Decision Optimization Techniques for Efficient Delivery of Multimedia Streams Mugurel Ionut Andreica, Nicolae Tapus Politehnica University of Bucharest,

Slides:



Advertisements
Similar presentations
Introduction to Algorithms
Advertisements

February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Multicast Traffic Scheduling in Single-Hop WDM Networks with Tuning Latencies Ching-Fang Hsu Department of Computer Science and Information Engineering.
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
ECE 667 Synthesis and Verification of Digital Circuits
§3 Shortest Path Algorithms Given a digraph G = ( V, E ), and a cost function c( e ) for e  E( G ). The length of a path P from source to destination.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems Mugurel Ionut Andreica Politehnica University.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Lecture 3. Preview of Markov Process A sequence of random variables X 1, X 2,….,X n,….. such that –X i+1 is independent of X 1,….X i-1 given X i –Pr(X.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
MRF Labeling With Graph Cut CMPUT 615 Nilanjan Ray.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
CS541 Advanced Networking 1 Routing and Shortest Path Algorithms Neil Tang 2/18/2009.
Path Protection in MPLS Networks Using Segment Based Approach.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Interference-aware QoS Routing (IQRouting) for Ad-Hoc Networks Rajarshi Gupta, Zhanfeng Jia, Teresa Tung, and Jean Walrand Dept of EECS, UC Berkeley Globecom.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Replication Mechanisms for a Distributed Time Series Storage and Retrieval Service Mugurel Ionut Andreica Politehnica University of Bucharest Iosif Charles.
Data structures for Bandwidth Reservations and Quality of Service on the Internet Andreas Nilsson Division of Computer Science and Networking Department.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Offline Algorithmic Techniques for Several Content Delivery Problems in Some Restricted Types of Distributed Systems Mugurel Ionut Andreica, Nicolae Tapus.
Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths Mugurel Ionut Andreica Polytechnic University of Bucharest Computer.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
When In-Network Processing Meets Time: Complexity and Effects of Joint Optimization in Wireless Sensor Networks Department of Computer Science, Wayne State.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Maximum Reliability K-Hop Multicast Strategy in Tree Networks Mugurel Ionut Andreica, Nicolae Tapus Polytechnic University of Bucharest Computer Science.
Batch Scheduling of Conflicting Jobs Hadas Shachnai The Technion Based on joint papers with L. Epstein, M. M. Halldórsson and A. Levin.
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
Chun Nie, Thanasis Korakis, and Shivendra Panwar Department of Electrical and Computer Engineering, Polytechnic University, Brooklyn A Multi-hop Polling.
Energy-Saving Scheduling in IEEE e Networks Chia-Yen Lin, and Hsi-Lu Chao Department of Computer Science National Chiao Tung University.
Efficient Data Structures for Online QoS-Constrained Data Transfer Scheduling Mugurel Ionut Andreica, Nicolae Tapus Politehnica University of Bucharest.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Efficient Route Computation on Road Networks Based on Hierarchical Communities Qing Song, Xiaofan Wang Department of Automation, Shanghai Jiao Tong University,
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
CS774. Markov Random Field : Theory and Application Lecture 02
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare TOWARDS A SECURE DATA SHARING PEER-TO-PEER NETWORK BASED ON GEOMETRIC AND.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
CSCI1600: Embedded and Real Time Software Lecture 24: Real Time Scheduling II Steven Reiss, Fall 2015.
Homework 1 Problem 1: (5 points) Both Dijkstras algorihm and Bellmanford Algorithm generates shortest paths to all destinations. Modify the algorithm to.
CSEP 521 Applied Algorithms Richard Anderson Winter 2013 Lecture 3.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Flow Scheduling for Interactive Video Streaming MD Iftakharul Islam (Tamim) Department of Computer Science Kent State University Kent, OH, USA.
Impact of Interference on Multi-hop Wireless Network Performance
Lecture 4.
Abdul Kader Kabbani (Stanford University)
Channel Allocation (MAC)
Peer-to-Peer and Social Networks
CS223 Advanced Data Structures and Algorithms
Lecture 4.
Computational Advertising and
Presentation transcript:

Decision Optimization Techniques for Efficient Delivery of Multimedia Streams Mugurel Ionut Andreica, Nicolae Tapus Politehnica University of Bucharest, Computer Science & Engineering Department

2 Summary Motivation Context Improving Heuristics based on Conflict Graphs Online Analysis of Traffic (Self-) Similarity K th Best Resource Selection Conclusions & Future Work

3 Motivation QoS guarantees for multimedia streams – strictly necessary –minimum required bandwidth –(more or less) constant latency –reduced jitter well-established QoS improvement solution –bandwidth reservation mechanism requires: –new business model from ISPs –lease network links for short(er) durations, but providing guaranteed end-to-end bandwidths –(currently: flat fee lease of constant upload/download bandwidth links; not end-to-end)

4 Context - Data Transfer Scheduling Model (1/2) one (centralized) data transfer manager –knows the network topology (structure) –has full control over the network many data transfer requests –duration (D) (non-preemptive = a contiguous time interval) –earliest start time (ES) –latest finish time (LF) –minimum required bandwidth (B min ) –source (src) –destination (dst) –profit (pr)

5 Context - Data Transfer Scheduling Model (2/2) request handling modes –batch mode (multiple requests at a time) conflicts between the requests in the same batch are modeled by using conflict (hyper-)graphs heuristic algorithms are used in order to (repeatedly) compute maximum weight (profit) independent sets –online mode (1 request at a time) handle the requests in the order of arrival verify if the request can be granted (satisfying the request’s constraints/parameters) grant the request (resource allocation/reservation) or reject it –interpretation of time: time slot-based (discrete) or event- based (continuous) low response times –a complex strategy would take too long –even a simple strategy may take too long! => need some efficient techniques (data structures)

6 Context - Data Transfer Scheduling Framework multiple (interconnected) modules

7 Improving Heuristics based on Conflict Graphs (1/2) pairs of data transfer requests may be in conflict –they require exclusive access to the same network resources, during overlapping time intervals construct a conflict graph CG compute a maximum weight independent set (MWIS) in CG –i.e. select a set of non-conflicting requests with maximum total weight

8 Improving Heuristics based on Conflict Graphs (2/2) computing MWIS : NP-hard heuristics based on repeated vertex extraction –in case of unit weights: as long as CG contains any more edges (conflicts): extract (remove) from CG the vertex with the largest degree algorithm for implementing the above heuristic in O(N+M) time –N=number of vertices in CG –M=number of edges in CG extensions to other types of repeated vertex extraction heuristics (e.g. minimum degree, maximum number of already extracted neighbors, etc.)

9 Online Analysis of Traffic (Self-) Similarity (1/3) 2 arrays tr1 and tr2 of T values (one value per time slot) a function eval(x,y) (e.g. |x-y|) an aggregate function aggf (e.g. +,max) answer efficiently the following types of queries: –Q(a,b,len)=aggf(eval(tr1(a+i), tr2(b+i))) (0≤i≤len-1) self-similarity queries when tr1=tr2 such queries: useful for traffic analysis & traffic pattern detection

10 Online Analysis of Traffic (Self-) Similarity (2/3) we divide the T time slots into T/k groups of k time slots each (the last group may be shorter) group j: time slot interval [left(j),right(j)] –nslots(j)=right(j)-left(j)+1 compute Tagg(i,j)=eval(tr(1)(i+q), tr(2)(left(j)+q)) (0≤q≤nslots(j)-1; 1≤i≤T- nslots(j)+1) => O(T 2 ) preprocessing

11 Online Analysis of Traffic (Self-) Similarity (3/3) Q(a,b,len): can answer in O(1) time for an interval of approx. k slots => O(k+T/k) can also allow updates: change the value of tr1(i) (tr2(i)) to v O(T·k) per update (if aggf is not invertible) O(T) time if aggf has an inverse

12 K th Best Resource Selection each resource (e.g. network path) has d features (e.g. bandwidth, latency, etc.) => modelled as a d-dimensional point –plus a weight (e.g. how valuable it is) select the K th largest weight among all the resources whose d features belong to an orthogonal range –we do not want to always allocate the best resource use a multi-dimensional data structure (for efficient ortogonal range counting queries) + binary search the K th weight

13 Conclusions & Future Work introduced –data transfer scheduling model –data transfer scheduling framework developed techniques for –improving heuristics based on clonflic graphs –online analysis of traffic data –resource selection (and allocation) future work –large-scale testing of the proposed techniques the data transfer scheduling framework is already implemented –develop new algorithms for scheduling multimedia streams

14 Thank You !