Estimating Internal Link Loss Rates Using Active Network Tomography

Size: px
Start display at page:

Download "Estimating Internal Link Loss Rates Using Active Network Tomography"

Transcription

1 Estimating Internal Link Loss Rates Using Active Network Tomography by Bowei Xi A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Statistics) in The University of Michigan 2004 Doctoral Committee: Associate Professor George Michailidis, Co-Chair Professor Vijayan N. Nair, Co-Chair Associate Professor Jeffrey A. Fessler Assistant Professor Kerby Shedden

2

3 c Bowei Xi 2004 All Rights Reserved

4 To my parents ii

5 ACKNOWLEDGEMENTS I am greatly indebted to my advisors, Professor George Michailidis and Professor Vijayan N. Nair, for guiding me through my Ph.D program. I have learned a lot from them. This will help me throughout my career. I would also like to thank my committee members, Professors Kerby Shedden and Jeffrey A. Fessler. I am especially grateful to Professor Shedden for answering many questions on programming and computations, and for his valuable advice. Last but not least, I thank my parents for their unwavering support during these five years. I feel fortunate that I followed their advice to pursue a Ph.D degree five years ago. iii

6 TABLE OF CONTENTS DEDICATION ACKNOWLEDGEMENTS ii iii LIST OF FIGURES vi CHAPTER I. Introduction Motivation of Network Tomography Literature Review Recovery of Path-Level Information Estimating Network Internal Characteristics Topology Identification Overview II. Modeling Framework Framework and Notation Stochastic Model Probing Schemes Pure Bicast Experiments for Binary Trees Bicast Experiments for General Trees and Other Topologies k cast Schemes Identifiability Single-Source Topology Identifiability Condition Multi-Source Topology Identifiability Condition III. Statistical Inference Maximum Likelihood Estimation and Properties Bicast Experiment for Single-Source Topology k cast Experiment for Single-Source or Multi-Source Topology Regression Framework A Linear Model Formulation Least Squares Estimation Methods Distributed Algorithm Bicast Projections IV. Performance and Design Issues Efficiency Study of Bicast Experiment Optimal Allocation of Probes iv

7 4.1.2 Efficiency Comparisons with Multicast Schemes Efficiency Study on Multi-Source Topology Performance Evaluation of OLS, GLS and IRWLS Finite Sample Performance Asymptotic Efficiency Considerations NS-2 Simulation CBR Background Traffic TCP Background Traffic V. Summary and Future Work BIBLIOGRAPHY v

8 LIST OF FIGURES Figure I.1 A Small Network I.2 A 4 Node Network I.3 A Tree Topology I.4 Back-to-Back Unicast Probing Scheme I.5 A Sandwich Probe II.1 A General Tree Topology II.2 3-Layer Symmetric Binary Tree II.3 General Binary Tree II.4 A General Tree Topology For Which A Pure Bicast Experiment Suffices To Estimate The Link Loss Rates II.5 Cases 1 and 2 of the sufficiency of Proposition II II.6 Demonstration of (2.6)-(2.7) II.7 A Single Source Acyclic Graph Topology II.8 The Corresponding Multicast Tree for The Single Source Acyclic Graph Topology. 27 II.9 A Multi-source Network Topology II.10 Topology for counter example to Proposition II III.1 Convergence of the Log-Likelihood Function III.2 Convergence of Selected ˆα for A 3-Layer Tree III.3 Number of EM iterations for a 3-layer tree as a function of the success probability. 37 III.4 A Reduced Tree III.5 Reduced Tree for 2, 6, III.6 Subtree Covered by 2, 6, vi

9 III.7 Left: The Subtree Covered by Unicast; Right: The Corresponding Reduced Tree. 54 III III III.10 2 Layer Tree IV.1 A 4 Layer Symmetric Binary Tree IV.2 IV.3 Efficiency comparison between a min experiment and a min + 1 experiment on a 3 Layer symmetric binary tree with α 2 = α 3 = P 1 and all others equal to P Efficiency comparison between a min experiment and a- min + 1 experiment on a 4 layer symmetric binary tree with equal loss rates IV.4 Variances of the MLEs for selected links in a 3-layer tree with equal loss rates (= P ). 89 IV.5 IV.6 IV.7 IV.8 IV.9 IV.10 IV.11 D-optimal allocations for the min + 1 bicast scheme for a 3-layer symmetric tree with α 2 = α 3 = P 2 and all others equal to P A-optimal allocations for the min + 1 bicast scheme for a 3-layer symmetric tree with α 2 = α 3 = P 2 and all others equal to P Efficiency comparison between the uniform allocation and the optimal allocation for a min + 1 experiment on a 3-layer symmetric tree with α 2 = α 3 = P 1 and all others equal to P Efficiency comparison between the uniform allocation and the optimal allocation for a min + 1 experiment on a 4-layer symmetric tree with equal loss rates A-optimal allocation for a 4-layer tree with equal loss rates (= P ) for all links. Left panel corresponds to the total allocation for the nodes that split at layer L 3 and right panel to those that split at layer L A-optimal allocation restricted to internal links only for a 4-layer tree. Equal values of loss rates (= P ). Left panel shows total allocation for nodes splitting at layer L 3 and right for nodes splitting at layer L Ratio of variances of MLEs under min + 1 and multicast schemes for a 4-layer tree with α 1 = α 8 = = α 15 =.95 and α 2 = = α 7 = P. Left panel: node 2; Right panel: node IV.12 Multi-Source Topology Used for Efficiency Study IV.13 Probe allocations for multi-source topology for the experiment C 1 with α(s 2, I 3 ) = α(i 2, I 3 ) = α(i 3, R 4 ) = α(i 2, R 3 ) = P 2 and the rest equal to P 1. Left panel: A-optimal allocation. Right panel: D-optimal allocation IV.14 Probe allocations for multi-source topology for the experiment C 2 with α(i 2, R 2 ) = α(i 2, R 3 ) = P 2 and the rest equal to P 1. Left panel: A-optimal allocation. Right panel: D-optimal allocation vii

10 IV.15 Ratio of variances of ˆα GLS/IRWLS (I 2, R 3 ) under experiment C 1 and C 2. α(i 2, R 2 ) = α(i 2, R 3 ) = P 2 and the rest equal to P 1. Left panel: Using A-optimal allocation. Right panel: Using D-optimal allocation IV.16 IV.17 Boxplots of Manhattan distances between the true link loss probability vector and its LS, GLS and IRWLS estimates for a 4-layer tree topology. The 4 panels correspond to 1000 probe packets with all the link success probabilities set equal to.7,.8,.95 and.9 respectively Boxplots of Manhattan distances between the true link loss probability vector and its LS, GLS and IRWLS estimates for a 4-layer tree topology. The 4 panels correspond to 10,000 probe packets with all the link success probabilities set equal to.7,.8,.95 and.9 respectively IV.18 Boxplots of selected elements of α. The success probabilities equal IV.19 Boxplots of selected elements of α. The success probabilities equal IV.20 IV.21 IV.22 IV.23 IV.24 IV.25 IV.26 IV.27 IV.28 IV.29 IV.30 Boxplots of MSE for OLS, GLS and IRWLS estimates of α with α i =.85 based on R cast measurements with a total sample size of 12,000 probes Boxplots of MSE for OLS, GLS and IRWLS estimates of α with α i =.85 based on R cast measurements with a total sample size of 12,000 probes and processing the data using the minimum bicast projection scheme Boxplots of MSE for OLS, GLS and IRWLS estimates of α with α i =.85 and total sample size 12, Boxplots of MSE for OLS, GLS and IRWLS estimates of α with α i =.55 and total sample size 4, Ratios of variances (in log-scale) for select elements of α and for different successful transmission probabilities Ratios of variances (in log-scale) for select elements of α and for different successful transmission probabilities Ratios of determinants of variance-covariance matrices (in log-scale) for different successful transmission probabilities Variance ratios of LS to GLS estimates for the FBP scheme for different links of a 4-layer tree topology, for different successful transmission probabilities Variance ratios for different links of a 4-layer tree topology, for different successful transmission probabilities. The symbol corresponds to the FBP scheme, while the to the MBP one Variance ratios (in log-scale) for different links of a 4-layer tree topology, for different successful transmission probabilities. The symbol corresponds to the R cast scheme, while the to the FBP one Variance ratios of GLS for a minimal collection of independent bicast schemes to those of the MBP scheme for different links of a 4-layer tree topology, for different successful transmission probabilities viii

11 IV.31 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 0-1 of the 3 Layer Symmetric Binary Tree with CBR Background Traffic IV.32 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-2 of the 3 Layer Symmetric Binary Tree with CBR Background Traffic IV.33 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 2-4 of the 3 Layer Symmetric Binary Tree with CBR Background Traffic IV.34 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-7 of the 3 Layer Symmetric Binary Tree with CBR Background Traffic IV.35 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 0-1 of the 3 Layer Symmetric Binary Tree with TCP Background Traffic IV.36 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-2 of the 3 Layer Symmetric Binary Tree with TCP Background Traffic IV.37 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 2-4 of the 3 Layer Symmetric Binary Tree with TCP Background Traffic IV.38 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-7 of the 3 Layer Symmetric Binary Tree with TCP Background Traffic IV.39 3 Layer Asymmetric Topology Used in the NS-2 Simulation IV.40 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 0-1 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.41 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-2 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.42 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-3 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.43 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-4 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.44 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-5 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.45 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-6 of the 3 Layer Asymmetric Tree with TCP Background Traffic IV.46 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 0-1 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic IV.47 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-2 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic IV.48 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 1-3 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic ix

12 IV.49 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 2-4 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic IV.50 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 3-7 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic IV.51 Tracking the Actual Loss (Dashed Line) by Inferred Loss (Solid Line) for Link 5-10 of the 4 Layer Symmetric Binary Tree with TCP Background Traffic x

13 CHAPTER I Introduction 1.1 Motivation of Network Tomography Modern networks are multi-layered, distributed systems that are loosely controlled. The largest of all is the Internet, and its structure can be described as follows. On the edge, there are local area networks (LAN) which are connected to wide area networks (WAN). WANs are further connected to the backbone. Figure I.1 is an example of a small LAN. The large number and variety of service providers has allowed modern networks to expand rapidly and independently. But this has also made performance assessment and monitoring efforts difficult. Numerous user applications have been developed for modern networks. They can be broadly classified into two categories: time-sensitive applications and timeinsensitive ones. Time-sensitive applications, such as voice over IP (VOIP), require extremely high quality links, while time-insensitive applications, such as , allow for the retransmission of corrupted messages. Different levels of service quality are required by different user applications. Hence performance assessment and network monitoring are critical to support the vast variety of user applications and for the service providers to meet the service level agreements. Tools have been developed to discover network connectivity structure, available 1

14 2 Figure I.1: A Small Network bandwidth of links, and other performance characteristics. (Refer to CAIDA ([4]) for more information). Despite these efforts, large scale quantitative network performance assessment is still very difficult, and the expectation of full cooperation of routers is unrealistic in most situations. Service providers (SPs) are capable of directly collecting measurements at the routers within their own network. The associated price is a heavy overhead of extra computing, communication and hardware support. This is impractical for very fast and/or heavily loaded networks. Moreover network traffic usually generates huge amount of data, and analyzing such data is not a trivial task. It is helpful for a SP to gather information from a network connected to its own network but not under its control. But SPs who do not own the network cannot get access to the internal routes to collect information such as traffic rates, individual link delays, available bandwidth.

15 3 These difficulties and challenges call for efficient data collection and analysis techniques that can be used by everyone. This is the motivation for the research on active network tomography. 1.2 Literature Review There are three directions in network tomography: recovery of path-level information, topology identification, and estimation of network internal characteristics. The first direction formulates the problem from a service provider s perspective while the other two assume little or no help from the network internal devices (routers etc.). A more detailed discussion of these three directions follows Recovery of Path-Level Information Vardi (1996) was one of the first to formulate the problem and coined the term network tomography. The term tomography arises from the connection to the inverse problem in medical tomography. For example, in positive emission tomography, counts of photons are collected from tubes attached to an experiment subject s head and the intensity of brain activities is estimated from the counts. Similarly in the network tomography problem considered by Vardi (1996), the measurements are aggregated incoming and outgoing traffic counts measured at the nodes of the network. The objective is to estimate (recover) the traffic intensities between all possible source-destination pairs. Figure I.2 shows such an example and is taken from Vardi (1996). There are 4 nodes in the network. The links are either unidirectional or bidirectional. There are 7 directed links (a b, b a, a c, c b, b c, c d, d c), hence 7 measurements, and 12 possible source-destination pairs (ab, ac, ad, ba, bc, bd, ca, cb, cd, da, db, dc). Suppose the network traffic is stationary and the routing is fixed (if multiple

16 4 a b c d Figure I.2: A 4 Node Network paths are possible between a source-destination pair, only one of them is used and it is known which one). The problem then becomes a linear inverse problem: (1.1) Y = A X, where Y = [Y 1,..., Y k ] is the vector of the aggregated traffic counts (the measurements), X = [X 1,..., X c ] the vector of the source-destination counts and A the routing matrix, which is determined by the routing tables held at every node. Every element of A is either 1 (the link is on the path of a certain source-destination pair) or 0 (the link is not on the path). The inverse problem arises from the fact that we measure Y but are interested in the traffic matrix X or its distribution. This source-destination information is of considerable interest to SPs and network engineers. This is a highly ill-posed inverse problem n, the number of observations of nodes is much smaller than p, the number of origin-destination pairs. So we need additional assumptions or must use

17 5 some type of regularization before we can estimate all the parameters. Vardi (1996) assumed that the source-destination pair counts X follow Poisson distributions with different parameters. Since the means and variances are the same for the Poisson distribution, this yields additional information (in the form of variances) to estimate the parameters. The EM-algorithm for obtaining the MLEs is computationally very intensive, so moment-based methods were also proposed. Cao et al. (2000) considered a more general formulation where variance mean c for c = 1, 2. Tebaldi and West (1998) obtained Bayesian methods. There are also several other papers in the literature on estimating the traffic matrix, including some that uses regularization methods (see for example [33]). Cao et al. (2000) is one of the few papers that uses real data collected through the Simple Network Management Protocol (SNMP) at Lucent Technologies. The measurements collected over 5-minute intervals are noisy and clearly time-dependent. Thus the stationary assumption assumed in most papers is no longer valid. To incorporate the temporal dependence structure, Cao et al. (2000) assumed local stationarity and used a moving window method to estimate the parameters. They also considered a integrated moving average model. This is one of the first to try and address temporal issues. Modeling spatial-temporal aspects of network data is an important area of current research Estimating Network Internal Characteristics Caceres, et al. (1999) is the first major work to estimate internal network characteristics using data from end-to-end measurements. This is referred to as active network tomography. The issue here is that one is not able to passively collect data at the routers. So Caceres et al. (1999) generated measurements by actively probing the network. Nodes are selected on the periphery of the network as a source node and

18 6 destination nodes. The source node actively sends probe packets to the destinations and the counts of received/lost probe packets are measured. The individual link loss rates are recovered from the end-to-end measurements. This is a different type of inverse problem. The probing scheme proposed in Caceres, et al. (1999) is called multicast probing scheme. In Caceres, et al. (1999) a probe is always sent to all the receivers on the network from the source node. The mechanism is the following. The probe is duplicated at the first branching node. Then individual copies are sent along the children links and further duplicated at the down stream branching nodes, until either reaching the receivers or being dropped on the way. Figure I.3 is a topology with 4 receivers, nodes 4, 5, 6, and 7. There are 16 possible outcomes from the multicast probing scheme. Each outcome is a 4 1 vector, recording which nodes receive the probe t and which do not. The measurements are the counts of the outcomes Figure I.3: A Tree Topology

19 7 Caceres et al. (1999) developed a clever way to compute the approximate maximum likelihood estimators (MLE) of the loss rates. Their algorithm works well for binary trees (the definition of binary trees will be introduced in Chapter II). It has been implemented in a project at AT&T Labs ([17]). The authors also tried to use similar ideas to estimate link delay distributions (Lo Presti et al. (2002)), but the method does not extend easily to the delay problem. The method in Lo Presti et al. (2002) for estimating discrete delay distributions is ad-hoc and very inefficient. Liang and Yu (2003) use a pseudo-likelihood approach with multicast experiments. Lawrence, Michailidis, and Nair (2004) have studied the use of EM-algorithms for computing the MLEs. Tsang et al. (2003) proposed a back-to-back unicast probing scheme to imitate the multicast protocol. The back-to-back unicast scheme is a useful technique in such cases. Unicast probing scheme has been studied some time ago ([29]). A unicast probe is a packet that is sent from the source node to one receiver node at a time. It suffers from identifiability problems: active probing experiments based on unicast schemes alone cannot identify all the internal link parameters of interest, such as loss rates and delay distributions. On the other hand, the multicast protocol is not supported by all the networks. Tsang et al. (2003) proposed the use of back-to-back unicast schemes (two closely time-spaced unicast probes) as an alternative. Figure I.4 explains the idea. At time t a unicast packet is sent to receiver i and at time t+δt a second unicast packet is sent to receiver j. If the time difference δt is set to be small enough, we would expect the two unicast probes to experience similar network environment on the common path that they share on the network. Tsang et al. (2003) did not quantify the correlation

20 8 t+ δ t t 0 s i j Figure I.4: Back-to-Back Unicast Probing Scheme on the common path; instead it was assumed that the loss experience and delays on the common path are identically the same. Under such an assumption the backto-back unicast probing scheme in Tsang et al. (2003) is equivalent to the bicast (multicast to a pair of receivers) protocol. However, the assumption of identical performance will not hold in all cases and it is difficult to verify this assumption Topology Identification Both of the network tomography problems discussed above implicitly assume that the routing matrix is given and fixed during the study period. It is reasonable to assume the routing tables remain the same if the probing experiment (or data monitoring period) lasts for only a short time. Then there are tools, for example traceroute, that could discover the connectivity structure with some help from the routers. Increasingly, due to security concerns, network routers do not respond to requests from tools such as traceroute, leading to difficulty in topology identification.

21 9 Thus, using active probing experiments to determine the topology has become an important area of research. The methods used in the literature ([9], [20], [7], [22]) include clustering techniques, maximum likelihood, and Bayesian approaches. There are also some clever ideas for probing experiments such as the sandwich probing scheme ([7]). Figure I.5 illustrates this idea. Two small unicast probe packets, packet 1 and 3, are sent to one receiver and the large unicast probe packet is sent to another receiver. But the large probe is sandwiched between the two small probes. Let d denote the time difference between probes 1 and 3 at the source node and d denote the observed time difference between the two probes at the receiver. The longer the common path in the pair of receivers, the longer the delay. Thus, the delay differences can be used to estimate the topology. Since only the measurements of local delay differences are made, the clock synchronization among the nodes on the network is not an issue. There are, however, still formidable issues involved in estimating the topology (see [7]) Overview This thesis focuses on estimating link loss rates a key network internal characteristic using end-to-end measurements. In our logical topology, a node could represent one router, one computer, or a sub-network; a link could be a physical link or a succession of links that connect two sub-networks. The link loss rates of interest could be the loss rates of certain physical links or the average loss rates between two sub-networks. All the links are unidirectional. The traffic always moves from the source nodes to the receiver nodes. Chapter II discusses more details of the modeling framework. In Chapter III two types of estimators are examined, the maximum likelihood estimator and the

22 10 d s i j d* Figure I.5: A Sandwich Probe least squares based estimators, for the statistical inference purpose. Some numerical results of the performance of the estimators are shown in Chapter IV. We also address the issue of designing a good probing experiment in Chapter IV. Chapter V concludes the thesis and states several problems that we would like to investigate in the future.

23 CHAPTER II Modeling Framework 2.1 Framework and Notation In the thesis, we will first restrict attention to single-rooted tree topologies (see Figure II.1). Sections 2.4.2, and will consider the generalization to multirooted trees. The network over which active probing is performed will be numbered according to the following canonical scheme: the sender is denoted by 0 and the remaining nodes 1, 2,..., while the links are assigned the number of the connected node below it. We consider tree topologies defined as follows: let T = (V, E) denote a tree with root 0 V, a set of nodes V and a set of edges/links E. A link between nodes i and j is an ordered pair (i, j) V V. The root node 0 represents the source (sender) of the transmitted packets. Let d(i) be a direct descendant (child) of node i, and D(i) = {j V : j = d(i)} denote the set of all direct descendants (children) of node i. (In Figure II.1, D(1) = {2, 3, 4, 5}.) The set of receiver nodes, denoted by R V, consists of all nodes without children, i.e., R = {i V : D(i) = }. (In Figure II.1, R = {2, 3, 6, 8, 9, 10, 11, 12, 13, 14, 15}.) The set of internal nodes I is comprised of the nodes that are neither the root nor the receivers (i.e. I = {s V {R {0}}). We assume throughout that each internal node has at least two children. Otherwise, the internal link characteristics (e.g. delays/losses) associated 11

24 12 with the node and its child cannot be estimated separately. For each node i V {0} there is a unique node j such that d(j) = i. We refer to this as the parent node of i and denote it as f(i). Defining f n (i) recursively by f n (i) = f(f n 1 (i)), we say that i is a descendant of j if j = f n (i) for some integer n > 0. (In Figure II.1, f(6) = 4, f 2 (6) = 1, and f 3 (6) = 0.) Let L j, j = 1, 2,... denote the j th layer of a tree, defined as the set of all nodes whose shortest path from the root node 0 has j links; i.e., L j = {i V : 0 = f j (i)}. (In Figure II.1, L 3 = {6, 7, 8, 9, 10, 11}.) Finally, we denote by P(i, j) a path between nodes i and j, which is comprised of a set of connected links (see Figure II.2). A special case of the tree topology are binary trees. For a binary tree, each internal node has exactly two children, i.e., D(i) = 2 for all i V (R {0}). Further, for a symmetric binary tree we have L j = 2 j 1, j = 1, 2,... Figure II.3 shows an example of a binary tree and Figure II.2 a 3-layer symmetric binary tree. 0 α 1 1 α 2 α α 5 4 α α α6 α 8 7 α α 12 α 13 α14 α 15 α 11 α Figure II.1: A General Tree Topology

25 13 0 α 1 α 1 α p(1,7) α α α α Figure II.2: 3-Layer Symmetric Binary Tree. 0 α 1 α 2 1 α3 2 3 α 4 α α 6 α Stochastic Model 6 7 Figure II.3: General Binary Tree. Suppose a probe packet t (t is the index of the packet) is sent from node 0 to node i. Define Z i (t) = 1 if the probe packet reached node i and zero otherwise. If we had

26 14 access to the internal nodes, we could observe the outcomes Z i (t) for all the nodes. However, we have access only to the receiver nodes r R, so we can observe only Z r (t), r R. For a unicast scheme, the root node transmits packets t = 1, 2,... to one receiver at a time, so we observe only Z r (t) for a single receiver r for each probe packet. For the multicast scheme, on the other hand, the sender transmits each packet simultaneously to all receiver nodes. So the observed outcome for the tth probe packet consists of Z r (t) for all r R. We will analyze the data under the following conditional independence model that has also been commonly used in the literature (Caceres et al., 1999). First let α i (t) = P (Z i (t) = 1 Z f(i) (t) = 1), i.e., the probability that the probe packet reaches node i given that it reached its parent node f(i). We assume throughout that α i (t) α i. Second, the children s loss behaviors are conditionally independent given that of the parent, i.e., P (Z j (t) = 1 j D(i) Z i (t) = 1) = Π j D(i) α j. These assumptions have been used as reasonable starting points in the literature to study the properties of various estimators and measurement schemes (Caceres et al, 1999; Castro et al, 2003; Coates et al., 2002). Extensions to situations with spatialtemporal dependence will be considered in future work. We do, however, consider a limited assessment of the assumptions using the ns-simulator ([18]) in Section 4.4. Under the above assumptions, P (Z i (t) = 1) = Π s P(0,i) α s. Further, P (Z j (t) = 1 j D(i)) = Π s P(0,i) α s Π j D(i) α j.

27 Probing Schemes Throughout the thesis we concentrated on active network tomography. Two probing schemes, multicast scheme (Caceres et al, 1999) and back-to-back unicast scheme (Coates et al., 2002), were investigated by several groups in the active network tomography literature. Unfortunately both schemes have major drawbacks as discussed in Chapter I. Our work starts with proposing a new class of flexible probing schemes that are capable of overcoming such drawbacks Pure Bicast Experiments for Binary Trees Unicast schemes are appealing because of their simplicity but they contain only one-dimensional information which is not enough to estimate all the internal links. Our goal is to retain the simplicity as much as possible and yet estimate all the internal link loss parameters. The new class of bicast experiments combines bicast pairs with unicast schemes efficiently in order to estimate all the parameters of interest. We restrict attention first to binary trees for which pure bicast experiments, consisting of only bicast pairs, is sufficient. Under a bicast scheme, the packets are transmitted from the sender to pairs of receiver nodes, b = i, j, i, j R, at a time. This is accomplished as follows. For a pair of receiver nodes i, j, define node s to be a splitting node if P(0, s) is the longest common path that i and j share on the tree T. For example, in Figure II.1, the splitting node for the pair 2, 3 is 1, while the splitting node for 8, 11 is 5. Then, the sender transmits a single packet which is duplicated at the splitting node s and both packets are transmitted to the specified pair of receiver nodes. There are several possible choices of bicast experiments for a given tree. For example, for the 3-layer tree in Figure II.2, the bicast experiment may consist of all possible receiver

28 16 pairs or certain selected subsets such as the three pairs 4, 5, 6, 7, and 5, 6. As we will see below, these three pairs are sufficient to estimate all the internal loss rates in this case. One of the advantages of bicast experiments over multicast schemes is data complexity. Specifically, the number of possible outcomes with multicast schemes grows exponentially with the number of layers in the tree. For example, for the 3-layer binary tree in Figure II.2, there are 16 possible outcomes (i, j, k, l). In general, for an L layer symmetric binary tree, the number of outcomes is 2 2L 1 (2 16 = for a 5-layer tree). This problem is especially serious for inference for parameters of the delay distributions (Lo Presti et al., 2002). On the other hand, the number of possible bicast transmission schemes for an L- layer symmetric binary tree is ( ) 2 L 1 = 2 L 2 (2 L 1 1). Thus, the maximum number 2 of outcomes is 4 2 L 2 (2 L 1 1) = 2 L (2 L 1 1) for a complete bicast scheme (all possible pairs of receivers). For example, for a 3-layer tree (Figure II.2) the collection of all possible bicast pairs is C = { 4, 5, 4, 6, 4, 7, 5, 6, 5, 7, 6, 7 }, with a total number of outcomes equal to 24. For a 5-layer tree, the number of possible bicast pairs is 120 with the number of corresponding outcomes equal to 480, two orders of magnitude smaller than that in the equivalent multicast experiment. However, it turns out that we need only a small fraction of all possible bicast pairs. Later in Section 2.4 we prove that the minimal number of bicast pairs needed to identify the link loss probabilities in symmetric binary trees is 2 L Bicast Experiments for General Trees and Other Topologies Pure bicast experiments can be used with more than just binary trees. For example, we can use the following set of bicast pairs in Figure II.4: { 5, 6, 3, 7, and 8, 9 }. These constitute a minimal set, and there is no need for additional unicast schemes.

29 17 On the other hand, for the tree in Figure II.1, any pure bicast experiment will be wasteful. For example, consider the following collection of bicast schemes C = { 2, 3, 6, 12, 13, 14, 8, 15, 9, 10, 10, 11 } that contains a bicast pair that splits at every internal node and covers all the receiver nodes. This is sufficient for estimating all the elements of α. However, it is wasteful since there are two pairs that split at internal node 5: 9, 10 and 10, 11. Consider instead the following collection that combines bicast and unicast schemes: C = { 2, 3, 6, 12, 13, 14, 9, 10, 8, 11, 15 }. It is more efficient in the sense that it minimizes the overlap in coverage of the receiver nodes (see Proposition II.1) So for general trees, we will use a combination of bicast and unicast schemes to estimate the loss rates. 0 α 1 α 1 α 2 4 α3 2 3 α α α α 8 4 α Figure II.4: A General Tree Topology For Which A Pure Bicast Experiment Suffices To Estimate The Link Loss Rates. Note that one could consider a combination of different K cast transmission schemes (as discussed in Section 2.3.3), such as unicast, bicasts, tricasts, etc., that may be optimal (in some appropriate sense) for estimating the loss rates. For

30 18 example, for the tree in Figure II.1, one might use a combination of bicast schemes with a 4-cast that splits at node 5 with four receiver nodes 8, 9, 10, and 11. However, we pay special attention to combinations of unicast and bicast schemes since they are simple, easy to analyze, and sufficiently flexible k cast Schemes As noted before, we will be considering a general probing experiment that is based on a combination of k cast schemes for different values of k. So we begin with a description of a k cast scheme. A k cast scheme sends a probe simultaneously to a given subset k of the receivers in R. The scheme is completely specified by the k-tuple of receiver nodes: r 1, r 2,..., r k, r j R, j = 1,...k. For example, two possible 4-cast schemes for the general tree topology shown in Figure II.1 are 12, 13, 14, 15 and 2, 3, 6, 12. The common unicast scheme corresponds to k = 1, while for a given tree with R receiver nodes, the multicast scheme [1] becomes an R cast scheme. In general, however, the size of the multicast scheme varies with the size of the tree of interest. We have introduced the notion of a splitting node for a bicast scheme with receiver nodes r 1, r 2 in Section For a k cast scheme, the splitting nodes can be defined in terms of the splitting nodes of pairs of receiver nodes. Consider the k cast scheme with receiver nodes r 1, r 2,..., r k, and let {r i, r j } be any subset of them. Then, the internal node s s(r i, r j ) is a splitting node for this particular pair if P(0, s) is the common path that {r i, r j } share on the tree. Note that the number of splitting nodes for a k cast scheme can range from 1 to (k 1). For example, for the pair 6, 12 for the tree depicted in the left panel of Figure II.1, there is only one splitting node: 4. For the 4-cast scheme 2, 3, 6, 12, however, there are three splitting nodes ({1, 4, 7}).

31 19 A probe packet for a k cast scheme has 2 k possible outcomes, each of dimension k. These correspond to whether the outcome for the receiver node is one or zero (the node receives the transmission or not). For example, for the 4-cast scheme 12, 13, 14, 15, there are 16 possible outcomes with (Z 12 = 0, Z 13 = 1, Z 14 = 0, Z 15 = 1) indicating that the packet was successfully received by receivers 13 and 15 but not by 12 and 14. Suppose we send N probes using a k cast. This can be viewed as a multinomial experiment with 2 k outcomes; the success probability for each outcome is a complex function of the underlying link successful transmission rates α s. Consider, for example, the probability of the event (Z 12 = 0, Z 13 = 1, Z 14 = 0, Z 15 = 1). Under the posited stochastic model it is given by a sum of products of α i s and (1 α i ) s. In the next chapter, we consider a transformation of the outcome space for which the success probabilities are simple products of the link loss parameters. A collection of unicast (1 cast) schemes, bicast (2 cast) schemes,..., up to k cast schemes is named a k cast experiment. 2.4 Identifiability In this section we first establish the sufficient and necessary identifiability condition for single-source topologies. The problem for multi-source topologies is slightly more complicated. An internal node may have multiple parent nodes on an multisource topology, unlike the single-source topology case. This requires a different definition of parent nodes. We then introduce a sufficient identifiability condition for multi-source topologies.

32 Single-Source Topology Identifiability Condition We need some additional notation. Denote the probability of a successful transmission of a packet over the path P(s, l) by π(s, l). So, (2.1) π(s, l) = α i. i P(s,l) Suppose the bicast probe b is sent to the pair of receiver nodes i b, j b, i b, j b R, with splitting node s b. The observed outcome can take one of the following four values: (Z ib (t), Z jb (t)) = (0, 0) or (0, 1) or (1, 0) or (1, 1) depending on whether the packet was received by none, one or both of the intended receivers. Let γij b denote the corresponding probability of any of these events. Then, (2.2) (2.3) (2.4) (2.5) γ11 b = π(0, s b )π(s b, i b )π(s b, j b ), γ10 b = π(0, s b )[1 π(s b, i b )]π(s b, j b ), γ01 b = π(0, s b )π(s b, i b )[1 π(s b, j b )], γ00 b = [1 π(0, s b )] + π(0, s b )[1 π(s b, i b )][1 π(s b, j b )], Since γ1,1 b + γ1,0 b + γ0,1 b + γ0,0 b = 1, there are only 3 free probabilities for each pair of receiver nodes b. Notice also that π(0, i b ) = γ1,1 b + γ1,0 b and π(0, j b ) = γ1,1 b + γ0,1. b The following proposition characterizes a minimal combination of bicast and unicast schemes that lead to identifiability of all the loss parameters in a general tree topology. Define B to denote the collection of all bicast pairs used in the experiment and let U denote the collection of unicast schemes. Let Γ b = {γ1,1, b γ1,0, b γ0,1, b γ0,0} b denote the set of probabilities from a pair of receiver nodes b = i, j and denote by Γ = {Γ b : b B}, the probabilities generated by all bicast pairs in B. Let u = {δ u 1, δ u 0 } denote the probabilities of the two outcomes for unicast scheme u and denote by = { u : u U}.

33 21 Proposition II.1. Let C = B U be a collection of bicast (b B) and unicast (u U) schemes. Suppose B and U are chosen as follows: (I) for each internal node s in T, there is exactly one bicast pair b B whose splitting node is s; (II) the bicast pairs in B are chosen to maximize the number of receiver nodes r R that are covered; and (III) the unicast schemes in U are chosen to cover the remaining receiver nodes r R that are not covered by the bicast pairs in B. Then, there exists a bijection between α and Γ. Proof: Sufficiency: First notice from equations (2.2)-(2.5) that the γ b i,j s are uniquely determined by the path probabilities π b (s, t) of the bicast pair b which in turn are determined by the {α}s. Therefore, Γ = {Γ b ; b B} is uniquely determined by α. An analogous line of reasoning establishes the result for the collection of probabilities = { u ; u U} obtained from the unicast schemes u. We will show next that the elements of α are also uniquely determined by Γ (i.e. by the collection of {Γ b } for which b = i b, j b have all internal nodes as splitting nodes and by the { u } that cover receiver nodes not covered by bicast schemes). Recall that a node i V {0} belongs to the k-th layer L k of T if its shortest path from the root node has k links. We need to consider the following three cases: (i) the splitting node for bicast pair b is node 1 (i.e., belongs to layer L 1 see Figure II.2), (ii) the splitting node is any internal node (i.e. s I), and finally (iii) the case of receiver nodes r R (e.g. nodes 14 or 15 in Figure II.1). Case 1: For bicast pair b 0 = i b, j b with splitting node 1 in the canonical numbering scheme adopted in the paper, we have that α 1 = π b 0 (0, 1) = (γb γ b 0 10)(γ b γ b 0 γ b ),

34 22 and therefore determined by the elements of Γ (see left panel of Figure II.5). Case 2: We now proceed with the induction on the remaining internal nodes s I. According to the statement of the Proposition, every internal node s is the splitting node for one bicast scheme in the collection C. Assume that for all internal nodes s such that s L 1 L 2 L k 1, α s s have been determined by Γ. We show next that α t, t L k is also determined by Γ. Since t is an internal node, there exists a bicast scheme b 0 C whose splitting node corresponds to t. We have that π b 0 (0, t) = π b 0 (0, f(t))α t, with all the members of π b 0 (0, f(t)) already determined. As before we have that π b 0 (0, t) = (γb γ b 0 10)(γ b γ b 0 which combined with the previous observation establishes the identifiability of α t γ b 0 11 from the elements of Γ (see right panel of Figure II.5). Case 3: We now deal with the receiver nodes r R. A receiver node can be covered either by a unicast scheme or a bicast scheme. Notice that due to the induction hypothesis in the previous step all α s, with s I have been identified. Suppose that the receiver node is covered by a unicast scheme u 0. We then have that π u 0 (0, r) = π u 0 (0, f(r))α r with all elements of π u 0 (0, f(r)) already identified by the induction. We also have that δ u 0 1 = π u 0 (0, r), which combined with the previous observation, establishes the identifiability of α r from elements of. Suppose that the receiver node r is covered by a bicast scheme b 0 = i b0, j b0 with splitting node s b0. We have that 01), π(s b0, i b0 ) = γ b 0 11 γ b γ b 0 01 and π(s b0, j b0 ) = γ b 0 11 γ b γ b But π b 0 (0, r) = π b 0 (0, s b0 )π b 0 (s b0, r) = π b 0 (0, f(r))α r, with r being either i b0 or j b0 and the result follows as above.

35 23 Thus, we have established that all the elements of α are uniquely determined by the elements of Γ ; thus, there is a bijection between α and Γ. Necessity: We argue by contradiction. The crucial aspect in the Proposition is the existence of a bicast pair whose splitting node is an internal node in T. We consider a combination of bicast schemes in the collection C that includes all possible pairs, except the collection of pairs B 0 = {b C : splitting node is s b0 I} that have as their splitting node s b0, an internal node of T. We will show that this combination of bicast pairs fails to identify all the elements of α; thus, no bijection between α and Γ exists. Let f(s b0 ) and d(s b0 ) denote the parent and any child node of node s b0, respectively (see Figure II.6). From the previous derivations it is easy to see that the following relationships hold: (2.6) (2.7) π b (0, d(s b0 )) = π b (0, f(s b0 )) α sb0 α d(sb0 ) π b (f(s b0 ), l) = α sb0 α d(sb0 ) π b (d(s b0 ), l) for some b C and where l corresponds to some receiver node for pair b. Notice that as argued in the sufficiency part of the proof, only these π s are uniquely determined by their Γ b s. Further notice, that both (2.6) and (2.7) correspond to two actual equations, since node s b0 has two children nodes for any bicast schemes in B 0. A straightforward calculation shows that only the values of the products α sb0 α d(sb0 ) can be calculated uniquely from the elements of Γ by taking the appropriate ratios, but the individual parameters can not be disentangled. Hence, C fails to identify all the elements of α. This completes the proof of the Proposition.

36 f( S b0 ) α 1 1 Sb 0 i b j b i b j b Figure II.5: Cases 1 and 2 of the sufficiency of Proposition II.1. 0 f( S b0 ) Sb 0 d( S b0 ) i b j b Figure II.6: Demonstration of (2.6)-(2.7).

37 25 To see why condition (II) is needed, consider the following subtree of Figure II.1 with nodes 0, 1, 2, 3, 4, 6 and 7. The receiver nodes are 2, 3, 6 and 7. The following experiment with two bicast pairs 2, 6 and 6, 7 and a unicast scheme 2 satisfies conditions (I) and (III). However, this is wasteful as it covers receiver node 2 twice. The pure bicast experiment with two pairs 2, 3 and 6, 7 satisfies (II) and is the the minimal scheme. It is easy to obtain an algorithm that constructs the minimal scheme based on the set covering problem (Chvatal, 1979). This can be formulated as an integer program as follows. Given the edge set E of the tree topology T and the set of all possible bicast schemes B whose paths traverse E, find a minimum size subset B B whose members satisfy the first two conditions of Proposition II.1. The conditions show up as the constraints in the integer program formulation. The following corollary gives a necessary and sufficient condition for the link loss probabilities to be identifiable from a set of bicast probes in a binary tree. We refer to such a scheme as a minimal pure bicast experiment. The proof is a special case of that for Proposition II.1. Corollary II.1. Let B = {b = i, j : i, j, R} denote the subset of the bicast schemes to be used in a probing experiment. Let Γ b = {γ1,1, b γ1,0, b γ0,1, b γ0,0} b denote the set of probabilities from a pair of receiver nodes b = i, j under a bicast transmission scheme and Γ = {Γ b : b B}, the probabilities generated by all bicast pairs in B. There exists a bijection between α and Γ if and only if for every internal node s I, there exists a pair b = i, j B such that s is the splitting node for the corresponding pair. In other words, a minimal bicast experiment for a binary tree has as many pairs as the number of internal nodes with one pair splitting at each node. So for a symmetric

38 26 binary tree, the minimal number of pairs is 2 L 1 1. For the 3-layer symmetric tree in Figure II.2, the three pairs 4, 5, 5, 6 and 6, 7 constitute a minimal bicast experiment. So do the three pairs 4, 5, 4, 7 and 6, 7. For a 5-layer symmetric tree, the minimal number of pairs is 15, so there are only 4 15 = 60 possible outcomes (three orders of magnitude smaller than a multicast scheme). Bicast experiments also work in more general topologies such as acyclic graphs. Figure II.7 depicts a single source acyclic graph topology. Under a multicast transmission scheme the above graph would give rise to a 5-layer tree structure comprised of 12 receivers as shown on Figure II.8, since the multicast probing packets would be replicated at all the forking nodes on the graph. This is clearly inefficient. On the other hand, according to Proposition II.1, six bicast pairs whose splitting nodes correspond to the internal nodes 1, 2, 3, 4, 5 and 7 suffice to identify the loss rates. 0 α(1,2) α(0,1) 1 α(1,3) 2 α(2,5) α(3,4) 3 α(2,4) α(3,5) α(4,6) 4 5 α(4,7) α(5,7) α(5,8) α(7,9) α(7,10) 9 10 Figure II.7: A Single Source Acyclic Graph Topology. A generalization of Proposition II.1 gives the sufficient and necessary condition

Layer 0. α 1. Path P(0,2) Layer 1. α 2 α 3. Layer 2. α 4. α 5. Layer 3 = Receiver Set

Layer 0. α 1. Path P(0,2) Layer 1. α 2 α 3. Layer 2. α 4. α 5. Layer 3 = Receiver Set onference on Information Sciences and Systems, The Johns Hopkins University, March 4, Least Squares Estimates of Network Link Loss Probabilities using End-to-end Multicast Measurements owei Xi, George

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Efficient MCMC Samplers for Network Tomography

Efficient MCMC Samplers for Network Tomography Efficient MCMC Samplers for Network Tomography Martin Hazelton 1 Institute of Fundamental Sciences Massey University 7 December 2015 1 Email: m.hazelton@massey.ac.nz AUT Mathematical Sciences Symposium

More information

TWO PROBLEMS IN NETWORK PROBING

TWO PROBLEMS IN NETWORK PROBING TWO PROBLEMS IN NETWORK PROBING DARRYL VEITCH The University of Melbourne 1 Temporal Loss and Delay Tomography 2 Optimal Probing in Convex Networks Paris Networking 27 Juin 2007 TEMPORAL LOSS AND DELAY

More information

Network Performance Tomography

Network Performance Tomography Network Performance Tomography Hung X. Nguyen TeleTraffic Research Center University of Adelaide Network Performance Tomography Inferring link performance using end-to-end probes 2 Network Performance

More information

Multicast-Based Inference of Network-Internal Delay Distributions

Multicast-Based Inference of Network-Internal Delay Distributions Multicast-Based Inference of Network-Internal Delay Distributions F Lo Presti NG Duffield J Horowitz D Towsley AT&T Labs Research Dept Math & Statistics Dept of Computer Science 18 Park Avenue University

More information

Active Measurement for Multiple Link Failures Diagnosis in IP Networks

Active Measurement for Multiple Link Failures Diagnosis in IP Networks Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks

More information

Multicast-Based Inference of Network-Internal Loss Characteristics

Multicast-Based Inference of Network-Internal Loss Characteristics Multicast-Based Inference of Network-Internal Loss Characteristics R. Cáceres y N.G. Duffield z J. Horowitz x D. Towsley { Abstract Robust measurements of network dynamics are increasingly important to

More information

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Thesis by John Pongsajapan In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute

More information

An Overview of Traffic Matrix Estimation Methods

An Overview of Traffic Matrix Estimation Methods An Overview of Traffic Matrix Estimation Methods Nina Taft Berkeley www.intel.com/research Problem Statement 1 st generation solutions 2 nd generation solutions 3 rd generation solutions Summary Outline

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Shortest Paths & Link Weight Structure in Networks

Shortest Paths & Link Weight Structure in Networks Shortest Paths & Link Weight Structure in etworks Piet Van Mieghem CAIDA WIT (May 2006) P. Van Mieghem 1 Outline Introduction The Art of Modeling Conclusions P. Van Mieghem 2 Telecommunication: e2e A ETWORK

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,

More information

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011 Constructing Polar Codes Using Iterative Bit-Channel Upgrading by Arash Ghayoori B.Sc., Isfahan University of Technology, 011 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree

More information

THE EXISTENCE AND USEFULNESS OF EQUALITY CUTS IN THE MULTI-DEMAND MULTIDIMENSIONAL KNAPSACK PROBLEM LEVI DELISSA. B.S., Kansas State University, 2014

THE EXISTENCE AND USEFULNESS OF EQUALITY CUTS IN THE MULTI-DEMAND MULTIDIMENSIONAL KNAPSACK PROBLEM LEVI DELISSA. B.S., Kansas State University, 2014 THE EXISTENCE AND USEFULNESS OF EQUALITY CUTS IN THE MULTI-DEMAND MULTIDIMENSIONAL KNAPSACK PROBLEM by LEVI DELISSA B.S., Kansas State University, 2014 A THESIS submitted in partial fulfillment of the

More information

MODULE -4 BAYEIAN LEARNING

MODULE -4 BAYEIAN LEARNING MODULE -4 BAYEIAN LEARNING CONTENT Introduction Bayes theorem Bayes theorem and concept learning Maximum likelihood and Least Squared Error Hypothesis Maximum likelihood Hypotheses for predicting probabilities

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

Bayesian Methods for Diagnosing Physiological Conditions of Human Subjects from Multivariate Time Series Biosensor Data

Bayesian Methods for Diagnosing Physiological Conditions of Human Subjects from Multivariate Time Series Biosensor Data Bayesian Methods for Diagnosing Physiological Conditions of Human Subjects from Multivariate Time Series Biosensor Data Mehmet Kayaalp Lister Hill National Center for Biomedical Communications, U.S. National

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Principles of AI Planning

Principles of AI Planning Principles of AI Planning 5. Planning as search: progression and regression Albert-Ludwigs-Universität Freiburg Bernhard Nebel and Robert Mattmüller October 30th, 2013 Introduction Classification Planning

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.utstat.utoronto.ca/~rsalakhu/ Sidney Smith Hall, Room 6002 Lecture 11 Project

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Multicast Topology Inference from End-to-end Measurements

Multicast Topology Inference from End-to-end Measurements Multicast Topology Inference from End-to-end Measurements N.G. Duffield J. Horowitz F. Lo Presti D. Towsley AT&T Labs Research Dept. Math. & Statistics Dept. of Computer Science 180 Park Avenue University

More information

Andrew/CS ID: Midterm Solutions, Fall 2006

Andrew/CS ID: Midterm Solutions, Fall 2006 Name: Andrew/CS ID: 15-780 Midterm Solutions, Fall 2006 November 15, 2006 Place your name and your andrew/cs email address on the front page. The exam is open-book, open-notes, no electronics other than

More information

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Extreme Point Solutions for Infinite Network Flow Problems

Extreme Point Solutions for Infinite Network Flow Problems Extreme Point Solutions for Infinite Network Flow Problems H. Edwin Romeijn Dushyant Sharma Robert L. Smith January 3, 004 Abstract We study capacitated network flow problems with supplies and demands

More information

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

Santa Claus Schedules Jobs on Unrelated Machines

Santa Claus Schedules Jobs on Unrelated Machines Santa Claus Schedules Jobs on Unrelated Machines Ola Svensson (osven@kth.se) Royal Institute of Technology - KTH Stockholm, Sweden March 22, 2011 arxiv:1011.1168v2 [cs.ds] 21 Mar 2011 Abstract One of the

More information

PROBABILISTIC REASONING SYSTEMS

PROBABILISTIC REASONING SYSTEMS PROBABILISTIC REASONING SYSTEMS In which we explain how to build reasoning systems that use network models to reason with uncertainty according to the laws of probability theory. Outline Knowledge in uncertain

More information

Lecture 24: April 12

Lecture 24: April 12 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 24: April 12 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3 6.841/18.405J: Advanced Complexity Wednesday, February 12, 2003 Lecture Lecture 3 Instructor: Madhu Sudan Scribe: Bobby Kleinberg 1 The language MinDNF At the end of the last lecture, we introduced the

More information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016 Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2016 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several

More information

Principles of AI Planning

Principles of AI Planning Principles of 5. Planning as search: progression and regression Malte Helmert and Bernhard Nebel Albert-Ludwigs-Universität Freiburg May 4th, 2010 Planning as (classical) search Introduction Classification

More information

SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING

SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING Nicolas Hohn 1 Darryl Veitch 1 Tao Ye 2 1 CUBIN, Department of Electrical & Electronic Engineering University of Melbourne, Vic 3010 Australia

More information

Utilising public information in Network Coding

Utilising public information in Network Coding 1 Utilising public information in Network Coding Søren Riis Queen Mary, University of London (Technical report June 2005) Abstract We show that an information network flow problem N in which n messages

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Transducers for bidirectional decoding of prefix codes

Transducers for bidirectional decoding of prefix codes Transducers for bidirectional decoding of prefix codes Laura Giambruno a,1, Sabrina Mantaci a,1 a Dipartimento di Matematica ed Applicazioni - Università di Palermo - Italy Abstract We construct a transducer

More information

SFM-11:CONNECT Summer School, Bertinoro, June 2011

SFM-11:CONNECT Summer School, Bertinoro, June 2011 SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

CS60007 Algorithm Design and Analysis 2018 Assignment 1

CS60007 Algorithm Design and Analysis 2018 Assignment 1 CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in

More information

STA 414/2104: Machine Learning

STA 414/2104: Machine Learning STA 414/2104: Machine Learning Russ Salakhutdinov Department of Computer Science! Department of Statistics! rsalakhu@cs.toronto.edu! http://www.cs.toronto.edu/~rsalakhu/ Lecture 9 Sequential Data So far

More information

Automata Theory and Formal Grammars: Lecture 1

Automata Theory and Formal Grammars: Lecture 1 Automata Theory and Formal Grammars: Lecture 1 Sets, Languages, Logic Automata Theory and Formal Grammars: Lecture 1 p.1/72 Sets, Languages, Logic Today Course Overview Administrivia Sets Theory (Review?)

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Bayesian Methods for Machine Learning

Bayesian Methods for Machine Learning Bayesian Methods for Machine Learning CS 584: Big Data Analytics Material adapted from Radford Neal s tutorial (http://ftp.cs.utoronto.ca/pub/radford/bayes-tut.pdf), Zoubin Ghahramni (http://hunch.net/~coms-4771/zoubin_ghahramani_bayesian_learning.pdf),

More information

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION MAGNUS BORDEWICH, KATHARINA T. HUBER, VINCENT MOULTON, AND CHARLES SEMPLE Abstract. Phylogenetic networks are a type of leaf-labelled,

More information

Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Decision Trees. Tobias Scheffer

Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Decision Trees. Tobias Scheffer Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Decision Trees Tobias Scheffer Decision Trees One of many applications: credit risk Employed longer than 3 months Positive credit

More information

ECEN 689 Special Topics in Data Science for Communications Networks

ECEN 689 Special Topics in Data Science for Communications Networks ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University Lecture 13 Measuring and Inferring Traffic Matrices

More information

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015 NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with

More information

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,

More information

Lecture 9: Bayesian Learning

Lecture 9: Bayesian Learning Lecture 9: Bayesian Learning Cognitive Systems II - Machine Learning Part II: Special Aspects of Concept Learning Bayes Theorem, MAL / ML hypotheses, Brute-force MAP LEARNING, MDL principle, Bayes Optimal

More information

Notes on the Dual Ramsey Theorem

Notes on the Dual Ramsey Theorem Notes on the Dual Ramsey Theorem Reed Solomon July 29, 2010 1 Partitions and infinite variable words The goal of these notes is to give a proof of the Dual Ramsey Theorem. This theorem was first proved

More information

1 Introduction (January 21)

1 Introduction (January 21) CS 97: Concrete Models of Computation Spring Introduction (January ). Deterministic Complexity Consider a monotonically nondecreasing function f : {,,..., n} {, }, where f() = and f(n) =. We call f a step

More information

Probe Placement Problem

Probe Placement Problem Dimitri Papadimitriou (Alcatel-Lucent - Bell Labs) NMRG Meeting IETF 89 London (UK) Mar.2-7, 2014 Outline 1 Introduction 2 Model 3 Preliminary Results 4 Analysis and Conclusion imitri Papadimitriou (Alcatel-Lucent

More information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014 Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2014 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

THE VINE COPULA METHOD FOR REPRESENTING HIGH DIMENSIONAL DEPENDENT DISTRIBUTIONS: APPLICATION TO CONTINUOUS BELIEF NETS

THE VINE COPULA METHOD FOR REPRESENTING HIGH DIMENSIONAL DEPENDENT DISTRIBUTIONS: APPLICATION TO CONTINUOUS BELIEF NETS Proceedings of the 00 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds. THE VINE COPULA METHOD FOR REPRESENTING HIGH DIMENSIONAL DEPENDENT DISTRIBUTIONS: APPLICATION

More information

A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS

A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS CRYSTAL L. KAHN and BENJAMIN J. RAPHAEL Box 1910, Brown University Department of Computer Science & Center for Computational Molecular Biology

More information

Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data

Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data Patrick Loiseau 1, Paulo Gonçalves 1, Stéphane Girard 2, Florence Forbes 2, Pascale Vicat-Blanc Primet 1

More information

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES The Pennsylvania State University The Graduate School Department of Mathematics STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES A Dissertation in Mathematics by John T. Ethier c 008 John T. Ethier

More information

STATS 200: Introduction to Statistical Inference. Lecture 29: Course review

STATS 200: Introduction to Statistical Inference. Lecture 29: Course review STATS 200: Introduction to Statistical Inference Lecture 29: Course review Course review We started in Lecture 1 with a fundamental assumption: Data is a realization of a random process. The goal throughout

More information

distribution tree. Thus multicast trac introduces a well structured correlation in the end-to-end behavior observed by the receiver that share the sam

distribution tree. Thus multicast trac introduces a well structured correlation in the end-to-end behavior observed by the receiver that share the sam Network Delay Tomography from End-to-end Unicast Measurements? N.G. Dueld 1, J. Horowitz 2, F. Lo Presti 1;3, and D. Towsley 3 1 AT&T Labs{Research, 18 Park Avenue, Florham Park, NJ 7932, USA fduffield,loprestig@research.att.com

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world. Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check

More information

THE idea of network coding over error-free networks,

THE idea of network coding over error-free networks, Path Gain Algebraic Formulation for the Scalar Linear Network Coding Problem Abhay T. Subramanian and Andrew Thangaraj, Member, IEEE arxiv:080.58v [cs.it] 9 Jun 00 Abstract In the algebraic view, the solution

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

Chris Bishop s PRML Ch. 8: Graphical Models

Chris Bishop s PRML Ch. 8: Graphical Models Chris Bishop s PRML Ch. 8: Graphical Models January 24, 2008 Introduction Visualize the structure of a probabilistic model Design and motivate new models Insights into the model s properties, in particular

More information

Pattern Popularity in 132-Avoiding Permutations

Pattern Popularity in 132-Avoiding Permutations Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

For more information about how to cite these materials visit

For more information about how to cite these materials visit Author(s): Kerby Shedden, Ph.D., 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Share Alike 3.0 License: http://creativecommons.org/licenses/by-sa/3.0/

More information

Lecture 15. Probabilistic Models on Graph

Lecture 15. Probabilistic Models on Graph Lecture 15. Probabilistic Models on Graph Prof. Alan Yuille Spring 2014 1 Introduction We discuss how to define probabilistic models that use richly structured probability distributions and describe how

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

9 Forward-backward algorithm, sum-product on factor graphs

9 Forward-backward algorithm, sum-product on factor graphs Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous

More information

2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES

2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES 2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES 2.0 THEOREM OF WIENER- KHINTCHINE An important technique in the study of deterministic signals consists in using harmonic functions to gain the spectral

More information

CS6375: Machine Learning Gautam Kunapuli. Decision Trees

CS6375: Machine Learning Gautam Kunapuli. Decision Trees Gautam Kunapuli Example: Restaurant Recommendation Example: Develop a model to recommend restaurants to users depending on their past dining experiences. Here, the features are cost (x ) and the user s

More information

Lecture 4 October 18th

Lecture 4 October 18th Directed and undirected graphical models Fall 2017 Lecture 4 October 18th Lecturer: Guillaume Obozinski Scribe: In this lecture, we will assume that all random variables are discrete, to keep notations

More information

Lecture 21: Spectral Learning for Graphical Models

Lecture 21: Spectral Learning for Graphical Models 10-708: Probabilistic Graphical Models 10-708, Spring 2016 Lecture 21: Spectral Learning for Graphical Models Lecturer: Eric P. Xing Scribes: Maruan Al-Shedivat, Wei-Cheng Chang, Frederick Liu 1 Motivation

More information

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment July 24, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS")

More information

arxiv: v1 [cs.cc] 5 Dec 2018

arxiv: v1 [cs.cc] 5 Dec 2018 Consistency for 0 1 Programming Danial Davarnia 1 and J. N. Hooker 2 1 Iowa state University davarnia@iastate.edu 2 Carnegie Mellon University jh38@andrew.cmu.edu arxiv:1812.02215v1 [cs.cc] 5 Dec 2018

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Quiz 1 Solutions. Problem 2. Asymptotics & Recurrences [20 points] (3 parts)

Quiz 1 Solutions. Problem 2. Asymptotics & Recurrences [20 points] (3 parts) Introduction to Algorithms October 13, 2010 Massachusetts Institute of Technology 6.006 Fall 2010 Professors Konstantinos Daskalakis and Patrick Jaillet Quiz 1 Solutions Quiz 1 Solutions Problem 1. We

More information

Experimental designs for multiple responses with different models

Experimental designs for multiple responses with different models Graduate Theses and Dissertations Graduate College 2015 Experimental designs for multiple responses with different models Wilmina Mary Marget Iowa State University Follow this and additional works at:

More information

MASTER THESIS. Development and Testing of Index Policies in Internet Routers

MASTER THESIS. Development and Testing of Index Policies in Internet Routers Universidad del País Vasco / Euskal Herriko Unibertsitatea MASTER THESIS Development and Testing of Index Policies in Internet Routers Author: Josu Doncel Advisor: Peter Jacko Urtzi Ayesta Leioa, September

More information

MAS275 Probability Modelling Exercises

MAS275 Probability Modelling Exercises MAS75 Probability Modelling Exercises Note: these questions are intended to be of variable difficulty. In particular: Questions or part questions labelled (*) are intended to be a bit more challenging.

More information

Probabilistic Graphical Models (I)

Probabilistic Graphical Models (I) Probabilistic Graphical Models (I) Hongxin Zhang zhx@cad.zju.edu.cn State Key Lab of CAD&CG, ZJU 2015-03-31 Probabilistic Graphical Models Modeling many real-world problems => a large number of random

More information

Graph Detection and Estimation Theory

Graph Detection and Estimation Theory Introduction Detection Estimation Graph Detection and Estimation Theory (and algorithms, and applications) Patrick J. Wolfe Statistics and Information Sciences Laboratory (SISL) School of Engineering and

More information

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu

More information

CS 6375 Machine Learning

CS 6375 Machine Learning CS 6375 Machine Learning Decision Trees Instructor: Yang Liu 1 Supervised Classifier X 1 X 2. X M Ref class label 2 1 Three variables: Attribute 1: Hair = {blond, dark} Attribute 2: Height = {tall, short}

More information

These are special traffic patterns that create more stress on a switch

These are special traffic patterns that create more stress on a switch Myths about Microbursts What are Microbursts? Microbursts are traffic patterns where traffic arrives in small bursts. While almost all network traffic is bursty to some extent, storage traffic usually

More information

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

10-810: Advanced Algorithms and Models for Computational Biology. Optimal leaf ordering and classification

10-810: Advanced Algorithms and Models for Computational Biology. Optimal leaf ordering and classification 10-810: Advanced Algorithms and Models for Computational Biology Optimal leaf ordering and classification Hierarchical clustering As we mentioned, its one of the most popular methods for clustering gene

More information

Discussion of Bootstrap prediction intervals for linear, nonlinear, and nonparametric autoregressions, by Li Pan and Dimitris Politis

Discussion of Bootstrap prediction intervals for linear, nonlinear, and nonparametric autoregressions, by Li Pan and Dimitris Politis Discussion of Bootstrap prediction intervals for linear, nonlinear, and nonparametric autoregressions, by Li Pan and Dimitris Politis Sílvia Gonçalves and Benoit Perron Département de sciences économiques,

More information