr.umd.edu, baras@isr.umd.edu

More information

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems On Stability and Sojourn Time of Peer-to-Peer Queuing Systems Taoyu Li Minghua Chen Tony Lee Xing Li Tsinghua University, Beijing, China. {ldy03@mails.tsinghua.edu.cn,xing@cernet.edu.cn} The Chinese University

More information

Modelling data networks stochastic processes and Markov chains

Modelling data networks stochastic processes and Markov chains Modelling data networks stochastic processes and Markov chains a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online

More information

An Architecture for a WWW Workload Generator. Paul Barford and Mark Crovella. Boston University. September 18, 1997

An Architecture for a WWW Workload Generator. Paul Barford and Mark Crovella. Boston University. September 18, 1997 An Architecture for a WWW Workload Generator Paul Barford and Mark Crovella Computer Science Department Boston University September 18, 1997 1 Overview SURGE (Scalable URL Reference Generator) is a WWW

More information

Modelling data networks stochastic processes and Markov chains

Modelling data networks stochastic processes and Markov chains Modelling data networks stochastic processes and Markov chains a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) November 2016 Available online

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming

Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Min Dai Electrical Engineering, Texas A&M University Dmitri Loguinov Computer Science, Texas A&M University

More information

THE CACHE INFERENCE PROBLEM

THE CACHE INFERENCE PROBLEM THE CACHE INFERENCE PROBLEM and its Application to Content and Request Routing NIKOLAOS LAOUTARIS yz GEORGIOS ZERVAS y AZER BESTAVROS y GEORGE KOLLIOS y nlaout@cs.bu.edu zg@cs.bu.edu best@cs.bu.edu gkollios@cs.bu.edu

More information

An Improved Frequent Items Algorithm with Applications to Web Caching

An Improved Frequent Items Algorithm with Applications to Web Caching An Improved Frequent Items Algorithm with Applications to Web Caching Kevin Chen and Satish Rao UC Berkeley Abstract. We present a simple, intuitive algorithm for the problem of finding an approximate

More information

Introduction to Randomized Algorithms III

Introduction to Randomized Algorithms III Introduction to Randomized Algorithms III Joaquim Madeira Version 0.1 November 2017 U. Aveiro, November 2017 1 Overview Probabilistic counters Counting with probability 1 / 2 Counting with probability

More information

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions Keqiang Wu David J. Lilja Haowei Bai Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455,

More information

BS-assisted Task Offloading for D2D Networks with Presence of User Mobility

BS-assisted Task Offloading for D2D Networks with Presence of User Mobility BS-assisted Task Offloading for D2D Networks with Presence of User Mobility Ghafour Ahani and Di Yuan Department of Information Technology Uppsala University, Sweden Emails:{ghafour.ahani, di.yuan}@it.uu.se

More information

Asymptotics for Polling Models with Limited Service Policies

Asymptotics for Polling Models with Limited Service Policies Asymptotics for Polling Models with Limited Service Policies Woojin Chang School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205 USA Douglas G. Down Department

More information

Driving Cache Replacement with ML-based LeCaR

Driving Cache Replacement with ML-based LeCaR 1 Driving Cache Replacement with ML-based LeCaR Giuseppe Vietri, Liana V. Rodriguez, Wendy A. Martinez, Steven Lyons, Jason Liu, Raju Rangaswami, Ming Zhao, Giri Narasimhan Florida International University

More information

On Content Indexing for Off-Path Caching in Information-Centric Networks

On Content Indexing for Off-Path Caching in Information-Centric Networks On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

On Incentivizing Caching for P2P-VoD Systems

On Incentivizing Caching for P2P-VoD Systems NetEcon'212 1569557885 On Incentivizing Caching for P2P-VoD Systems Weijie Wu, Richard T.B. Ma + and John C.S. Lui The Chinese University of Hong Kong National University of Singapore + Advanced Digital

More information

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic Hybrid Systems: Applications to Communication Networks research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Talk

More information

Cacheable Web Objects: Understanding Their Modification Times

Cacheable Web Objects: Understanding Their Modification Times Cacheable Web Objects: Understanding Their Modification Times Matthias Vallentin vallentin@cs.berkeley.edu December 9, 2010 Caching forms an integral part of the Internet to avoid duplicate object transfers

More information

Free-Riding Analysis of BitTorrent-like Peer-to-Peer Networks

Free-Riding Analysis of BitTorrent-like Peer-to-Peer Networks Free-Riding Analysis of BitTorrent-like Peer-to-Peer Networks Jiadi Yu, Minglu Li, Feng Hong, and Guangtao Xue Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 23,

More information

Stochastic fluid models for cache clusters

Stochastic fluid models for cache clusters Performance Evaluation 59 (2005) 1 18 Stochastic fluid models for cache clusters Florence Clévenot a, Philippe Nain a,, Keith W. Ross b a INRIA, BP 93, 06902 Sophia Antipolis, France b Polytechnic University,

More information

Random Walk Based Algorithms for Complex Network Analysis

Random Walk Based Algorithms for Complex Network Analysis Random Walk Based Algorithms for Complex Network Analysis Konstantin Avrachenkov Inria Sophia Antipolis Winter School on Complex Networks 2015, Inria SAM, 12-16 Jan. Complex networks Main features of complex

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS. S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974

THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS. S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974 THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS by S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT This note describes a simulation experiment involving

More information

Exact Analysis of TTL Cache Networks

Exact Analysis of TTL Cache Networks Exact Analysis of TTL Cache Networks Daniel S. Berger, Philipp Gland, Sahil Singla, and Florin Ciucu IFIP WG 7.3 Performance October 7, 2014 Classes of Caching Classes of Caches capacity-driven eviction

More information

DataGRID. Document identifier: EDMS id: Date: July 24, Work package: Partner(s): Lead Partner: Document status: File:

DataGRID. Document identifier: EDMS id: Date: July 24, Work package: Partner(s): Lead Partner: Document status: File: DataGRID PRELIMINARY EVALUATION OF REVENUE PREDICTION FUNCTIONS FOR Document identifier: DataGrid-02-TED-020724 EDMS id: 358809 Work package: Partner(s): Lead Partner: Document status: Author(s): File:

More information

Real-Time Status Updating: Multiple Sources

Real-Time Status Updating: Multiple Sources Real-Time Status Updating: Multiple Sources Roy D. Yates WINLAB, ECE Dept. Rutgers University email: ryates@winlab.rutgers.edu Sanjit Kaul IIIT-Delhi email: skkaul@iiitd.ac.in Abstract We examine multiple

More information

A novel algorithm for dynamic admission control of elastic flows

A novel algorithm for dynamic admission control of elastic flows A novel algorithm for dynamic admission control of elastic flows Franco Blanchini, Daniele Casagrande and Pier Luca Montessoro Abstract The task of assigning part of the forwarding capability of a router

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

Link Models for Packet Switching

Link Models for Packet Switching Link Models for Packet Switching To begin our study of the performance of communications networks, we will study a model of a single link in a message switched network. The important feature of this model

More information

Paging with Multiple Caches

Paging with Multiple Caches Paging with Multiple Caches Rahul Vaze School of Technology and Computer Science Tata Institute of Fundamental Research Email: vaze@tcs.tifr.res.in Sharayu Moharir Department of Electrical Engineering

More information

ARMA based Popularity Prediction for Caching in Content Delivery Networks

ARMA based Popularity Prediction for Caching in Content Delivery Networks ARMA based Popularity Prediction for Caching in Content Delivery Networks Nesrine Ben Hassine, Ruben Milocco, Pascale Minet Inria Paris, 2 rue Simone Iff, CS 422, 75589 Paris Cedex 2, France Email: nesrine.ben-hassine@inria.fr,

More information

Chapter 3 Balance equations, birth-death processes, continuous Markov Chains

Chapter 3 Balance equations, birth-death processes, continuous Markov Chains Chapter 3 Balance equations, birth-death processes, continuous Markov Chains Ioannis Glaropoulos November 4, 2012 1 Exercise 3.2 Consider a birth-death process with 3 states, where the transition rate

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

2DI90 Probability & Statistics. 2DI90 Chapter 4 of MR

2DI90 Probability & Statistics. 2DI90 Chapter 4 of MR 2DI90 Probability & Statistics 2DI90 Chapter 4 of MR Recap - Random Variables ( 2.8 MR)! Example: X is the random variable corresponding to the temperature of the room at time t. x is the measured temperature

More information

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions Electronic Notes in Theoretical Computer Science Vol. 85 No. 4 (2003) URL: http://www.elsevier.nl/locate/entsc/volume85.html Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

More information

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion

More information

Cache-based Query Processing for the Boolean Retrieval Model

Cache-based Query Processing for the Boolean Retrieval Model Association for Information Systems AIS Electronic Library (AISeL) ECIS 2000 Proceedings European Conference on Information Systems (ECIS) 2000 Cache-based Query Processing for the Boolean Retrieval Model

More information

6 Solving Queueing Models

6 Solving Queueing Models 6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will

More information

FPGA Implementation of a Predictive Controller

FPGA Implementation of a Predictive Controller FPGA Implementation of a Predictive Controller SIAM Conference on Optimization 2011, Darmstadt, Germany Minisymposium on embedded optimization Juan L. Jerez, George A. Constantinides and Eric C. Kerrigan

More information

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in

More information

Resource Allocation and Pricing. R. Srikant University of Illinois

Resource Allocation and Pricing. R. Srikant University of Illinois Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo

More information

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we

More information

ECE 571 Advanced Microprocessor-Based Design Lecture 10

ECE 571 Advanced Microprocessor-Based Design Lecture 10 ECE 571 Advanced Microprocessor-Based Design Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 23 February 2017 Announcements HW#5 due HW#6 will be posted 1 Oh No, More

More information

Fast Distributed Algorithm for Replication in Unstructured P2P Networks

Fast Distributed Algorithm for Replication in Unstructured P2P Networks Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Bachelor s Program in Computer Science Bachelor s thesis Fast Distributed Algorithm for Replication in Unstructured

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

PRELIMINARY STUDY OF GROUND MOTION CHARACTERISTICS IN FURUKAWA DISTRICT, JAPAN, BASED ON VERY DENSE SEISMIC-ARRAY-OBSERVATION

PRELIMINARY STUDY OF GROUND MOTION CHARACTERISTICS IN FURUKAWA DISTRICT, JAPAN, BASED ON VERY DENSE SEISMIC-ARRAY-OBSERVATION Proceedings of the International Symposium on Engineering Lessons Learned from the 2011 Great East Japan Earthquake, March 1-4, 2012, Tokyo, Japan PRELIMINARY STUDY OF GROUND MOTION CHARACTERISTICS IN

More information

1 Modelling and Simulation

1 Modelling and Simulation 1 Modelling and Simulation 1.1 Introduction This course teaches various aspects of computer-aided modelling for the performance evaluation of computer systems and communication networks. The performance

More information

Design Patterns part I. Design Patterns part I 1/32

Design Patterns part I. Design Patterns part I 1/32 Design Patterns part I Design Patterns part I 1/32 Design Patterns part I 2/32 History Design Patterns: are derived from design patterns from architecture their name was introduced to the software engineering

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Mining Data Streams. The Stream Model. The Stream Model Sliding Windows Counting 1 s

Mining Data Streams. The Stream Model. The Stream Model Sliding Windows Counting 1 s Mining Data Streams The Stream Model Sliding Windows Counting 1 s 1 The Stream Model Data enters at a rapid rate from one or more input ports. The system cannot store the entire stream. How do you make

More information

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours. UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next

More information

Multiclass P2P Networks: Static Resource Allocation for Service Differentiation and Bandwidth Diversity

Multiclass P2P Networks: Static Resource Allocation for Service Differentiation and Bandwidth Diversity Multiclass P2P Networks: Static Resource Allocation for Service Differentiation and Bandwidth Diversity Florence Clévenot-Perronnin Philippe Nain Keith W. Ross Abstract We propose a multiclass fluid model

More information

Agreement algorithms for synchronization of clocks in nodes of stochastic networks

Agreement algorithms for synchronization of clocks in nodes of stochastic networks UDC 519.248: 62 192 Agreement algorithms for synchronization of clocks in nodes of stochastic networks L. Manita, A. Manita National Research University Higher School of Economics, Moscow Institute of

More information

SAMPLING AND INVERSION

SAMPLING AND INVERSION SAMPLING AND INVERSION Darryl Veitch dveitch@unimelb.edu.au CUBIN, Department of Electrical & Electronic Engineering University of Melbourne Workshop on Sampling the Internet, Paris 2005 A TALK WITH TWO

More information

ArcGIS Enterprise: What s New. Philip Heede Shannon Kalisky Melanie Summers Sam Williamson

ArcGIS Enterprise: What s New. Philip Heede Shannon Kalisky Melanie Summers Sam Williamson ArcGIS Enterprise: What s New Philip Heede Shannon Kalisky Melanie Summers Sam Williamson ArcGIS Enterprise is the new name for ArcGIS for Server What is ArcGIS Enterprise ArcGIS Enterprise is powerful

More information

Summarizing Measured Data

Summarizing Measured Data Summarizing Measured Data 12-1 Overview Basic Probability and Statistics Concepts: CDF, PDF, PMF, Mean, Variance, CoV, Normal Distribution Summarizing Data by a Single Number: Mean, Median, and Mode, Arithmetic,

More information

Optimal Content Placement and Request Dispatching for Cloud-based Video Distribution Services

Optimal Content Placement and Request Dispatching for Cloud-based Video Distribution Services International Journal of Automation and Computing 13(6), December 2016, 529-540 DOI: 10.1007/s11633-016-1025-z Optimal Content Placement and Request Dispatching for Cloud-based Video Distribution Services

More information

Symmetric Pivoting in ScaLAPACK Craig Lucas University of Manchester Cray User Group 8 May 2006, Lugano

Symmetric Pivoting in ScaLAPACK Craig Lucas University of Manchester Cray User Group 8 May 2006, Lugano Symmetric Pivoting in ScaLAPACK Craig Lucas University of Manchester Cray User Group 8 May 2006, Lugano Introduction Introduction We wanted to parallelize a serial algorithm for the pivoted Cholesky factorization

More information

Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems

Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems Bin Fan Dept. of Computer Science & Eng. The Chinese University of Hong Kong Email: bfan@cse.cuhk.edu.hk Dah-Ming Chiu Dept.

More information

Optimal scaling of average queue sizes in an input-queued switch: an open problem

Optimal scaling of average queue sizes in an input-queued switch: an open problem DOI 10.1007/s11134-011-9234-1 Optimal scaling of average queue sizes in an input-queued switch: an open problem Devavrat Shah John N. Tsitsiklis Yuan Zhong Received: 9 May 2011 / Revised: 9 May 2011 Springer

More information

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathan Turner Washington University jon.turner@wustl.edu January 30, 2008 Abstract Crossbar-based switches are commonly used

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Content Caching and Delivery over Heterogeneous Wireless Networks

Content Caching and Delivery over Heterogeneous Wireless Networks Content Caching and Delivery over Heterogeneous Wireless Networks Jad Hachem University of California, Los Angeles Email: jadhachem@uclaedu khil Karamchandani Indian Institute of Technology, Bombay Email:

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.262 Discrete Stochastic Processes Midterm Quiz April 6, 2010 There are 5 questions, each with several parts.

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

About the physical quantity the Planck s momentum

About the physical quantity the Planck s momentum About the physical quantity the Planck s momentum Yusupov R A dialectical materialist, free researcher YRA academy, Virtual university laboratory of dialectical materialism, physics and cosmology 690018,

More information

Solutions to Homework Discrete Stochastic Processes MIT, Spring 2011

Solutions to Homework Discrete Stochastic Processes MIT, Spring 2011 Exercise 6.5: Solutions to Homework 0 6.262 Discrete Stochastic Processes MIT, Spring 20 Consider the Markov process illustrated below. The transitions are labelled by the rate q ij at which those transitions

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Max Percentile Replication for Peer-based VoD Systems

Max Percentile Replication for Peer-based VoD Systems Max Percentile Replication for Peer-based VoD Systems Yuval Rochman Tel-Aviv University Tel Aviv, Israel Email: yuvalroc@gmail.com Hanoch Levy Tel-Aviv University Tel Aviv, Israel Email: hanoch@cs.tau.ac.il

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] A unified approach to the performance analysis of caching systems Original Citation: Martina V.; Garetto M.;Leonardi E. (214). A unified

More information

Latency analysis for Distributed Storage

Latency analysis for Distributed Storage Latency analysis for Distributed Storage Parimal Parag Archana Bura Jean-François Chamberland Electrical Communication Engineering Indian Institute of Science Electrical and Computer Engineering Texas

More information