A Path-Disjoint Approach for Blocking Probability Analysis in Hybrid Dynamic Wavelength Routed WDM Grooming Networks Kuntal Roy and Mrinal K. Naskar Department of Electronics and Tele-Communication Engineering Jadavpur University, Kolkata - 700 032, India Email: {kuntal [email protected], [email protected]}

Abstract The present paper addresses a novel approach to enhance the overall performance of a WDM optical network. Centralized and distributed approaches for dynamic lightpath establishment are well studied in literature. Both the approaches have some drawbacks. In this article a hybrid approach is proposed to accept advantages and discard disadvantages of the both approaches. With the proposed hybrid approach, a WDM optical network is divided into clusters of nodes. Within a cluster centralized mechanism is applicable whereas connection requests between the node pairs from different clusters follow the distributed mechanism. Also, in this article an analytical model is proposed to compute the expected blocking probability of the proposed hybrid network. First, blocking probabilities for the centralized and distributed approaches are computed and then it is extended for the hybrid approach. The distinguished feature of the proposed analytical model is that it efficiently utilizes the path information of the calls to determine the overall blocking probability of a WDM optical network. It extracts the necessary parameters of a network by simulation and utilize the information to analytically calculate the blocking probability of the network. The NSFNET T1 backbone network is used for the simulation study. To justify the analytical model, the simulation results are compared with that of the analytical model. The simulation results establish the effectiveness of the proposed hybrid approach over distributed approach in merits of both the call setup time and blocking probability.

Keywords: WDM optical networks, dynamic lightpath assignment, traffic grooming, hybrid approach, cluster selection, path-disjoint approach, blocking probability, setup time.

1

Introduction

Wavelength division multiplexing (WDM) is a promising technology in the development of optical networks. Multiple signals distinguished by their wavelengths can be carried through a fiber using WDM technology [1, 2]. A route through which a specific wavelength is assigned to each hop is called a lightpath. If there is no wavelength converter at the nodes, the wavelength assigned to a lightpath should be continuous throughout the route. The objective of the Routing and Wavelength Assignment (RWA) problem is to setup the lightpaths between the source-destination node pairs of a WDM optical network. The challenge is to reduce the blocking-probability while keeping the setup time at a sufficiently moderate value.

1

1.1

Static and Dynamic Traffic

With static traffic the connection requests between the node pairs in a WDM optical network are fixed beforehand. It is advantageous as RWA algorithms can be formed depending on the given traffic matrix. The practical need is to allow traffic that is dynamic in nature. With dynamic traffic the lightpath needs to be set up as the connection requests arrive and it is released after some finite amount of time. In this article the proposed approach deals with the dynamic lightpath establishment.

1.2

Centralized and Distributed Approach

Centralized approach assumes a central agent for routing and wavelength assignment. The central agent has all the up-to-date information of the network. When a request arrives, the central agent determines the route between the source-destination node pair and also assigns a wavelength channel throughout the route. The advantage of the centralized scheme is that a lightpath is always possible to be established at some time if the network can accommodate it. However, always keeping an up-to-date information centrally for a wide-area WDM optical network is a bottleneck and may not be reliable. The problem of centralized scheme can be solved by distributed approach. With distributed approach, each node retains the information of its neighborhood. There is no central concept in distributed approach as the name suggests. The path selection mechanism under distributed approach may be taken dynamically, i.e., each node forwards the request to another node depending on some criteria. But the wavelength selection mechanism under distributed approach has to be taken always by request forwarding and receiving response messages. The disadvantage of such approach is that some call may get blocked even if some wavelength channel can be assigned throughout the route. Also the setup time is increased due to the request forwarding and receiving response messages.

1.3

Traffic Grooming

The reason behind the bandwidth-division of a fiber is that its bandwidth is more than enough to carry a single signal. As the technology progresses, transmission speed of a fiber also increases from OC-48 (2.5 Gbps) to OC-192 (10 Gbps). As there are some constraints (e.g., power consumption) in increasing the number of wavelength channels without limit, the recent trend is to employ TDM slots within the wavelength channel itself. The resulting network configuration is known as WDM-TDM network or WDM grooming network. At each node in the network there are SONET add-drop multiplexers (SADMs) for each wavelength to add or drop signal streams. With traffic grooming the number of SADMs required is decreased by a ratio equal to the grooming capability of the network. Fortunately, it is not necessary for every node to be equipped with SADMs for all wavelengths. The SADM corresponding to a wavelength is required only to transmit or receive the signals at that wavelength. Therefore, cost-effective traffic grooming with SADM minimization is considered as an important issue. In this article it is assumed that every wavelength channel has a fixed number of TDM slots. But, allocation of SADMs is not considered.

2

1.4

Performance Criteria: Blocking Probability And Setup Time

The performance of WDM optical networks is evaluated by the following two criteria: blocking probability and setup time. Blocking probability is calculated by the total number of blocked calls divided by the total number of attempted communications. The total number of attempted communications should be large enough following the theory of probability. The setup time is the waiting time before a communication can be started, i.e., it is a measure of the time required for the selection of a route and the assignment of a wavelength. Obviously, the challenge is to keep the blocking probability as low as possible while limiting the setup time at a moderate value.

1.5

Previous Works

A lot of researches are carried out to enhance the blocking performance of WDM optical networks. In this respect there exist different approaches in the literature. Several approaches using centralized mechanism are proposed in [3-23]. Some of the approaches are valid only for static traffic. Also, some schemes utilize wavelength-converters (e.g., [23]) to enhance the blocking performance of WDM optical networks. In [3], the proposed model is based on the assumption that the wavelength utilization of each link is characterized by a fixed probability. Thus, the model is not applicable for dynamic traffic. An improved model for dynamic traffic is proposed in [4]. A link load correlation model is proposed in [5] by which the blocking probability of a two-hop path can be calculated and the idea can be inductively extended for a multi-hop path. A Markov chain with state-dependent arrival rates to model the blocking in arbitrary network topology is presented in [6]. In [11], fixed-alternate routing is proposed. In [12, 13], heuristic algorithms for routing and wavelength assignment with static traffic are proposed. A graph coloring algorithm is proposed in [14]. Routing under dynamically changing traffic is studied in [16-19]. A dynamic routing method using neighborhood information is proposed in [17]. Least-congested path for routing is suggested in [20, 21] to enhance the blocking performance of WDM optical networks. A new analytical technique based on inclusion-exclusion principle is proposed in [22]. In [24], a graph transformation approach is proposed to efficiently select the route and the consequent wavelength channel. Since the centralized approach is a bottleneck for a wide-area network, a lot of researches are performed to solve the problem of having only one central agent. Accordingly, distributed approaches have gained a lot of attention [25-29]. In [27], three distributed algorithms are proposed and compared. In [29], two basic methods for distributed lightpath establishment source-initiated and destination-initiated routing are studied. In [30], a general routing and wavelength assignment algorithm is developed for multisegment optical networks using the concept of blocking islands (BI). In [31], a method based on blocking islands (BI) paradigm is proposed that maximizes the number of lightpaths between the nodes. However, the proposed distributed node-clustering method (as in [31]) for hierarchical routing has almost the same blocking probability as without clustering. Since traffic grooming in WDM networks are evolving for practical reasons, extensive researches [32-45] are performed considering the grooming capability of wavelength channels in WDM optical networks. Distributed approaches for traffic grooming in WDM optical networks are studied in [38, 39]. In [40], a genetic algorithm for traffic grooming is proposed. Since every node does not require SADMs for all wavelengths, tremendous efforts are exploited to minimize the number of required SADMs with WDM grooming networks.

3

In this respect linear programming solutions are proposed in [41, 42]. In a very recent progress, a genetic evolutionary approach [43] and a heuristic approach [44] are proposed. Since the practical need is to employ dynamic traffic in WDM optical networks, the corresponding analysis signifying the quantitative trade-off between the ADMs and blocking probability is done in [45].

1.6

Proposed Approach: A Hybrid Approach

Since both the centralized and distributed approaches have their corresponding merits and demerits, a new approach (named as hybrid approach) taking only the merits of the both approaches is presented in this article to enhance the overall performance of WDM optical networks. With Hybrid approach a WDM network is clustered into nodes. A cluster should be formed in such a way that inside it centralized mechanism can be well-applicable. For inter-cluster calls (i.e., the calls to be established for node pairs in different clusters), distributed mechanism is suited. Every cluster has one cluster-head to establish the calls inside it and a cluster-heads keeps an up-to-date information of a cluster. However, all the nodes in the network have neighborhood information for inter-cluster calls to be established by distributed mechanism. Whenever a node has to establish a connection with another node in the network, it has the information to determine if the destination node is inside the same cluster or not. If the destination node is inside the same cluster, the respective cluster-head acts as the centralized agent for the cluster and tries to establish the call. Otherwise, if the destination node is not inside the same cluster, the node tries to establish the call using distributed mechanism.

1.7

Path-Disjoint Approach for Blocking Probability Analysis

To illustrate the path-disjoint approach let us consider an example as in Fig. 1. In Fig. 1 there exist four routes: route 1, route 2, route 3, and a new route (shown with a dotted line). It can be observed that the new route overlaps with other three routes whereas the route 1, route 2, and route 3 are disjoint with respect to each other. The routes route 1, route 2, and route 3 can use a same wavelength channel (say wavelength channel 1) and the new route can use another wavelength channel (say wavelength channel 2) to establish the lightpath. So, to accommodate four routes we need only two wavelength channels.

Figure 1: Illustration of path-disjoint approach. Thus, the number of disjoint paths existing in a network at some time instant has a great impact on the wavelength allocation and hence on the blocking performance of the network. It depends on the network configuration and the calls characterized by the source-destination node pairs. Accordingly, the ratio determined by the number of involved 4

wavelength channels to the number of existing routes in a network is the criterion that controls the blocking performance of a WDM optical network. Lower this ratio means that the number of necessary wavelength channels required to establish the same number of routes is less and hence a better blocking performance can be achieved.

1.8

Outline of the Remaining Sections

The remaining sections are organized as follows. Section 2 states the network architecture and assumptions. The proposed analytical model is presented in Section 3. Section 4 does an analysis on time complexity of the proposed analytical model. The simulation algorithm is described in Section 5. Section 6 performs a time-complexity analysis of the simulation algorithm. Simulation results showing the effectiveness of the proposed approach are presented in Section 7. Finally, Section 8 concludes the paper.

2

Network Architecture and Assumptions The network configuration and assumptions are stated below. 1. The WDM network is a connected graph. Accordingly, each node is reachable from any other node in the network. 2. There are N nodes in the network labeled as 1, 2, 3, ..., N . 3. The links between the nodes are bi-directional. Each link between the nodes contains W different wavelength channels. Each channel contains T TDM slots. Accordingly, each link can accommodate W × T number of communications simultaneously. 4. The calls (connection requests) from a node to the other nodes are generated with equal probability. 5. Request arrivals follow the Poisson process with mean rate λ . 6. The service rate µ is assumed to be exponentially distributed with mean of 1 time unit. 7. Shortest path routing is assumed. In case more than one shortest path exists for a source-destination node pair, one of them is chosen arbitrarily depending on the flow of algorithm. 8. A lightpath is characterized by a source-destination node pair (sn, dn). Since there may be N × (N − 1) different source-destination node pairs and only shortest path routing is assumed, there exist N × (N − 1) different possible lightpaths. 9. No wavelength conversion is assumed.

10. For the connection requests under distributed approach, a node may be permitted to initiate more than one try to select another wavelength channel if the previously selected channel is already locked by some other on-going communications. 11. NSFNET T1 backbone network is used for simulation purpose.

5

3

Analytical Model

The proposed analytical model defines a state of the network at which some connection requests (depending on the traffic arrival rate λ) arrive to the network and persist for some finite amount of time depending on the service time µ. Since the blocking probability depends on different network parameters, the proposed analytical model extracts those by simulation and then exploits them to calculate the overall blocking probability of the network analytically. The corresponding steps are given in the following subsequent subsections. Since the experiments are performed over the well-known NSFNET network, the corresponding diagram is drawn in Fig. 2. It has 14 nodes and 21 bi-directional links.

Figure 2: NSFNET T1 Backbone Network (not drawn to scale).

3.1

Capacity Calculation

We define a capacity C of a network by the number of calls that can be accommodated within the network without blocking. Obviously, the capacity depends on the specific calls that persist at some instant of time (defined as state in this article) in the network and accordingly, it is a function of time. But, on averege, we can assume that the network can contain C number of calls at some state without blocking. Since there are N × (N − 1) distinguishable source-destination pairs in a network with N nodes, we have performed simulation for the aforesaid N × (N − 1) calls and extracted the capacity information of the network. We assume that each node has equal probability to be considered as source or destination. If the probability of each node to be source or destination is not same, the calls to be established should be determined accordingly. The corresponding simulation algorithm is given in Appendix I. This algorithm should accord with the RWA algorithm to be used in practical scenario. Also, different probability for the nodes to be source and destination can be assigned. Simulation with NSFNET network (N = 14) results 34 channels for the 182 different calls to be established in the network. This denotes that many of the calls are path-disjoint (as described in sub-section 1.7). We define the overhead of a link between two nodes as the number of busy channels (identified by different wavelengths and consequent slots) along that link. Fig. 3 shows the number of busy channels along the links between the nodes of the NSFNET network. Accordingly, the defined capacity

6

Figure 3: Link overhead for the links in NSFNET Network.

 C =W ×T ×

182 34

 .

(1)

C should be rounded to the nearest integer in case it is not purely integer. The ratio 182/34 denotes the measure of path-disjointness in the network as described in sub-section 1.7. It needs emphasis that the 183th call will increase the number 34 only if the call passes through the link 8 ↔ 9. But, if we go on simulating the next 182 calls, it is obvious that the overhead of the link 8 ↔ 9 will be doubled (during simulation, we are not terminating any existing calls). However, in practice the number 34 will go up or down depending on the termination of some of the previous calls as well as the specific calls present at the current state. If the probability of the nodes being source and destination are not same, the number of calls for the simulation should be generated depending on the probabilities. In this way, this ratio depends not only on the network connectivity matrix but also the probability of the nodes being source and destination and hence both information ae are considered in calculating the capacity of a WDM optical network.

3.2

Average Hop-Length Determination

Average hop-length is an important parameter for a given network. It denotes the amount of connectivity of a network. For a strongly connected network (i.e., the nodes are connected to each other frequently), the average hop-length is less than that of a loosely connected network. For NSFNET network (Fig. 2), the hop-lengths of the sourcedestination node pairs (1, 2), (1, 4), and (1, 11) are 1, 2, and 4, respectively. The average hop-length of a network is calculated by averaging the hop-lengths corresponding to all the distinguishable source-destination node pairs. For the NSFNET network, the average hop-length is calculated as avghop = 2.1758.

3.3

(2)

Link Overhead Calculation

In sub-section A, the simulation performed for network capacity calculation results 34 channels to establish 182 different calls characterized by different source-destination node pairs. The link 8 ↔ 9 with 34 established connections is the maximum congested

7

link in the network. Obviously, it is true only on average basis and depends on the calls distinguished by the source-destination node pairs present at some state in the network. From the results obtained through simulation, a parameter avgLinksOh that denotes the average overhead of the links for a network is determined. It is a measure of link congestion per call and hence this parameter is used to analytically determine the overall blocking probability of a WDM optical network.

avgLinksOh = mean(20, 10, 14, 20, 28, 26, 30, 26, 22, 28, 24, 20, 16, 34, 10, 6, 10, 20, 14, 1, 2, 6)/182 = 0.1306.

3.4

(3)

Cluster Selection

Cluster selection for the proposed hybrid approach is of immense importance as it determines the degree of improvement over distributed approach. At the time of selecting clusters, we have taken the fact into account that having more calls within a cluster eventually improves the overall blocking probability and setup time of a network with respect to the fully distributed approach. Accordingly, an algorithm is formulated to select the clusters so that more number of nodes can be accommodated in a cluster. To implement this concept, we select the node having the maximum neighbors. In case more than one choice are available, a node is selected arbitrarily according to the flow of algorithm. Next, we form a cluster with that node and its available neighbors. In this way, we go on selecting the clusters as long as there are nodes remaining. A simplified algorithm for the same is given in Appendix II. According to the proposed algorithm, three different sets of clusters for NSFNET network are selected. Those are as follows • Cluster Set 1: {(9,8,10,12,13); (5,4,6,7,11); (3,1,2); 14} • Cluster Set 2: {(6,3,5,10,14); (9,8,12,13); (2,1,4); 11; 7} • Cluster Set 3: {(6,3,5,10,14); (8,1,7,9); (11,12,13); (4,2)}. Now, we calculate the probability of having calls within the clusters for a general case. Let us consider that the number of nodes in the network is N , the number of clusters formed is n and the ith cluster contains Cli number of nodes. Then it is obvious that n X

Cli = N.

(4)

i=1

Let the probability of having calls within the ith cluster is cenci . If a source node is selected to be inside the cluster i, the destination node may be any one of the remaining Cli − 1 nodes in that cluster. Since a source node can be any of the nodes inside the cluster,   Cli − 1 cenci = Cli × . (5) N × (N − 1) So, the probability of having calls within the clusters

8

cenc =

n X i=1

cenci =

n X

 Cli ×

i=1

Cli − 1 N × (N − 1)

 .

(6)

For cluster set 1, there are 4 clusters: 2 clusters having 5 nodes each, one cluster having 3 nodes, and the remaining cluster containing only one node. Accordingly, the array Cl for cluster set 1, Cl(c1) = {5, 5, 3, 1}. Similarly, Cl(c2) = {5, 4, 3, 1, 1} and Cl(c3) = {5, 4, 3, 2}. Thus, from equation 6, the probability of having calls within the clusters corresponding to cluster set 1 cencc1 = 0.2528.

(7)

cencc1 = 0.2089

(8)

cencc1 = 0.2198.

(9)

Similarly,

and

During simulation the probabilities get slightly perturbed by the constraint that for a source-destination node pair, both the source and destination nodes cannot be the same node. Even if we have assumed only one-hop neighbors for cluster selection, two or more hop neighbors can be selected depending on the geographical position of the nodes in the network. Selecting multiple-hop neighbors for cluster selection will enhance the number of inter-cluster calls and hence will improve both the call setup time and blocking performance of the network under consideration.

3.5

Blocking Probability for Centralized Approach

Centralized mechanism assumes one central agent that has all the up-to-date information about the channel utilization. Accordingly, if and only if the calls present at some state exceed the capacity of the network, blocking occurs. As discussed in sub-section A, the capacity varies from state to state and it is true only on average basis. Anyway, we have used this parameter to determine the blocking probability analytically. We have assumed that the connection requests arrive at the states with an interval of 1 time unit according to the Poisson process with a mean rate λ . So, if there are R requests, the number of such states S is the integer value of R/λ. At a state there may be calls present in the network that arrived beforehand at some previous state but not terminated yet. If the number of new calls and the previous non-terminated calls present in the network at some state s are ncs and pcs respectively, centralized blocking probability

cencs = P (ncs + pcs > C) = P (ncs > C − pcs ) = 1−

C−pc Xs i=1

9

λi e−λ . i!

(10)

Now, the value of pcs is to be determined. We define the average service time of the calls at state s as delays . It is obvious that there are no non-terminated calls at the first state (state 1) as no calls arrived beforehand. So, pc1 = 0.

(11)

But at state 2, the number of previous calls pc2 is equal to the number of calls at state 1 having service time more than one time unit according to our consideration. Similarly, at state 3 the number of previous calls pc3 is the sum of the number of calls at state 1 having service times more than two time units and the number of calls at state 2 having service times more than one time unit. In this way, the number of previous calls at state s (s > 1)

pcs = =

=

=

=

s−1 X x=1 s−1 X x=1 s−1 X x=1 s−1 X x=1 s−1 X

ncx × P (delayx > s − x) ncx × (1 − P (delayx ≤ s − x)) 

1 ncx × 1 − µ 

Z

s−x



−p/µ

dp

−(s−x)/µ



e p=0



ncx × 1 − 1 − e ncx × e−(s−x)/µ .

(12)

x=1

Accordingly, we can determine the blocking probability at some state s under centralized approach from equation 10. Hence, the average blocking probability for centralized approach can be calculated as bpcen

S 1X = cens S

(13)

s=1

where, S (depends on λ) is the number of states in the model.

3.6

Additional Blocking Probability on a Link for Distributed Approach

With distributed mechanism a call may be blocked even if some free wavelength channel can be allocated throughout the route. For this reason the overall blocking probability under distributed approach is expected to be greater than that of under centralized approach. In this section we determine the additional blocking probability that has to be considered due to distributed approach. If there are W different wavelength channels along the links and each wavelength channel has T TDM slots, the number of possible simultaneous communications is W × T . According to our consideration, at some state s there may be some previous ongoing communication and thus the number of possible simultaneous communications at a current state might be less than W × T . Let us assume that at some state s, x calls among the new calls are using a link and the number of possible simultaneous communications for the link is Cn. In this context 10

we are only considering the blocking for distributed approach for the case when the traffic demand is less than the number of possible simultaneous communications, i.e., x ≤ Cn. If the number of the new calls and the previous non-terminated calls in the network at some state s are pcs and ncs respectively, Cn and x can be assumed as, Cn = W × T − pcs × avgLinksOh

(14)

x = ncs × avgLinksOh.

(15)

and

Now, among the x calls, one call will first lock a free channel and its blocking probability is (x − 1)/Cn (since for the other x − 1 calls, each call has a 1/Cn probability of selecting the same channel. We denote this call to be the 1st call and next calls as 2nd , 3rd , ... subsequently to present the remaining part conveniently. So, the blocking probability of the 1st call along the link is x−1 . (16) Cn Now, the blocking-probability of the 2nd call along that link will be dependent on the blocking of the 1st call. If the 1st call is blocked, the number of free channels will be one more than that of the case if the call is not blocked. So, the blocking-probability of the 2nd call bph1 =

bph2

        x−1 x−1 x−1 x−1 × + × = 1− Cn Cn Cn Cn x−2 x−1 = + Cn Cn2 x−2 . ≈ Cn

(17)

In this way if we go on calculating the blocking probability of the remaining calls, the blocking probability of the mth call is bphm =

x−m Cn

(18)

where x ≥ m. Hence, the blocking probability of the last call bphx = 0.

(19)

It is obvious that if there exists a free channel for a call to be established and there is no competition with the other calls, the blocking probability of the call will be zero. Accordingly, the approximate blocking-probability of all the x calls along a link

bph =

x X

bphi

i=1

=

x X x−1 i=1

=

Cn

x × (x − 1) . 2 × Cn 11

(20)

In practice this blocking probability will vary depending on the number of calls using the link. But, on average, this blocking probability can be used to determine the additional blocking probability analytically for distributed approach.

3.7

Additional Blocking Probability on a Link Involving Number of Tries for Distributed Approach

The blocking probability calculated in the previous section corresponds to the case when for each call, a source node is trying to establish a lightpath (that ends at a destination node) only once. The blocking probability should get reduced when the number of tries is increased more than once. In this section we determine the blocking probability involving a number of tries. Let xn be the number of calls that are trying to establish their corresponding lightpaths and Cnn is the possible simultaneous communication along a link on nth try. Clearly, Cn1 = Cn and x1 = x (Cn and x are defined and determined in the previous section). Accordingly, the additional blocking probability under distributed approach with nth try can be determined as bphtn =

xn × (xn − 1) 2 × Cnn

(21)

where xn =

xn−1 × (xn−1 − 1) 2 × Cnn−1

(22)

and Cnn = Cnn−1 − (xn−1 − xn ).

(23)

Here, (xn−1 − xn ) is the number of calls that are established already with (n − 1)th try. As the number of tries increases, the numerator decreases by square whereas denominator decreases linearly. Accordingly, the blocking probability decreases as the number of tries increases.

3.8

Blocking Probability for Distributed Approach

In this section, we determine the overall blocking probability for distributed approach. Under distributed approach, even if when the total number of calls in the network at some state is not greater than the capacity C of the network, there exists a probability of blocking. First, that additional blocking probability is calculated and then it is added to the centralized blocking probability to get the overall blocking probability of the network under distributed mechanism. The probability that the number of calls in the network is not greater than the network capacity C at some state s is (1−cens ). Accordingly, we can determine the overall blocking probability under distributed approach at some state s as diss = cens − (1 − cens ) × avghop × bphtn

(24)

where avghop is the average hop length as determined in the sub-section B and bphtn is the additional blocking probability on a link with nth try as determined in the sub-section G. So, the average blocking probability under distributed approach can be calculated as 12

S 1X diss S

bpdis =

s=1

S 1X [cens + (1 − cens ) × avghop × bphtn ] S

=

(25)

s=1

where, S (depends on λ) is the number of states in the model.

3.9

Blocking Probability for Hybrid Approach

According to the proposed hybrid approach, some calls use the centralized approach and the rest of the calls use the distributed approach to establish the lightpaths between the node pairs in the network. In sub-section D, we have calculated the probability of having calls within the clusters as cenc. Accordingly, we can determine the blocking probability of the calls using hybrid approach at some state s as hybrids = cenc × cens + (1 − cenc) × diss .

(26)

So, the average blocking probability can be calculated as

bphybrid =

S 1X hybrids S s=1

=

S 1X [cenc × cens + (1 − cenc) × diss ] S

(27)

s=1

where, S (depends on λ) is the number of states in the model. Consequently, the blocking probability for hybrid approach can be calculated as follows bphybrid =

=

S 1X [diss − cenc × (diss − cens )] S

1 S

s=1 S X

[diss − cenc × (1 − cens ) × avghop × bphtn ]

s=1

= bpdis − cenc × avghop × bphtn ×

S 1X (1 − cens ) S s=1

= bpdis − cenc × avghop × bphtn × (1 − bpcen ).

(28)

The above equation presents the reduction of blocking probability for the proposed hybrid approach over distributed approach. It can be noticed that as the probability of having the calls inside the clusters (i.e., cenc) increases, the blocking probability for the hybrid approach decreases that is obvious. Also, we can write the previous equation as follows (with the help of equation 25). bphybrid = bpcen + (1 − cenc) × avghop × bphtn × (1 − bpcen ).

(29)

This equation presents the increase of blocking probability with that of the centralized approach. Also, we can observe from the equation that as cenc increases, bphybrid decreases. 13

4

Time Complexity Of the Analytical Model

The following notations are used to calculate the time complexity of the proposed analytical model. • Capacity of the network = C. • Number of states according to the proposed consideration = S. • Number of tries under distributed consideration = tryn. Time complexity to calculate the number of previous calls at all the states = O(1 + 2 + ... + (S − 1)) = O(S × (S − 1)/2) = O(S 2 ).

4.1

Time Complexity for Centralized Approach

• Time complexity to calculate the blocking probability for all the states = O(C × S). • Time complexity to calculate the average blocking probability = O(S). So, time complexity to calculate the overall blocking probability = O(S 2 +C ×S +S) = O(S × (S + C)).

4.2

Time Complexity for Distributed Approach

• Time complexity to calculate the blocking probability for all the states = O((C + tryn) × S). • Time complexity to calculate the average blocking probability = O(S). So, time complexity to calculate the overall blocking probability = O(S 2 + C × S + tryn × S + S) = O(S × (S + C + tryn)).

4.3

Time complexity for Hybrid Approach

Time complexity to calculate the overall blocking probability = O(S 2 + C × S + tryn × S + S) = O(S × (S + C + tryn)).

5

Algorithms for Simulation

In this section the simulation algorithm employed in this article is described. Connections between the nodes of the network are assumed to be bi-directional. An 1 in the connection matrix denotes a connection between the two nodes and a 0 denotes no connection. The entry at the (i, i)th positions (1 ≤ i ≤ N ) in the connectivity matrix is assumed as 1.

5.1

Algorithm for Centralized Approach

To establish the calls inside the clusters using centralized mechanism, the shortest path routing and first-fit or random wavelength assignment are considered as RWA algorithm. The corresponding algorithm is given in Appendix III.

14

5.2

Algorithm for Distributed Approach

With distributed mechanism, the shortest path algorithm is selected as routing strategy. For wavelength assignments, first, the source node determines the wavelength channels and consequent slots that can be used for a communication by request-response messaging. Then the source node selects a wavelength channel and a consequent slot on first-fit or random selection basis. The same goes on by putting locks on the links for the selected wavelength channels and consequent slots. If conflicts occur due to some other ongoing communication, the call is blocked and it is communicated back to the source node. The corresponding algorithm is given in Appendix IV.

5.3

Algorithm for Hybrid Approach

When a connection request is to be established, the source node has the information to decide if it can be established by centralized mechanism or not and accordingly, centralized or distributed algorithm comes into play.

6

Simulation Complexity Analysis

To calculate the time complexity of the proposed algorithm, we have used the following notation. • Number of nodes in the network = N . • Number of wavelength channels in each link of the network = W . • Number of TDM slots in each wavelength channel = T . • Number of tries under distributed approach = tryn. • Average number of hops for a source-destination node pair = P . • Number of clusters under hybrid approach = nc. • Number of nodes in the largest cluster = mn. Accordingly, • Time required to determine the shortest path = O(P ). • Time required for selection of clusters = O(N 2 ). // Ref. Appendix I // • Time required to check if a call corresponds to inside some cluster = O(nc × mn). • Time required for wavelength assignment = O(P × W × T ). • Time required to establish a lightpath with distributed mechanism = O(P × tryn). // Ref. Appendix III //

15

7

Simulation Results

In this section we present the simulation results. The experiments are done on wellknown NSFNET network. The network architecture and assumptions are described in Section 2. All the simulation results are averaged 30 times to get a fairly accurate picture. The Figs. 4, 5, and 6 show the variation of blocking probability with respect to the overall capacity (i.e., the number of wavelength channels multiplied by the the number of TDM slots in each channel) for variation of different parameters and different approaches considered. The results are also compared with the corresponding analytical results. Hybrid-1 denotes the hybrid approach corresponding to the cluster set 1 (described in sub-section 3.4) and it is similarly for Hybrid-2 and Hybrid-3.

Figure 4: Capacity of Links vs. Blocking Probability for both simulation and analytical model under centralized approach using first-fit mechanism with λ = 15, µ = 1. In Fig. 4, it can be noticed that as the capacity of the links is increased, the analytical and simulation results accord more closely. The difference varies from simulation to simulation and it is dependent on the random generation of the calls as well as on their service times. The reason is described in the sub-section 3.1. However, the trend of the curves is quite similar. In Fig. 5, it can be verified that the hybrid mechanism performs better than the distributed approach with respect to blocking probability. The hybrid mechanism with cluster set 1 (Hybrid-1) performs better than the two other hybrid mechanisms as expected. In Fig. 6, it can be observed that the random wavelength selection mechanism performs better than the first-fit mechanism. Fig. 7 shows that as traffic arrival rate increases, the blocking probability also increases that is quite obvious. Also, the trend of the curves (simulation and analytical model) is quite similar. Fig. 8 shows that as the traffic arrival rate is increased the blocking performance deteriorates. The Hybrid-1 approach performs better than the other approaches as expected. In Fig. 9, the comparison between the first-fit and random wavelength selection mechanisms is performed with respect to the traffic arrival rate. It is found that the random 16

Figure 5: Capacity of Links vs. Blocking Probability for both simulation and analytical model under distributed and hybrid approaches using random wavelength selection mechanism with λ = 15, µ = 1, tryn = 5. selection mechanism for wavelength assignment performs better. Also, it can be noticed that the Hybrid-1 mechanism performs better than the other approaches. Fig. 10 shows that as the number of tries for lightpath establishment under distributed approach is increased, the blocking probability decreases. But, after sufficient increase of the number of tries, the blocking probability is going to be saturated since no free channel exists to accommodate a call. For distributed approach as the number of tries increases, the difference between the analytical and simulation results is getting prominent since it is becoming more dependent on the presence of different specific calls and their service times. From the simulation result as in Fig. 11 it is found that as the capacity of links is increased, setup time also increases. Hybrid-1 mechanism has the lowest setup time among the curves shown in the figure. Fig. 12 shows the variation of setup time with traffic arrival rate. It can be observed that the Hybrid-1 mechanism performs better than the other approaches as expected. In Fig. 13 it is shown by simulation that as the number of tries is increased, the setup time also increases that is quite expected. Here, also the Hybrid 1 mechanism performs better than the others.

8

Conclusions

In this paper a hybrid approach is proposed to improve both the call set-up time and blocking performance of WDM optical networks over distributed approach. Also, a new analytical model is proposed to determine the blocking probability of the corresponding hybrid network. The analytical model is widely applicable in the sense that it extracts the necessary parameters of a network by simulation and in this way all the information, e.g., network topology, effect of employing different RWA algorithms, traffic pattern are

17

Figure 6: Capacity of Links vs. Blocking Probability for simulation under distributed and hybrid approaches using both the first-fit and random wavelength selection mechanisms with λ = 15, µ = 1, tryn = 5. encoded in the extracted parameters that are used to analytically determine the blocking probability of a WDM optical network. For experimental purpose shortest path routing algorithm, first-fit or random wavelength assignment, and equal probability for a node to be source or destination are assumed. However, any existing RWA algorithm along with different probability of a node being source or destination can be used. For the cluster selection algorithm, we have selected only the immediate neighbors. However, the clusters can be selected depending on the geographical positions of the nodes in the network. Both the analytical and simulation results justify the effectiveness of the proposed hybrid approach over distributed approach in merit of both the call set-up time and blocking probability. Appendix I. Algorithm for Network Capacity Calculation For the calls characterized by the set of different source-destination node pairs, simulation is performed to determine the number of necessary wavelength channels along each link between the nodes. Step1: For each call corresponding to different source-destination node pairs Repeat Step2 to Step5. Step2: Find the shortest path between the source-destination node pair. Step3: Assign a continuous wavelength channel throughout the path for the communication to be established. Step4: If a new wavelength channel is needed to establish the call then introduce it. Step5: Update the number of wavelength channels along the links between the nodes. Appendix II. Algorithm of Selecting Clusters The procedure of selecting clusters is given below in a simple step-wise manner.

18

Figure 7: Traffic Arrival Rate vs. Blocking Probability for both simulation and analytical model under centralized approach using first-fit mechanism with W = 8, T = 1, µ = 1. Step1: Until all the nodes are in clusters Repeat Step2 to Step4. Step2: Select a node n for which it has the maximum number of connections to its neighborhood. // If duplicates found, select one of them arbitrarily. // Step3: Make a cluster taking the node n and its neighbors. Step4: Exclude the nodes that are already considered to be inside the cluster for the next iteration. Appendix III. Algorithm for Centralized Approach The algorithm used in this article to establish the calls using centralized approach is given below. Step1: For each call in the simulation Repeat Step2 to Step5. Step2: Select a source-destination node pair for a lightpath to be established. // Selection of a source-destination node pair is generated with uniform distribution as we have assumed that each node has equal probability to be source or destination. // Step3: Find the shortest path between the source-destination node-pair. Step4: Try to assign a continuous wavelength channel and consequent slot for the communicationto be established. // In this article first-fit and random assignment of a wavelength channel and a consequent slot is considered when there exist multiple choices. // Step5: If the lightpath can not be established, block the call. Appendix IV. Algorithm for Distributed Approach 19

Figure 8: Traffic Arrival Rate vs. Blocking Probability for both simulation and analytical model under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, µ = 1, tryn = 1. The algorithm to establish calls using distributed approach is described below. Step1: For each call in the simulation Repeat Step2 to Step5. Step2: Select a source-destination node pair for a lightpath to be established. // Selection of source-destination node pair is generated with uniformdistribution as we have assumed that each node has equal probability to be source or destination. // Step3: path ← Find the shortest path between the source and destination node-pair. Let the path consists of k + 1 number of hops with the nodes p0 → p1 → ... → pk+1 where p0 is the source node and pk+1 is the destination node. Step4: Determine the wavelength channel and slot information (W T ) that can be used for the communication. Assign W T as empty. For i = 0 to k Forward request message from node pi to pi+1 . W Ti ← the wavelength channels and consequent free slots along the link pi → pi+1 . W T ← W Ti ∩ W T . If WS is empty then

20

Figure 9: Traffic Arrival Rate vs. Blocking Probability for simulation under distributed and hybrid approaches using both the first-fit and random selection mechanism with W = 8, T = 3, µ = 1, tryn = 1. Send response message back to the source node p0 that the call is blocked. End End If call is not already blocked then Send response message containing the wavelength channel and slot information (W T ) from the destination node to the source node that the corresponding channels can be used for the communication. End Step5: Try to establish the call. noF reeChannels ← number of entries in W T . actualT ry ← minimum of the values noF reeChannels and tryn. // tryn is the maximum number of attempts that is permitted // For try = 1 to actualT ry wt ← Select an entry from the available set W T . // In this article we have selected an entry depending on first-fit or random selection basis. // For i = 1 to k+1 Try to put a lock on the link pi−1 → pi corresponding to the entry wt. If some ongoing communication has already locked the channel pi−1 → pi then 21

Figure 10: Number of Tries vs. Blocking Probability for both simulation and analytical model under distributed and hybrid approach using random wavelength selection mechanism with W = 8, T = 1, λ = 15, µ = 1. Send response message toward source node that the communication is blocked. Release locks from the previous links (if exists) of the path. Else Put a lock on the link pi−1 → pi . Release the lock from the previous link (if exists) of the path. (This is unlike in [27] where locks exist on the path throughout the communication until the communication is blocked or completed. This approach is intended to avail of the free resources if required by some other communication and hence to improve the blocking performance of the network.) End End End

References [1] B. Mukherjee. Optical Communication Networks. New York: McGraw-Hill, 1997. [2] R. Ramaswami and K. N. Sivarajan. Optical Networks: A Practical Perspective. Morgan Kaufman Publisers, 1998. [3] R. A. Barry and P. A. Humblet. Models of Blocking Probability in All-Optical Networks with and Without Wavelength Changers. 14(5):858–867, June 1996. 22

Figure 11: Capacity of Links vs. Setup Time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with λ = 15, µ = 1, tryn = 5. [4] R. A. Barry and D. Marquis. An Improved Model of Blocking Probability in AllOptical Networks. In 1995 Digest of the LEOS Summer Topical Meetings, pages 43–44, 7-1 August 1995. [5] S. Subramaniam, M. Azizoglu, and A. K. Somani. All-Optical Networks with Sparse Wavelength Conversion. 4(4):544–557, August 1996. [6] A. Birman. Computing Approximate Blocking Probabilities for a Class of All-Optical Networks. 14(5):852–857, June 1996. [7] R. Ramaswami and K. N. Sivarajan. Routing and Wavelength Assignment in AllOptical Networks. 3(5):858–867, October 1996. [8] A. Mokhtar and M. Azizoglu. Adaptive Wavelength Routing in All-Optical Networks. 6(2):197–206, April 1996. [9] S. Chung, A. Kashper, and K. W. Ross. Computing Approximate Blocking Probabilities for Large Loss Networks with State-Dependent Routing. 1(1):105–115, February 1993. [10] A. Sridharan and K. N. Sivarajan. Blocking in All-Optical Networks. 12(2):384–397, April 2004. [11] R. Ramamurthy and B. Mukherjee. Fixed-Alternate Routing and Wavelength Conversion in Wavelength-Routed Optical Networks. 10(3):351–367, June 2002. [12] U. Biswas, M. K. Naskar, A. Mukhopadhyay, and U. Maulik. A Heuristic Algorithm for Static Wavelength Assignment in WDM Optical Networks. IETE Technical Review, 22(3):199–204, May-June 2005.

23

Figure 12: Traffic Arrival Rate vs. Setup Time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, µ = 1, tryn = 5. [13] M. K. Naskar, T. Sarkar, U. Biswas, and S. K. Sarkar. An Efficient Heuristic for Static Wavelength Assignment in WDM Optical Networks. In Conf. HOT 2003, page 83, Calcutta, India, February 2003. [14] S. Jana, S. Chowdhury, M. K. Naskar, D. Saha, and A. Mukherjee. Assigning Wavelengths in WDM Optical Networks using an Efficient Graph Coloring Algorithm. International Journal of Information and Computing Science, 4(2), December 2001. [15] D. Saha, M. K. Naskar, and A. Mukherjee. Novel Approach for Assigning Wavelengths in WDM All-Optical Networks (AON). In Int. Conf. APOC 2001, China, November 2001. [16] K. Roy, M. K. Naskar, and U. Biswas. Adaptive Dynamic Wavelength Routing for WDM Optical Networks. In 3rd Int. Conf. On Wireless and Optical Communications Networks (WOCN) - 2006, IEEE Communication Society, Bangalore, India, 11-13 April 2006. [17] L. Li and A. K. Somani. Dynamic Wavelength Routing Using Congestion and Neighborhood Information. 7(5):779–786, October 1999. [18] S. Subramaniam and R. A. Barry. Dynamic Wavelength Assignment in Fixed Routing WDM Networks. In Proc. IEEE Int. Conf Communications (ICC’97), pages 406–410, Qucbuc, Canada, 11-13 April 1997. [19] X. Zhang and C. Qiao. Wavelength Assignment for Dynamic Traffic in Multi-fiber WDM Networks. In IEEE ICCCN, pages 479–485, October 1998. [20] K. Chan and T. P. Yum. Analysis of Least Congested Path Routing in WDM Lightwave Networks. In Proc. IEEE INFOCOM’94, pages 962–969, Toronto, ON, Canada, June 1994. 24

Figure 13: Number of Tries vs. Setup Time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, λ = 15, µ = 1. [21] L. Li and A. K. Somani. Blocking Performance Analysis of Fixed-Paths LeastCongestion Routing in Multifiber WDM Networks. In Proc. SPIE Photonics East’99, pages 56–67, Boston, MA, USA, 1999. [22] A. Sridharan and K. N. Sivarajan. Blocking in All-Optical Networks. In Proc. IEEE INFOCOM, pages 990–999, March 2000. [23] K. Roy. A Simple Approach for Optimal Allocation of Wavelength Converters in WDM Optical Networks. In 4th Int. Conf. On Wireless and Optical Communications Networks (WOCN) - 2007, IEEE Communication Society, Grand Hyatt, Singapore, 2-4 July 2007. [24] Y. Zhang, K. Taira, H. Takagi, and S. K. Das. An Efficient Heuristic for Routing and Wavelength Assignment in Optical WDM Networks. In ICOIN 2002, LNCS 2343, pages 291–304, 2002. [25] R. Ramaswami and A. Segall. Distributed Network Control for Wavelength Routed Optical Networks. In Proc. IEEE INFOCOM’96, volume 1, pages 138–147, 1996. [26] X. Yuan, R. Melhem, R. Gupta, Y. Meim, and C. Qiao. Distributed Control protocols for Wavelength Reservation and Their Performance Evaluation. Photonic Network Communications, 1(3):207–218, November 1999. [27] A. Sengupta, S. Bandyopadhyay, A. R. Balla, and A. Jackel. Algorithms for Dynamic Routing in All-Optical Networks. Photonic Network Communications, 2(2):163–184, May 2000. [28] A. Mukhopadhyay, U. Biswas, and M. K. Naskar. Distributed Routing and Wavelength Assignment Algorithms for Dynamic WDM All-Optical Networks. In International Conf. PHOTONICS - 2004, page NET P.2, Cochin, India, December 2004. 25

[29] L. Kejie, G. Xiao, and I. Chlamtac. Analysis of Blocking Probability for Distributed Lightpath Establishment in WDM Optical Networks. 13(1):187–197, February 2005. [30] D. Zhemin and M. Hamdi. Routing and Wavelength Assignment in Multi-Segment WDM Optical Networks using Clustering Techniques. Photonic Network Communications, 8(1):55–67, June 2004. [31] Y. Fukushima, H. Harai, S. Arakawa, and M. Murata. A Distributed Clustering Method for Hierarchical Routing in Large-Scaled Wavelength Routed Networks. IEICE Transactions on Communications, E88-B(10):3904–3913, October 2005. [32] A. L. Chiu and E. H. Modiano. Traffic Grooming Algorithms for Reducing Electronic Multiplexing Costs in WDM Ring Networks. Journal of Lightwave technology, 18(1):2–12, January 2000. [33] E. Modiano and P. J. Lin. Traffic Grooming in WDM Networks. 39(7):124–129, July 2001. [34] R. Berry and E. Modiano. Reducing Electronic Multiplexing Costs in SNET/WDM Rings with Dynamically Changing Traffic. 18(10):1961–1971, October 2000. [35] R. Srinivasan and A. K. Somani. Dynamic Routing in WDM Grooming Networks. Photonic Network Communications, 5(2):123–135, March 2003. [36] R. Srinivasan and A. K. Somani. Request-Specific Routing in WDM Grooming Networks. In Proc. IEEE ICC, pages 2876–2880, April-May 2002. [37] D. Zhemin and M. Hamdi. Traffic Grooming in Optical WDM Mesh Networks Using the Blocking Island Paradigm. Optical Networks Magazine, 4(6), November-December 2003. [38] A. Mukhopadhyay, J. K. Singh, U. Biswas, and M. K. Naskar. Distributed Approaches for Dynamic Traffic Grooming in WDM Optical Networks. In International Conf. CODEC-04, pages P–55, Calcutta, India, January 2004. [39] A. Mukhopadhyay, J. K. Singh, U. Biswas, and M. K. Naskar. Improved Distributed Approaches for Dynamic Traffic Grooming in WDM Optical Networks. In DPN’04, pages 92–96, IIT Kharagpur, India, 11-13 June 2004. [40] A. Mukhopadhyay, U. Biswas, and M. K. Naskar. A Genetic Algorithm for Traffic Grooming in Unidirectional SONET/WDM Rings. In IEEE India Annual Conference 2004, INDICON, pages 252–255, IIT Kharagpur, India, 20-22 December 2004. [41] J. Wang, W. Cho, V. Rao Vemuri, and B. Mukherjee. Improved Approaches for CostEffective Traffic Grooming in WDM Ring Networks: ILP Formulations and SingleHop and Multihop Connections. Journal of Lightwave Technology, 19(11), November 2001. [42] J. Hu. Traffic grooming in wavelength-division-multiplexing ring networks: a linear programming solution. Journal of Optical Networking, 1(11), November 2002. [43] K. Roy and M. K. Naskar. Genetic evolutionary algorithm for static traffc grooming to SONET over WDM optical networks. Journal of Computer Communication, Elsevier, 30(17):3392–3402, November 2007. 26

[44] K. Roy and M. K. Naskar. A heuristic solution to SONET ADM minimization for static traffic grooming in WDM uni-directional ring networks. Photonic Network Communications, 12(2):153–160, September 2006. [45] K. Roy and M. K. Naskar. Simulation-Based SADM Optimization Approach for Dynamic Traffic Grooming in WDM Optical Networks. Accepted in Photonic Network Communications, 16(1):11–21, August 2008.

27

A Path-Disjoint Approach for Blocking Probability ...

Department of Electronics and Tele-Communication Engineering. Jadavpur ... mation of the calls to determine the overall blocking probability of a WDM optical network. ..... With distributed mechanism a call may be blocked even if some free wavelength chan- ..... IEEE Int. Conf Communications (ICC'97), pages 406–410,.

628KB Sizes 0 Downloads 248 Views

Recommend Documents

A path-disjoint approach for blocking probability ... - Springer Link
Mar 20, 2009 - in hybrid dynamic wavelength routed WDM grooming networks ...... [44] Roy, K., Naskar, M.K.: A heuristic solution to SONET ADM min-.

Efficient Spectral Neighborhood Blocking for ... - Computer Science
spectral clustering, based on different ways of normalization. We use the above ...... european language text retrieval,” Information Retrieval, vol. 7, no. 1, pp.

Complex Indices and a Blocking Account of the ...
Complex Indices and a Blocking Account of the Sequence of Tenses. Serge Minor .... when the interpretive component can no longer access them (cf. Kratzer ...

Avoidance versus use of neuromuscular blocking agents for improving ...
... adults and adolescents.pdf. Avoidance versus use of neuromuscular blocking agents f ... on or direct laryngoscopy in adults and adolescents.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Avoidance versus use of neuromuscular blocki

Efficient Spectral Neighborhood Blocking for Entity ... - Semantic Scholar
106, no. 50, pp. 21 068–21 073, 2009. [23] G. Salton, A. Wong, and C. S. Yang, “A vector space model for automatic indexing,” Communications of the ACM, vol. 18, no. 11, pp. 613–620, 1975. [24] P. McNamee and J. Mayfield, “Character п-gram

Blocking the School Schedule: Potential for ...
apply academic learning to important, realistic problems" (Newmann & Wehlege, 1995). Authentic ...... Princeton, New Jersey: Eye on Education. Conley, D. T. ...

Blocking the School Schedule: Potential for ...
College of Education and Human Development ... students more opportunities for enrolling in courses to meet local and state .... at block scheduling alongside the characteristics of science education reform and ..... computer hard of software. .....

Efficient Spectral Neighborhood Blocking for ... - Research at Google
supply chain management, and users in social networks when ... This, however, poses a great challenge for resolving entities ... (BI) [10], and canopy clustering (CC) [11]. SN is one of the most computationally efficient blocking algorithms in.

A Unifying Probability Measure for Logic-Based ...
Mar 25, 2011 - Institute of Computer Science ..... Boolean attribute BA we specify its sample space as ΩBA := ... ⊥BA represents all domain values which do.

A Unifying Probability Measure for Logic-Based ...
Mar 25, 2011 - A Boolean logic-based evaluation of a database query re- turns true on match and ... vance [16]: What is the probability that a user rates a data object as relevant? ...... and Mining Uncertain Data, chapter 6. Springer-Verlag ...

iOS 9 Content Blocking Strategies.pdf
iOS 9 Content Blocking Strategies.pdf. iOS 9 Content Blocking Strategies.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying iOS 9 Content Blocking ...

A Statistical Model for Estimating Probability of Crack ...
Index Terms—Detection, Inspection, Health monitoring, ... Alexandra Coppe is Graduate Research Assistant with University of ... France (email: [email protected]).

US President Blocking Twitter Users.pdf
2 days ago - they stipulate to the underlying facts so that the legal issues presented by. this dispute could be addressed without the need to undertake a ...

Blocking Calls in Java - Semantic Scholar
Chapter 3. Blocking Calls. This chapter describes the main contribution of this ... since there is no way to return a meaningful value from a suspended method ...

Wishbone Blocking Scheme - Andrew Ward.pdf
Page 3 of 6. Whoops! There was a problem loading this page. Retrying... Wishbone Blocking Scheme - Andrew Ward.pdf. Wishbone Blocking Scheme - Andrew Ward.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Wishbone Blocking Scheme - Andrew

Download Probability & Statistics for Engineers ...
Book synopsis. ALERT: Before you purchase, check with your instructor or review your course syllabus to ensure that you select the correct ISBN. Several ...

Blocking Calls in Java - Semantic Scholar
FACULTY OF MATHEMATICS AND COMPUTER SCIENCE. Institute of Computer Science. Rein Raudjärv. Blocking Calls in Java. Bachelor thesis (4 AP).

Truly Non-blocking Writes
accessed by a machine instruction (e.g., LOAD or STORE) causing a page fault, or (2) a system call accesses the ... Researchers have already begun designing hybrid memory systems and flash-based virtual memory .... though these implementations are hi

155504554-SOLUTION-MANUAL-Probability-Statistics-for-Engineers ...
Contents. 1 Introduction to Statistics and Data Analysis 1. 2 Probability 11 ..... 155504554-SOLUTION-MANUAL-Probability-Statistics-for-Engineers-Scientists-9th-Edition-Walpole.pdf ... Open. Extract. Open with. Sign In. Main menu. Displaying ...

OPTIMAL PROBABILITY INEQUALITIES FOR ...
§Department of Discrete Mathematics, Adam Mickiewicz University, Umultowska 87, 61-614. Poznan, Poland ([email protected]). ¶This research was ...