Written while studying the course Advanced Computer Networks:
Queuing theory
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
XSS is much more than just <script>alert(1)</script>. Thousands of unique vectors can be built and more complex payloads to evade filters and WAFs. In these slides, cool techniques to bypass them are described, from HTML to javascript. See also http://brutelogic.com.br/blog
GeoMesa on Apache Spark SQL with Anthony FoxDatabricks
GeoMesa is an open-source toolkit for processing and analyzing spatio-temporal data, such as IoT and sensor-produced observations, at scale. It provides a consistent API for querying and analyzing data on top of distributed databases (e.g. HBase, Accumulo, Bigtable, Cassandra) and messaging networks (e.g. Kafka) to handle batch analysis of historical archives of data and low-latency processing of data in-stream.
GeoMesa has deep integration with Spark SQL. It has added spatial types (e.g. Point, LineString, Polygons), spatial predicates (st_contains, st_intersects, etc.), and geometry processing functions (e.g. st_buffer, st_convexHull, etc.) to Spark SQL. It also optimizes the processing of these extensions by integrating with the Catalyst SQL optimizer to intercept SQL statements with spatial predicates and provision RDDs based on the underlying spatial index.
This session will describe the implementation of the GeoMesa Spark SQL integration, illustrate its application in production systems and demonstrate spatial aggregations and analytics using map-based visualizations.
KSQL Performance Tuning for Fun and Profit ( Nick Dearden, Confluent) Kafka S...confluent
Ever wondered just how many CPU cores of KSQL Server you need to provision to handle your planned stream processing workload ? Or how many GBits of aggregate network bandwidth, spread across some number of processing threads, you'll need to deal with combined peak throughput of multiple queries ? In this talk we'll first explore the basic drivers of KSQL throughput and hardware requirements, building up to more advanced query plan analysis and capacity-planning techniques, and review some real-world testing results along the way. Finally we will recap how and what to monitor to know you got it right!
Following presentation gives the brief view about dynamic memory allocation used for allocating space at runtime.
Go through the slides hope it will be helpful to get the basic knowledge about the dynamic memory allocation.
Please comment and shares your views.
XSS is much more than just <script>alert(1)</script>. Thousands of unique vectors can be built and more complex payloads to evade filters and WAFs. In these slides, cool techniques to bypass them are described, from HTML to javascript. See also http://brutelogic.com.br/blog
GeoMesa on Apache Spark SQL with Anthony FoxDatabricks
GeoMesa is an open-source toolkit for processing and analyzing spatio-temporal data, such as IoT and sensor-produced observations, at scale. It provides a consistent API for querying and analyzing data on top of distributed databases (e.g. HBase, Accumulo, Bigtable, Cassandra) and messaging networks (e.g. Kafka) to handle batch analysis of historical archives of data and low-latency processing of data in-stream.
GeoMesa has deep integration with Spark SQL. It has added spatial types (e.g. Point, LineString, Polygons), spatial predicates (st_contains, st_intersects, etc.), and geometry processing functions (e.g. st_buffer, st_convexHull, etc.) to Spark SQL. It also optimizes the processing of these extensions by integrating with the Catalyst SQL optimizer to intercept SQL statements with spatial predicates and provision RDDs based on the underlying spatial index.
This session will describe the implementation of the GeoMesa Spark SQL integration, illustrate its application in production systems and demonstrate spatial aggregations and analytics using map-based visualizations.
KSQL Performance Tuning for Fun and Profit ( Nick Dearden, Confluent) Kafka S...confluent
Ever wondered just how many CPU cores of KSQL Server you need to provision to handle your planned stream processing workload ? Or how many GBits of aggregate network bandwidth, spread across some number of processing threads, you'll need to deal with combined peak throughput of multiple queries ? In this talk we'll first explore the basic drivers of KSQL throughput and hardware requirements, building up to more advanced query plan analysis and capacity-planning techniques, and review some real-world testing results along the way. Finally we will recap how and what to monitor to know you got it right!
Following presentation gives the brief view about dynamic memory allocation used for allocating space at runtime.
Go through the slides hope it will be helpful to get the basic knowledge about the dynamic memory allocation.
Please comment and shares your views.
Written while studying the course Advanced Computer Networks:
Queuing theory 2
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Written while studying the course Advanced Computer Networks:
Queuing theory 6
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Written while studying the course Advanced Computer Networks:
Queuing theory 1
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Numericals on Moisture Content, Density, Energy content, Methane gas generation, Estimation of amount of oxygen required and Energy content by Modified Dulong Formula
Đại lý dây điện Cadivi 3.5 tại Tphcm chiết khấu caoVõ Thành Tiến
Đại lý dây điện Cadivi 3.5 tại Tphcm chiết khấu cao
Bảng giá dây điện cadivi mới nhất
Chiết khấu dâ điện Cadivi 2018 mới nhất tại Tphcm
https://thietbidandung.vn/day-cap-dien-cadivi
About TrueTime, Spanner, Clock synchronization, CAP theorem, Two-phase lockin...Subhajit Sahu
TrueTime is a service that enables the use of globally synchronized clocks, with bounded error. It returns a time interval that is guaranteed to contain the clock’s actual time for some time during the call’s execution. If two intervals do not overlap, then we know calls were definitely ordered in real time. In general, synchronized clocks can be used to avoid communication in a distributed system.
The underlying source of time is a combination of GPS receivers and atomic clocks. As there are “time masters” in every datacenter (redundantly), it is likely that both sides of a partition would continue to enjoy accurate time. Individual nodes however need network connectivity to the masters, and without it their clocks will drift. Thus, during a partition their intervals slowly grow wider over time, based on bounds on the rate of local clock drift. Operations depending on TrueTime, such as Paxos leader election or transaction commits, thus have to wait a little longer, but the operation still completes (assuming the 2PC and quorum communication are working).
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Written while studying the course Advanced Computer Networks:
Queuing theory 2
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Written while studying the course Advanced Computer Networks:
Queuing theory 6
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Written while studying the course Advanced Computer Networks:
Queuing theory 1
Queueing theory is the mathematical study of waiting lines, or queues.[1] A queueing model is constructed so that queue lengths and waiting time can be predicted.[1] Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide a service.
Numericals on Moisture Content, Density, Energy content, Methane gas generation, Estimation of amount of oxygen required and Energy content by Modified Dulong Formula
Đại lý dây điện Cadivi 3.5 tại Tphcm chiết khấu caoVõ Thành Tiến
Đại lý dây điện Cadivi 3.5 tại Tphcm chiết khấu cao
Bảng giá dây điện cadivi mới nhất
Chiết khấu dâ điện Cadivi 2018 mới nhất tại Tphcm
https://thietbidandung.vn/day-cap-dien-cadivi
About TrueTime, Spanner, Clock synchronization, CAP theorem, Two-phase lockin...Subhajit Sahu
TrueTime is a service that enables the use of globally synchronized clocks, with bounded error. It returns a time interval that is guaranteed to contain the clock’s actual time for some time during the call’s execution. If two intervals do not overlap, then we know calls were definitely ordered in real time. In general, synchronized clocks can be used to avoid communication in a distributed system.
The underlying source of time is a combination of GPS receivers and atomic clocks. As there are “time masters” in every datacenter (redundantly), it is likely that both sides of a partition would continue to enjoy accurate time. Individual nodes however need network connectivity to the masters, and without it their clocks will drift. Thus, during a partition their intervals slowly grow wider over time, based on bounds on the rate of local clock drift. Operations depending on TrueTime, such as Paxos leader election or transaction commits, thus have to wait a little longer, but the operation still completes (assuming the 2PC and quorum communication are working).
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting Bitset for graph : SHORT REPORT / NOTESSubhajit Sahu
Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is commonly used for efficient graph computations. Unfortunately, using CSR for dynamic graphs is impractical since addition/deletion of a single edge can require on average (N+M)/2 memory accesses, in order to update source-offsets and destination-indices. A common approach is therefore to store edge-lists/destination-indices as an array of arrays, where each edge-list is an array belonging to a vertex. While this is good enough for small graphs, it quickly becomes a bottleneck for large graphs. What causes this bottleneck depends on whether the edge-lists are sorted or unsorted. If they are sorted, checking for an edge requires about log(E) memory accesses, but adding an edge on average requires E/2 accesses, where E is the number of edges of a given vertex. Note that both addition and deletion of edges in a dynamic graph require checking for an existing edge, before adding or deleting it. If edge lists are unsorted, checking for an edge requires around E/2 memory accesses, but adding an edge requires only 1 memory access.
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Experiments with Primitive operations : SHORT REPORT / NOTESSubhajit Sahu
This includes:
- Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
- Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
- Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
- Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Adjusting OpenMP PageRank : SHORT REPORT / NOTESSubhajit Sahu
For massive graphs that fit in RAM, but not in GPU memory, it is possible to take
advantage of a shared memory system with multiple CPUs, each with multiple cores, to
accelerate pagerank computation. If the NUMA architecture of the system is properly taken
into account with good vertex partitioning, the speedup can be significant. To take steps in
this direction, experiments are conducted to implement pagerank in OpenMP using two
different approaches, uniform and hybrid. The uniform approach runs all primitives required
for pagerank in OpenMP mode (with multiple threads). On the other hand, the hybrid
approach runs certain primitives in sequential mode (i.e., sumAt, multiply).
word2vec, node2vec, graph2vec, X2vec: Towards a Theory of Vector Embeddings o...Subhajit Sahu
Below are the important points I note from the 2020 paper by Martin Grohe:
- 1-WL distinguishes almost all graphs, in a probabilistic sense
- Classical WL is two dimensional Weisfeiler-Leman
- DeepWL is an unlimited version of WL graph that runs in polynomial time.
- Knowledge graphs are essentially graphs with vertex/edge attributes
ABSTRACT:
Vector representations of graphs and relational structures, whether handcrafted feature vectors or learned representations, enable us to apply standard data analysis and machine learning techniques to the structures. A wide range of methods for generating such embeddings have been studied in the machine learning and knowledge representation literature. However, vector embeddings have received relatively little attention from a theoretical point of view.
Starting with a survey of embedding techniques that have been used in practice, in this paper we propose two theoretical approaches that we see as central for understanding the foundations of vector embeddings. We draw connections between the various approaches and suggest directions for future research.
DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTESSubhajit Sahu
https://gist.github.com/wolfram77/54c4a14d9ea547183c6c7b3518bf9cd1
There exist a number of dynamic graph generators. Barbasi-Albert model iteratively attach new vertices to pre-exsiting vertices in the graph using preferential attachment (edges to high degree vertices are more likely - rich get richer - Pareto principle). However, graph size increases monotonically, and density of graph keeps increasing (sparsity decreasing).
Gorke's model uses a defined clustering to uniformly add vertices and edges. Purohit's model uses motifs (eg. triangles) to mimick properties of existing dynamic graphs, such as growth rate, structure, and degree distribution. Kronecker graph generators are used to increase size of a given graph, with power-law distribution.
To generate dynamic graphs, we must choose a metric to compare two graphs. Common metrics include diameter, clustering coefficient (modularity?), triangle counting (triangle density?), and degree distribution.
In this paper, the authors propose Dygraph, a dynamic graph generator that uses degree distribution as the only metric. The authors observe that many real-world graphs differ from the power-law distribution at the tail end. To address this issue, they propose binning, where the vertices beyond a certain degree (minDeg = min(deg) s.t. |V(deg)| < H, where H~10 is the number of vertices with a given degree below which are binned) are grouped into bins of degree-width binWidth, max-degree localMax, and number of degrees in bin with at least one vertex binSize (to keep track of sparsity). This helps the authors to generate graphs with a more realistic degree distribution.
The process of generating a dynamic graph is as follows. First the difference between the desired and the current degree distribution is calculated. The authors then create an edge-addition set where each vertex is present as many times as the number of additional incident edges it must recieve. Edges are then created by connecting two vertices randomly from this set, and removing both from the set once connected. Currently, authors reject self-loops and duplicate edges. Removal of edges is done in a similar fashion.
Authors observe that adding edges with power-law properties dominates the execution time, and consider parallelizing DyGraph as part of future work.
My notes on shared memory parallelism.
Shared memory is memory that may be simultaneously accessed by multiple programs with an intent to provide communication among them or avoid redundant copies. Shared memory is an efficient means of passing data between programs. Using memory for communication inside a single program, e.g. among its multiple threads, is also referred to as shared memory [REF].
A Dynamic Algorithm for Local Community Detection in Graphs : NOTESSubhajit Sahu
**Community detection methods** can be *global* or *local*. **Global community detection methods** divide the entire graph into groups. Existing global algorithms include:
- Random walk methods
- Spectral partitioning
- Label propagation
- Greedy agglomerative and divisive algorithms
- Clique percolation
https://gist.github.com/wolfram77/b4316609265b5b9f88027bbc491f80b6
There is a growing body of work in *detecting overlapping communities*. **Seed set expansion** is a **local community detection method** where a relevant *seed vertices* of interest are picked and *expanded to form communities* surrounding them. The quality of each community is measured using a *fitness function*.
**Modularity** is a *fitness function* which compares the number of intra-community edges to the expected number in a random-null model. **Conductance** is another popular fitness score that measures the community cut or inter-community edges. Many *overlapping community detection* methods **use a modified ratio** of intra-community edges to all edges with atleast one endpoint in the community.
Andersen et al. use a **Spectral PageRank-Nibble method** which minimizes conductance and is formed by adding vertices in order of decreasing PageRank values. Andersen and Lang develop a **random walk approach** in which some vertices in the seed set may not be placed in the final community. Clauset gives a **greedy method** that *starts from a single vertex* and then iteratively adds neighboring vertices *maximizing the local modularity score*. Riedy et al. **expand multiple vertices** via maximizing modularity.
Several algorithms for **detecting global, overlapping communities** use a *greedy*, *agglomerative approach* and run *multiple separate seed set expansions*. Lancichinetti et al. run **greedy seed set expansions**, each with a *single seed vertex*. Overlapping communities are produced by a sequentially running expansions from a node not yet in a community. Lee et al. use **maximal cliques as seed sets**. Havemann et al. **greedily expand cliques**.
The authors of this paper discuss a dynamic approach for **community detection using seed set expansion**. Simply marking the neighbours of changed vertices is a **naive approach**, and has *severe shortcomings*. This is because *communities can split apart*. The simple updating method *may fail even when it outputs a valid community* in the graph.
Scalable Static and Dynamic Community Detection Using Grappolo : NOTESSubhajit Sahu
A **community** (in a network) is a subset of nodes which are _strongly connected among themselves_, but _weakly connected to others_. Neither the number of output communities nor their size distribution is known a priori. Community detection methods can be divisive or agglomerative. **Divisive methods** use _betweeness centrality_ to **identify and remove bridges** between communities. **Agglomerative methods** greedily **merge two communities** that provide maximum gain in _modularity_. Newman and Girvan have introduced the **modularity metric**. The problem of community detection is then reduced to the problem of modularity maximization which is **NP-complete**. **Louvain method** is a variant of the _agglomerative strategy_, in that is a _multi-level heuristic_.
https://gist.github.com/wolfram77/917a1a4a429e89a0f2a1911cea56314d
In this paper, the authors discuss **four heuristics** for Community detection using the _Louvain algorithm_ implemented upon recently developed **Grappolo**, which is a parallel variant of the Louvain algorithm. They are:
- Vertex following and Minimum label
- Data caching
- Graph coloring
- Threshold scaling
With the **Vertex following** heuristic, the _input is preprocessed_ and all single-degree vertices are merged with their corresponding neighbours. This helps reduce the number of vertices considered in each iteration, and also help initial seeds of communities to be formed. With the **Minimum label heuristic**, when a vertex is making the decision to move to a community and multiple communities provided the same modularity gain, the community with the smallest id is chosen. This helps _minimize or prevent community swaps_. With the **Data caching** heuristic, community information is stored in a vector instead of a map, and is reused in each iteration, but with some additional cost. With the **Vertex ordering via Graph coloring** heuristic, _distance-k coloring_ of graphs is performed in order to group vertices into colors. Then, each set of vertices (by color) is processed _concurrently_, and synchronization is performed after that. This enables us to mimic the behaviour of the serial algorithm. Finally, with the **Threshold scaling** heuristic, _successively smaller values of modularity threshold_ are used as the algorithm progresses. This allows the algorithm to converge faster, and it has been observed a good modularity score as well.
From the results, it appears that _graph coloring_ and _threshold scaling_ heuristics do not always provide a speedup and this depends upon the nature of the graph. It would be interesting to compare the heuristics against baseline approaches. Future work can include _distributed memory implementations_, and _community detection on streaming graphs_.
Application Areas of Community Detection: A Review : NOTESSubhajit Sahu
This is a short review of Community detection methods (on graphs), and their applications. A **community** is a subset of a network whose members are *highly connected*, but *loosely connected* to others outside their community. Different community detection methods *can return differing communities* these algorithms are **heuristic-based**. **Dynamic community detection** involves tracking the *evolution of community structure* over time.
https://gist.github.com/wolfram77/09e64d6ba3ef080db5558feb2d32fdc0
Communities can be of the following **types**:
- Disjoint
- Overlapping
- Hierarchical
- Local.
The following **static** community detection **methods** exist:
- Spectral-based
- Statistical inference
- Optimization
- Dynamics-based
The following **dynamic** community detection **methods** exist:
- Independent community detection and matching
- Dependent community detection (evolutionary)
- Simultaneous community detection on all snapshots
- Dynamic community detection on temporal networks
**Applications** of community detection include:
- Criminal identification
- Fraud detection
- Criminal activities detection
- Bot detection
- Dynamics of epidemic spreading (dynamic)
- Cancer/tumor detection
- Tissue/organ detection
- Evolution of influence (dynamic)
- Astroturfing
- Customer segmentation
- Recommendation systems
- Social network analysis (both)
- Network summarization
- Privary, group segmentation
- Link prediction (both)
- Community evolution prediction (dynamic, hot field)
<br>
<br>
## References
- [Application Areas of Community Detection: A Review : PAPER](https://ieeexplore.ieee.org/document/8625349)
This paper discusses a GPU implementation of the Louvain community detection algorithm. Louvain algorithm obtains hierachical communities as a dendrogram through modularity optimization. Given an undirected weighted graph, all vertices are first considered to be their own communities. In the first phase, each vertex greedily decides to move to the community of one of its neighbours which gives greatest increase in modularity. If moving to no neighbour's community leads to an increase in modularity, the vertex chooses to stay with its own community. This is done sequentially for all the vertices. If the total change in modularity is more than a certain threshold, this phase is repeated. Once this local moving phase is complete, all vertices have formed their first hierarchy of communities. The next phase is called the aggregation phase, where all the vertices belonging to a community are collapsed into a single super-vertex, such that edges between communities are represented as edges between respective super-vertices (edge weights are combined), and edges within each community are represented as self-loops in respective super-vertices (again, edge weights are combined). Together, the local moving and the aggregation phases constitute a stage. This super-vertex graph is then used as input fof the next stage. This process continues until the increase in modularity is below a certain threshold. As a result from each stage, we have a hierarchy of community memberships for each vertex as a dendrogram.
Approaches to perform the Louvain algorithm can be divided into coarse-grained and fine-grained. Coarse-grained approaches process a set of vertices in parallel, while fine-grained approaches process all vertices in parallel. A coarse-grained hybrid-GPU algorithm using multi GPUs has be implemented by Cheong et al. which grabbed my attention. In addition, their algorithm does not use hashing for the local moving phase, but instead sorts each neighbour list based on the community id of each vertex.
https://gist.github.com/wolfram77/7e72c9b8c18c18ab908ae76262099329
Survey for extra-child-process package : NOTESSubhajit Sahu
Useful additions to inbuilt child_process module.
📦 Node.js, 📜 Files, 📰 Docs.
Please see attached PDF for literature survey.
https://gist.github.com/wolfram77/d936da570d7bf73f95d1513d4368573e
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTERSubhajit Sahu
For the PhD forum an abstract submission is required by 10th May, and poster by 15th May. The event is on 30th May.
https://gist.github.com/wolfram77/692d263f463fd49be6eb5aa65dd4d0f9
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...Subhajit Sahu
For the PhD forum an abstract submission is required by 10th May, and poster by 15th May. The event is on 30th May.
https://gist.github.com/wolfram77/1c1f730d20b51e0d2c6d477fd3713024
Fast Incremental Community Detection on Dynamic Graphs : NOTESSubhajit Sahu
In this paper, the authors describe two approaches for dynamic community detection using the CNM algorithm. CNM is a hierarchical, agglomerative algorithm that greedily maximizes modularity. They define two approaches: BasicDyn and FastDyn. BasicDyn backtracks merges of communities until each marked (changed) vertex is its own singleton community. FastDyn undoes a merge only if the quality of merge, as measured by the induced change in modularity, has significantly decreased compared to when the merge initially took place. FastDyn also allows more than two vertices to contract together if in the previous time step these vertices eventually ended up contracted in the same community. In the static case, merging several vertices together in one contraction phase could lead to deteriorating results. FastDyn is able to do this, however, because it uses information from the merges of the previous time step. Intuitively, merges that previously occurred are more likely to be acceptable later.
https://gist.github.com/wolfram77/1856b108334cc822cdddfdfa7334792a
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
1. ASSMAteDate
Page L
INTRODUCTLON:AUELOINGTH EORY
S
7oY Smins 0 7x5fo.3 X 20=
hoomvh ya ekpect to Wait on
475
3oY. 20mins
avesaq
2
Ctoettng tonmeLo
2-S
total tme 7xs + 20* 3
5 60 S mins
avg.watingtme 3sx 60 20/
7.23
0.8 5 min 2x30+_8xs
.22 mins 60
avg tattHngHme 05 4 030 ,
AK erLang Caoa)
SHudieeand ormalized queing theorybor tale phone-
networKS robbic_enggenagCirpor take-oh londing
2. alassMAte
Data
13 %20t
Paga
PROBABLITN THEORy
events probabilt Sample Space
F p
F C 2 P Fg2
i s discrete F 2**
ih s centinuoLK F 2
AXIOMS OF PROBABILITY
pCa):L
E0E E,EeF
hen pCE) + p (E p CEvE)
CoROLLARIES
iACB
p(A) p(B)
Au (en A)
Since pC)o A0CE
3. elAsSmAte
Date 13 82r2D
Page
2 CEUE p ) p(E) ENE)
pCEUE) E
pE v (EaE))
pCE)p (E,E EnE2
pE)p(CE,OE) CEVE.))
EOE (EE
NE)p)-pE, 0E
PCE DE)pCE) (SE)
p (E p(E)-plEOE)
CoNDITLDNALPROBABILTY
CABD pr bability of evet A given B as ocured
A BeF
Q tS dkcrete
Sat
auu outcomes qually KalyaB
p (AIB) NCANB
N)AnS
4. classmate
Data138.2020
Paga
PROBABILITY MASS FONCILON PME
C)=
HWrOll_a_dice. wtcaj
X (Mi,n)>t na-
(XESu, 123 pi(5,) L6,5, C,O
36
ContinUOUS_random vaCiahle
noX
S
l i m
Ux
probabt lity alens'ty fpnethian-
CPDE)
cmulative distribution_Aunction (CDEE
E() Cxs) E Co
FxC-s)-o
5. edasSmate
Date 3,3-22
( Page
ECa E (X)
ACBCA
eR ()E O1 asSupp.ort opX-
auSS distrilbutoy
potssion distyibutto)
C-
27
O Standavd deulato).
O T tS Catlednormaldietrdbvtion
6. elassmate
Data'17:8:202p
Paga -
ExPECTATION
HI0. Aindout. binomial distribuhon-g0cmetrit distvebution
prove that E Cantb): af b
VE ax+b
y Ccw) a XCw +o
RECAP
probabilty axioms
derivedeD ¢mportant resolks
Condiionok probabilitp
random v artableS Cdiscret& ContinuoUs)
pm Pdg, cdt-
Co):1
EL,E e'E
pE AUE pCE tp(E,)
CALB)p (ADB)ipB)2o
PCB)
7. elAsSMAte
Date 72.2026,
Page
qau sslan diStributon
2
2 t 2
V2a
M0anmean T Standard oleviet'on0here2,
4uo t s ts called Dormal ouktrtbu
ExPECTATION OF RVV
X
hime3. b manuheadl_we ekpect)toss a_Coin
N
HTH..H T 2"Outorn
R x o,L,2,.nt
( ) =_# heads_dn wto
Semple
Kexperiments lxp erimevt S sSingcan n Hme
14
Knz hmes
8. JasSMe
vnte (7.22020
ECx) 0.K t_K2 4 n.Kn+
Samp Ov9
im 2 n.m kne6 im_K
Ko K
im
um K
K
pX-o))
m p (X=(-) C - n
K
erpecteion
Ex pX-)
neX(en) hor DRV
Xw)
Ex. da pectation -
dCRV
HO ind out binomial distribution
gcomctri distbtHm
Provethat E CoX+b) aEx+b
= aX+b
Nw X(w)+6
(l YC)
C a X()+b=y)
9. elassMAte
Date 18 202
Page
bernoull RV
Cec toss pCH)p
X
HX1
1-p
Prob
ELpA O. Ct-p):p. y S.143 -2e
V 5x+3 TY: S0 +33.
Ey 2p +3(1-)
Eis imear opArator,
Spt3
binomtal RV Chp.)
Soces ces n thdepeolent bernoili tralk
Y *hbernoulle trtal s Succea
O_eihertote
EY2EX 2P.p
10. alnssmate
Data 17-32020
Paga 5
poiss.on RV
X o2
px)
K!
Ex2 Ke k k-1)
e
VARIAN CE
much Spread he distribunoo valves Qvenow Prove
ECX-EX) E-[Ex1
M St momenk
Mean Cu alled nsret
mome RV
moment generahng
nctionsSataAE tS Called asthe Se ond
momen
E s taued he ih maman_
11. lAssmate
Date 17:20
Page 6-
MEM ORYLESSRV
expenantial RV )2e
O-0
Cc Ey)1
-
eA
p IB AOB)PCB)
P(x>t
P(x)to)
p(AC) - pCA)_ eato
- ( - E
- C1-s)p(t t.)
Cxt|X4 pX t-t
markov prepa
12. goma pay eorning elassate
phisics engine Dete 17.3.2t
Poge
X.ime atcwhith_ (S packet arYivel
0 0 t los
t 1oSec
ooesn_matfe
momory e.
mar kov
serversS2ved
savorage cr xpected packet costcmersrevesh d
2rvers
Aima Spas
the uHe
L -l(-
avG or ixpeCkEd ) theSustern
LtLs
13. clsSMAte
Date 17.4-2ta
Page
averoge rate o arrival
moAE)
Aron t t+At
pdhe amval At o (at)
o_ptmore thon ene armival
V4
IN avrivals in non-overlapping hterval ara
cndepent oeach other
Stata n U fime t npackek _Qrmved
H=prob. that thare om k arnvak ti time. b_
4 (-2At)
A t )
EAE)- )_ AQ--A
r K-0
+At -2Ae)
15. elSSMAt
Date 2-8.»a
Page
UE UIN THEORy
RECAP
memorless andem vaYiahloS
expenental (2) poiess.n (At) geometri
t h
twoSucces.Sive airivals indepenolent
At
pLexaty one arrival i At AAt + oAt
mare than one armival in At soCat)
hen the proCassis a PotsSon process oith
param2ter 2A._
n_arrarrivals in t tima units) e ( t
nl
a
vindhya
KCIS
16. claMAt
Dote 202202o
Paga
urd , 12,)t).nKarnivals cn t time units) e
+ O cn Second queu
E K mhtrst qveve
E k- in Lirst quevet n Second qveve
E th trstqueve K n Second GUve
pK packets in queweI& K-K packets en quwe2)
K 0
tdepenclt
(A (ate
Ko K1! Ck-K)I
e
K
poisson C2+2)
poisson RV X(A) Ex 2L
xpenentinl RvX(p) Ex V
17. AsSMAteDate 20 822
Page 3
tTt ho packas ànt.
ext pa.ckat arrival time
-Tst) PT 1-
exponeryHiat-
A=5 packels Second
O. 03
5
5 packok h se.conda) e 1o
0:175 packais in Lsa.cond e 5
51
lo pLCKak in econd ey O183
A/B/c/D/E_ r A/B/
AOrmivalprocess mean 2
servite rate ()
Servey
max no o CUxfaners on packek he Sstem,
pepulahien max. nc o Cusfomer toill ouer need fb
Serv
18. elasSMAte
Dota20:8.2020/
Poge 4-
M/M
M-memcrylessCpotsson)2
M-Senuice process memoryleg Cu exponential
-oneServer
cobur copopulattonsize
BIRTH-DEATH PRoCESS
load bactor P A
P(E probabikity onceluctomers ch th system at
Ame t
n
t4At)At) : honew arrial9noneu) olepartre
yo were in State n at time t._
OR one ne arrival, yoULwer in Mate.
at ime t
R M neu olepartora
&OUwerr in_State nH at ime
21. elassMAteDate 20 2:0
Page
M/Mtlizathon -P P-
1
.9999 0,93 75
b.9
3
5
p (o 3)
-28 35p C2 Col2
tPtP+P+ P+R
-6.999
12timeA
(6
2
. 5
2 5 S O = S .
. 2 2
b12
2
O-0 2
22. clasSMAate
Date 21: 8.2020
Page
UEUIN GTHEORY_
RECAP
poLsSon process
on pois&on PrOcessS
2 potssooProceseA
birthcleafh proces
Stare n ocostornars/ packeis in Hhe sstem
AlBlc/D/E
A- arrval pracess (A) mean
B Service processs Cmean uD
C senverS
D- t maxek Cusfonarspacketk (bohtersize
E*populafion &ize thct uorl need service
AlBl A/BleD
Eo
MM on Serven
afivalproes
smemes
he service proASA-
s mema le
paiscan arivo orth_ Cexpoantiad Oth Seviea
Yote
24. aAssMte
Data 2482020
Paga 3-
LpL (1p)p(tP+¢2
L .9 L
0 - 5 4
P:5
S07
L
L
20Mbpt 99 Mbpss
SDMbps
L Lo t Ls tnivy 2 mn
A Lmin
09ost min
25. elasSmate
Date 2182020
Page .
QS LITTLE'SLALD
L_A avg. ma spent b each pacdet
Qvg.t pockek/Aime
Cvg. H packek|austamers
K=Vz
E EY. Ez X
not aluwauE Costemers Qrived
roein lo,t1):At
avg Rach costomRn sperds w unit of ma
total tme spent o ol the
E D0Stomors thosa uoha arcivedin to,t].
L
Fotal time Spnt by thae
Customers : lt
t Lt Atw
tmtn 2mA g0ee
temy mt 5m
L Au
t lau
26. alassmate
Data 24 8 2020/
Paga S-
0 . A: 9 customens/min
mins
A 9 Ccostomasmn MloCostornars min.
m i n : Wa twsoe
LL Lsar
L:0.9 9
Wser W
L-
3A=49 castonersmin ioCustorerimin
houo much time coil yo0 penchhe Quetx o averac22
C I min u - Wser min-0:1 0. mn 54Se.
- 1 CUstomermin 2o Customan mn_
Conct She xpectedfime to be Sp@nt in the Queue
P: 0.9
1-P
6.5min18
05-O.05 _o15min 21se2D
31. elassAte
Date 27.2 207
Page 3
LPL p+ p N
N
N+
LC-P P -pN) NpNN_pN
LC- N oNA (1-
Ne Nt
pN+
N 2
LpN+I
or LaA+2NNN+1
M/M/oo UEING SVSTEM Seruer
Ce StomeNS
L Lo+ Ls L ACo 0populatio
L -(N)
Cu tCH
34. elassmate
Data 27.8.220/
Paga 6
aHer qveue siartskillingth he SySMem etartsbebeavin
Simarto M/M/1twith ServireYate ML
M/Mm/m UEUING SYSTEM
Memery less memaru leK- m server mM t Customes
Qrriva Service pacok (n Sidem
MG1 M/D/1
enera Seruice olo terminicHo Service
procesSrecess
35. dassmate
Date 312 2
Page
L min P
386 3
78
2C-068)
L: w minO
2C1-P
o,99x + O.olx30 0.43min3
0.olx3o 3 0
063 3 O63
0. 1715 14-115
36. classmate
Date 3t.82020
Page.
SO wHAT DID WESEE_LAST_CLASS
RECAP
M/MLlN 4ueve
M/M/0
L
P blo.cking probabit
N
NtI
o
L N/2
M/M/m
s P h
L4 1-P m-p)
Pcob:oh ueLing9
Pa Pm Pmz
L Cn-m)p 2 Cn-m)m"p" p
M/Mm m max m packets n4S1em
mser vers L
memory iesS_arVa memoA(ess Servic
38. elasSMate
Date 21-8. 2026
3Page
M/G M- mmorles arava
C- qeneroseuice PCAL.
One Serer
tsepi time faken fo provicle ervia
to the Customev bumo
CefCrM,tsr isexpontniallyE
distributed)
er Vas Ct
ECtsar) How hat matche
weth L twhen
1-P
L +2
2C-P) fSer cexponentiolll,
distnibutedl..
BAD PoST OFECE
tca 20Sec O.9q prob
30min 0.01 prrb
Onecustomer amva por inor (a 1
CCUhat co be the vg. im Spontby the CUStome th he
post otcRi
On overage hoLo mony_CoStommre Co be hov nthe posS
L,w,us EL1se
Ex 2xP:-
39. classmateata
Page
2 0 x O.gq+_g00X 60 37.8See,
37-8
ser Ex2-(E)
0 0 x 0Qq (&O02 0.61 3 7 . 8 2
1367.6
78 0.626 (0.63)
12.9Y
CU
2.9 min-
A =_LcUstomer/min san 7-8Se
C (2.9 mn
0:63
M/D/
M-mamoyule arrrlal
t sskxecllcenSant Ddteministic gervce
2C1-)
42. clAssmate- -
Date 3-8 2e
Poge 7-
20Mps 7OMbpSH u D e x e r c s e
2
s0Mbps ISDML- MM/L
toobps
PeOML
tTSDM&ps
tooMLpsM//
MA
1-h-6 & 2-6 _Strotagy
Ohich ane t beter
3 6 2-5-6 9raiag
43. clAssMAteDate 3.920
Page
ROUTNC
maka vilgo ata-
Vorse 33 Cwa'l_do our begt
Varse there is a uuanlda
A
to meven t DO dg
that isvrtualand.dikerent
uwalra upto he test
t can b So cold_
to tOrn mis D.orld ar.
makes us standl up pr uohats rignt-
Or hopR throluqh our ile
minichorusaaKge_reset ttto the start
mini-thorvs
Chonus hereLoe are goina-a
to Save oul tha we lave
giua, all wcv.got
minu-cheruswe LotlLMake it through
here uan, likea star
shininabright en yr ioerd
tocda Cmaka evil goaueay Noam Kania acals)
eode lyoka well,esetall
wnttencodeyeke b, there twhen you eall
Yga Amar
Fronck kellercdelyeko tronenatera
NISe2 o uorld omachines
AwORLD wITHOUT DANGER
on shadou homan natun eODE LYokO CTne 6 200)that twe need
e the wy to od the answen
ondcne thinq is onsore
chorus
44. lGsate
Dete 39 2020
RECAP
MIMImn
MMIm/m_ Quauing Sstem
MIal
M/DII
M/M/1
tabular SommaruWs Ltle Ls
70 Meps
(too ns
50
w
33-33
routing 3-6 & 2-S-6
-4-6 & 2--62
fouhng
,7o 2
10 07
ot delay fem23
o op s33:3.ns
30
7
3
2.C1-) 3x76 Xo
45. nte .
w:33:33nsA3 1oxto
Ch 2 33:33 ns
routing2
2-6
1 o 50
150
L 76 12.5 nS
70 C8o) xLo%
2- w _12.5 n
50
Met okela- 0 r wt O U2-Sns
olalays
loo
Control
outing
algorithm
altered
toad
fajected.
hroughpt oeedlload reected load
46. aSMAtr
ROUTINCn delays
algol
ensuredelays ar minimized
ocxèmize throughputs pocr=
protocalsreuttna atge2
algorithms
gcod
CStathio NS dummio hroughput
lat vS. hienarchical SSet
C-ttinta-donMainvS 0ter-clomaun
distribuied vs. Centralized
ingle VS. multipath
liok stiate vsdustonca Necton
nead toknoa Chieranhia bellman-ord
|whole netoonk routi
Cdjstra
RoOTNG ALOORITHMS DLJKSTRA
CShotestpath algorithms)
ChCV,E V et oh vertic8
0oiKshra Set o elges
ob 2
G)bellmarn focc 5
s(
2
Ve Step w add nocde
Shoctst pat e
47. ASSMAte
ute 20
nitia za tion O
P}
ALCORITHM
PD mi D
PPO Si
DD minD, Dt dij
2 + 3
gcto until Dz G
D 0 Dniki alazhio D,:o D n : 2
P:i
. P: 23
D,2, D2 D,o D Peoo
.P 2,31
D 2 D 2
P ,2, 3,s
D D 2 D S D-5S
GPa,2,s, s41
done
48. elassmate
Data 3.9 2AL
Pnga
rUnning time v) Nlv terati ons N-
OCM)n each deration
o) o(NlogM)OCIEI+V)loqtvl)
di Ksira disadlvaniago
)-Ve edges are no1 allowod
BELLMAN-FORD
ve edger ora allow d ho riesf path k no odekined
bvt, no-v w1 Cuclec
0
D i 2 -
Mgorithm D min oltD, Ct_D
turminate i D : D"
min Cest ot reaching usgatmost n edgei
min Sd +D"D
JF
averyStep shortestpoth with edge
is alczlatedto each node
50. alassMAte
Data3,9.200
Page 8.
PROFOSITION
a D s aegeneated hyhe aloarthmare qual to
he ShoctestpaBh ramifu 1_o t ecoes h.
healgarithm terminates k alculesNOt_Cotamng nccle
Lare having non--Le costk. elgoferminates ttSo dn
hNe at tecmination De 's he cof of horteai path
romtolor to
HwKh prove htL
D. D 4 K h._
FLOYD-wARSHALL
all-pair sortest path
d Or h:0..N
h
minD P PeK
terahion-h:
te have the shortest path costromi fo, 'vsin9 0d-
2 h (h=O wlo any Yoole)
51. elassmate
Date 7.9.2020
Page
KoUTING AND VPN
RECAP
TOUhg-algorithms
hartest path)
olkstra-gre0elu
bellman-tprel
goydwarshall
progfaongUntast TOUHng-
broadast
min(s,1)
3
Kruskal's
rmin. Cs) MST
prims
mu tcast
33,53
s
M St M Spans 3,55
Cost C)> tW ts minimiaedeeM
min coSt Steiner tree NP (omplete
PIM
52. elassmate
Data7.9.2020
Paga
ARPANEL C96a
o DD 2
D DaD
2
5)D-S3
2 0
BELLMAN FORD
h D":o D,
D min d
e NG)
d des dd Cwhat ih oach Oocde sqnchronov2
sy sBaft
Ais htkengin-
nDde
D
h_node e=
h
D h-
min d +
jeNG)
t algprithm Coi olso Convege
m _ _ol
JEN C)
53. clAsSMAte
Date7:9.2
Page
825ms CoiL braodcast Ds fo Detghbaurs.25 ms
DYNAMIC RoUTING.
inkStatestanco vector?
YOute shoulol noto NOUierS Should nOO
only i neiahboor whole_networkK.
o kaRps only olit gov ka0p cwnole netewor
fo nerahbour ) Lno alL Rink Sates
delays-bellman-kool
Cslower dikstra
CAasior
qsomelink goes
do, knecolalge moreBU as ey
passigs slao) trnbtt is generatto)
ass B2 less
erokLi
Staic
*AicaluyrouhnaS-
xed
Csmcleraenizahon
54. elasSMAte
Dat 7.C2e20
Paga
ARPANET
clustanCe Veetor routm Ca6)
RIP C) RIP
Cea) REGEMS3
thops allowed t
be is Cmmenk.
DNAMIC RoUTINCa
C'hterion gafo QxteyiOr gateway
betwcen olkh AsLauke namaus siem AS
ink Siete_distance vcekon
1GRP
OSPE
RIPv2 ElGRP
CREL2453 RECT&&g)
port179) Bf
boreler godaay protaco
Corrent Verson 2006,-
RFL421
55. elassmAte
Dote 7:9-2
Page.
VPN
hat isNPN2
virtuak privats netuOork
Conmect ta Carporete Metwork
4oacceSs Conputing e Sooree3 w n 1UT_
tOhen oU+SIde Camp2
SeaUY OomYMunicaHton,-
to,0.0
C
INTERNET
CPubleo)
blie 1PtUT
eteutr
Cintranet
Cpauate- t ismyip"hone
oporo VPN or Some VPN Cllenk to brorkse
hHPS
Opera US
AUstralea
e N/
2Mbps
200MbsServex
0-2 Mbps
ehasAppcaul (pod
56. elassate
Data 7- 202
Page 6.
ComPo NTER -Qirtel
erabond
mail
Server
homahttps://mg.dct-acin.
home
Durpos o VPN
O.Drovole_dataankidentakity
data ihhegn 256 256 2S
thenthca tion encrupHon_
Ccase naShë(noS
Cpoblic k asymmetric e
SHA SHA Sumnetric ke
MDS
RSA ElamaLDES 2DES, AES
blosh
RIPEMD
66
VPN
Use to Service SSL
USe to LAN
COroS Tuwo_LAN
57. elasSMAte
Date 7.428R0
Page
LAN
LAN
bangalov (SEhyolerabad
-acternatserto
ticlar serViLe
PPTP Wmdows RS REC2637)_
L2TP REL26 6761 393
RFL30Se uSL or 2 LANS
cre
Febten Poster
2
LAM
CECPSec2 modeX
ranSpoyxt devace oleuc
tuYmel YoOteN=YOUeN oYY
device-roUte_
FNG ESP) RFC4303 (kE- 43%
AH AH REC4302
authen tHate He dota-@ncrepi ne dotu
Cauhantotton posSi be)
58. classmwte
Date7.202
Page
PSec tunnet ESP
DATA
TPDATA
1T DATA
lO. 102 npaASprt mode
ESP Quth
Folate|
Onypteol
IP Secintransport mode th_ESP
Quth.
datu
p
2.
VPN-A_ VPN-B
3PES CRC AFS
HMACSHA1 AFG-XCBC
o2 bit 2atRbit
IkE RFL 486e hatall co4ptogmphi 0peatio)
Spparteol
hel man