www.researchgate.net Open in urlscan Pro
2606:4700::6811:2169  Public Scan

URL: https://www.researchgate.net/publication/315656042_Video_Streaming_in_Distributed_Erasure-Coded_Storage_Systems_Stall_Duratio...
Submission: On July 05 via api from GB — Scanned from GB

Form analysis 3 forms found in the DOM

GET search

<form method="GET" action="search" class="lite-page__header-search-input-wrapper"><input type="hidden" name="context" readonly="" value="publicSearchHeader"><input placeholder="Search for publications, researchers, or questions" name="q"
    autocomplete="off" class="lite-page__header-search-input"><button
    class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-full nova-legacy-c-button--size-s nova-legacy-c-button--color-white nova-legacy-c-button--theme-ghost nova-legacy-c-button--width-square lite-page__header-search-button"
    type="submit" width="square"><span class="nova-legacy-c-button__label"><svg aria-hidden="true"
        class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
        <use xlink:href="/m/4151594225983810/images/icons/nova/icon-stack-s.svg#magnifier-s"></use>
      </svg></span></button></form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=kE3vB7Df85u2tFAM_Eo2ojVVx4LXkSHagXLPqjAJ4ExeuUVr4Ujxs1lEQ0KJahek49-SmNU6QrfnrA

<form method="post" action="https://www.researchgate.net/login?_sg=kE3vB7Df85u2tFAM_Eo2ojVVx4LXkSHagXLPqjAJ4ExeuUVr4Ujxs1lEQ0KJahek49-SmNU6QrfnrA" name="loginForm" id="headerLoginForm"><input type="hidden" name="request_token"
    value="aad-EVevB8Uo4s0lGqRW5FI1/iM3kzxI35Xh//pEflXJJWJbMWEjt4usANyrmqnh4hOeMUhh1d9niGO9Aml7kotLSSPi9Ba6jJqD2bTLpCLa9ipw/1mHGuyZoAixwy92jnMhgu6mpJhgaqQwmLrGpktv2zIPmlgVL5VQCxVzFTDQ6dYJjFzMNTfKb6b49pSPCWaKm4oRdWs3JZuo0W5wVHsIjpV45hQX5SMFZCNyJQl6XadLGvIPPPE0qPMp4kooaWrYoeyHx2dPT6tn+4IRUTU="><input
    type="hidden" name="urlAfterLogin" value="publication/315656042_Video_Streaming_in_Distributed_Erasure-Coded_Storage_Systems_Stall_Duration_Analysis"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden"
    name="headerLogin" value="yes">
  <div class="lite-page__header-login-item"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit lite-page__header-login-label"
      for="input-header-login">Email <div class="lite-page-tooltip "><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
          <use xlink:href="/m/4151594225983810/images/icons/nova/icon-stack-s.svg#info-circle-s"></use>
        </svg>
        <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as their
            ResearchGate login</div>
          <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
            <div class="lite-page-tooltip__arrow-tip"></div>
          </div>
        </div>
      </div></label></div><input type="email" required="" placeholder="" id="input-header-login" name="login" autocomplete="email" tabindex="1"
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
  <div class="lite-page__header-login-item"><label class="lite-page__header-login-label"
      for="input-header-password">Password</label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page__header-login-forgot" href="application.LostPassword.html">Forgot password?</a></div><input
    type="password" required="" placeholder="" id="input-header-password" name="password" autocomplete="current-password" tabindex="2"
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default"><label
    class="nova-legacy-e-checkbox lite-page__header-login-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" name="setLoginCookie" tabindex="3" value="yes" checked=""><span
      class="nova-legacy-e-checkbox__checkmark"></span><span class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label>
  <div
    class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-stretch@s-up nova-legacy-l-flex--justify-content-center@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
    <div class="nova-legacy-l-flex__item"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        width="full" tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-flex__item nova-legacy-l-flex__item--align-self-center@s-up">
      <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
    </div>
    <div class="nova-legacy-l-flex__item">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
        </div>
      </div>
    </div>
  </div>
</form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=kE3vB7Df85u2tFAM_Eo2ojVVx4LXkSHagXLPqjAJ4ExeuUVr4Ujxs1lEQ0KJahek49-SmNU6QrfnrA

<form method="post" action="https://www.researchgate.net/login?_sg=kE3vB7Df85u2tFAM_Eo2ojVVx4LXkSHagXLPqjAJ4ExeuUVr4Ujxs1lEQ0KJahek49-SmNU6QrfnrA" name="loginForm" id="modalLoginForm"><input type="hidden" name="request_token"
    value="aad-EVevB8Uo4s0lGqRW5FI1/iM3kzxI35Xh//pEflXJJWJbMWEjt4usANyrmqnh4hOeMUhh1d9niGO9Aml7kotLSSPi9Ba6jJqD2bTLpCLa9ipw/1mHGuyZoAixwy92jnMhgu6mpJhgaqQwmLrGpktv2zIPmlgVL5VQCxVzFTDQ6dYJjFzMNTfKb6b49pSPCWaKm4oRdWs3JZuo0W5wVHsIjpV45hQX5SMFZCNyJQl6XadLGvIPPPE0qPMp4kooaWrYoeyHx2dPT6tn+4IRUTU="><input
    type="hidden" name="urlAfterLogin" value="publication/315656042_Video_Streaming_in_Distributed_Erasure-Coded_Storage_Systems_Stall_Duration_Analysis"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden"
    name="modalLogin" value="yes">
  <div class="nova-legacy-l-form-group nova-legacy-l-form-group--layout-stack nova-legacy-l-form-group--gutter-s">
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><label
        class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label" for="input-modal-login-label"><span
          class="nova-legacy-e-label__text">Email <div class="lite-page-tooltip "><span class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500">·
              Hint</span>
            <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
              <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as
                their ResearchGate login</div>
              <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
                <div class="lite-page-tooltip__arrow-tip"></div>
              </div>
            </div>
          </div></span></label><input type="email" required="" placeholder="Enter your email" id="input-modal-login" name="login" autocomplete="email" tabindex="1"
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default"></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div class="lite-page-modal__forgot"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label"
          for="input-modal-password-label"><span
            class="nova-legacy-e-label__text">Password</span></label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page-modal__forgot-link" href="application.LostPassword.html">Forgot password?</a>
      </div><input type="password" required="" placeholder="" id="input-modal-password" name="password" autocomplete="current-password" tabindex="2"
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
    </div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><label class="nova-legacy-e-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" checked="" value="yes"
          name="setLoginCookie" tabindex="3"><span class="nova-legacy-e-checkbox__checkmark"></span><span class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        width="full" tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div
            class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
            <div class="nova-legacy-l-flex__item">
              <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
            </div>
          </div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500" align="center">No account?
            <a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-decorated" href="signup.SignUp.html?hdrsu=1&amp;_sg%5B0%5D=VdDV4D_2PsGc6IjQLjnPEcBLWgr3MG7WcU0KNxsZG1mPampC9Cpagngxy6D-m6mKlQzWawnWuC-q8zJJBE5p3o_2mMI">Sign up</a>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting.
Please note that some processing of your personal data may not require your
consent, but you have a right to object to such processing. Your preferences
will apply to a group of websites. You can change your preferences at any time
by returning to this site or visit our privacy policy.
MORE OPTIONSDISAGREEAGREE
ArticlePDF Available


VIDEO STREAMING IN DISTRIBUTED ERASURE-CODED STORAGE SYSTEMS: STALL DURATION
ANALYSIS

 * March 2017
 * IEEE/ACM Transactions on Networking PP(99)

DOI:10.1109/TNET.2018.2851379
Authors:
Abubakr Alabbasi
 * Purdue University



Vaneet Aggarwal
 * Purdue University



Download full-text PDFRead full-text
Download full-text PDF
Read full-text
Download citation
Copy link Link copied

--------------------------------------------------------------------------------

Read full-text
Download citation
Copy link Link copied
Citations (29)
References (60)
Figures (4)





ABSTRACT AND FIGURES

The demand for global video has been burgeoning across industries. With the
expansion and improvement of video streaming services, cloud-based video is
evolving into a necessary feature of any successful business for reaching
internal and external audiences. This paper considers video streaming over
distributed systems where the video segments are encoded using an erasure code
for better reliability thus being the first work to our best knowledge that
considers video streaming over erasure-coded distributed cloud systems. The
download time of each coded chunk of each video segment is characterized and
ordered statistics over the choice of the erasure-coded chunks is used to obtain
the playback time of different video segments. Using the playback times, bounds
on the moment generating function on the stall duration is used to bound the
mean stall duration. Moment generating function based bounds on the ordered
statistics are also used to bound the stall duration tail probability which
determines the probability that the stall time is greater than a pre-defined
number. These two metrics, mean stall duration and the stall duration tail
probability, are important quality of experience (QoE) measures for the end
users. Based on these metrics, we formulate an optimization problem to jointly
minimize the convex combination of both the QoE metrics averaged over all
requests over the placement and access of the video content. The non-convex
problem is solved using an efficient iterative algorithm. Numerical results show
significant improvement in QoE metrics for cloud-based video as compared to the
considered baselines.
A schematic illustrates video fragmentation and erasure-coding processes. Video
i is composed of L i segments. Each segments is partitioned into k i chunks and
then encoded using an (n i , k i ) MDS code.
… 
An Illustration of a distributed storage system equipped with m nodes and
storing 3 video files assuming (n i , k i ) erasure codes.
… 
An Example of the instantaneous queue status at server q, where q ∈ 1, 2, ...,
m.
… 
Comparison between our upper bound on download time and the upper bound proposed
in [14], [16]. We vary the arrival rate of file i from 0.5 × λ i to λ i , where
λ i is the base arrival rate. Our proposed upper bound outperforms that in [14],
[16], especially for high load.
… 

Figures - uploaded by Vaneet Aggarwal
Author content
All figure content in this area was uploaded by Vaneet Aggarwal

Content may be subject to copyright.

Discover the world's research

 * 25+ million members
 * 160+ million publication pages
 * 2.3+ billion citations

Join for free


Public Full-text 1



Content uploaded by Vaneet Aggarwal
Author content

All content in this area was uploaded by Vaneet Aggarwal on Mar 28, 2017
Content may be subject to copyright.
A preview of the PDF is not available


CITATIONS (29)


REFERENCES (60)




... These articles have provided analytical results for a static (n, k)
redundancy under various simplified settings. For memoryless service, tight
numerical bounds are presented in [29], analytical bounds are provided in [23],
[24], [30], [31], tight analytical approximations in [22], and exact analysis
for small systems in [3]. An exact analysis of tail index for Pareto-distributed
file sizes is studied in [33], and an exact analysis for random independent
scheduling for asymptotically large number of servers in [32]. ...
... random execution time T i with distribution function F for each scheduled
coded subtask on this server. Recent works [15], [24], [31], [37] suggest that a
shifted exponential distribution is a good fit for modeling the service time
distribution in distributed computation networks. It is suggested that the
service time for each computation of coded subtask can be modeled by two
aggregate components; a constant server start-time and a random memoryless
component. ...

Single-Forking of Coded Subtasks for Straggler Mitigation
Article
 * Jul 2021
 * IEEE ACM T NETWORK

 * Ajay Badita
 * Parimal Parag
 * Vaneet Aggarwal

Given the unpredictable nature of the nodes in distributed computing systems,
some of the tasks can be significantly delayed. Such delayed tasks are called
stragglers. Straggler mitigation can be achieved by redundant computation. In
maximum distance separable (MDS) redundancy method, a task is divided into $k$
subtasks which are encoded to $n$ coded subtasks, such that a task is completed
if any $k$ out of $n$ coded subtasks are completed. Two important metrics of
interest are task completion time, and server utilization which is the aggregate
completed work by all servers in this duration. We consider a proactive
straggler mitigation strategy where $n_{0}$ out of $n$ coded subtasks are
started at time 0 while the remaining $n-n_{0}$ coded subtasks are launched when
$\ell _{0}\le \min \left \{{n_{0},k}\right \}$ of the initial ones finish. The
coded subtasks are halted when $k$ of them finish. For this flexible forking
strategy with multiple parameters, we analyze the mean of two performance
metrics when the random service completion time at each server is independent
and distributed identically ( i.i.d. ) to a shifted exponential. From this
study, we find a tradeoff between the metrics which provides insights into the
parameter choices. Experiments on Intel DevCloud illustrate that the shifted
exponential distribution adequately captures the random coded subtask completion
times, and our derived insights continue to hold.
View
Show abstract
... The problem remains open for systems with larger number of servers. For
exponentially distributed service times and Poisson arrivals, bounds are
presented in [11], [12], [31]- [33], [38], [39], and analytical approximations
in [15]. Exact analysis for special case of large systems is considered in [35],
[40], and small systems in [34]. ...

Modeling Performance and Energy trade-offs in Online Data-Intensive Applications
Preprint
Full-text available
 * Aug 2021

 * Ajay Badita
 * Rooji Jinan
 * Balajee Vamanan
 * Parimal Parag

We consider energy minimization for data-intensive applications run on large
number of servers, for given performance guarantees. We consider a system, where
each incoming application is sent to a set of servers, and is considered to be
completed if a subset of them finish serving it. We consider a simple case when
each server core has two speed levels, where the higher speed can be achieved by
higher power for each core independently. The core selects one of the two speeds
probabilistically for each incoming application request. We model arrival of
application requests by a Poisson process, and random service time at the server
with independent exponential random variables. Our model and analysis
generalizes to today's state-of-the-art in CPU energy management where each core
can independently select a speed level from a set of supported speeds and
corresponding voltages. The performance metrics under consideration are the mean
number of applications in the system and the average energy expenditure. We
first provide a tight approximation to study this previously intractable problem
and derive closed form approximate expressions for the performance metrics when
service times are exponentially distributed. Next, we study the trade-off
between the approximate mean number of applications and energy expenditure in
terms of the switching probability.
View
Show abstract
... Quality of Experince(QoE) for Video gushing in a distributed environment is
encoded by an erasure code. [1], [2]. A customization or contextual system is
required to dectect event based or semantic based video anaysis with less
computational power and hardware. ...

Deep Learning Based Smart Survilance Robot
Conference Paper
Full-text available
 * Jan 2021

 * Dr Vithya Ganesan
 * Smritilekha Das
 * Tamal Kundu
 * S. Bushra

View
Video File Allocation for Wear-Leveling in Distributed Storage Systems With
Heterogeneous Solid-State-Disks (SSDs)
Article
 * Jan 2022
 * IEEE T CIRC SYST VID

 * Dayoung Lee
 * Joonho Lee
 * Minseok Song

With the advent of new large-capacity solid-state disks (SSDs) such as
quad-level-cells (QLC), SSD arrays can be effectively used in video storage
systems that require large-capacity storage space. Typically, SSD manufacturers
specify a drive-writes-per-day (DWPD) metric, which is the ratio of bytes
written per day to the total capacity in bytes, to ensure an SSD’s specified
lifetime; it is important to limit the number of write operations by considering
the DWPD for each SSD. We propose a new video file allocation technique to
effectively manage the heterogeneous DWPD characteristics of SSDs in distributed
storage systems. To express the degree of wear-leveling for heterogeneous SSDs,
we first introduce the concept of ADWD, which is the actual number of bytes
written per day compared to DWPD. We then propose two algorithms for file
placement and migration. The file placement algorithm places files greedily
based on the bandwidth-to-space ratio (BSR) of each file and SSD to balance the
bandwidth usage and storage of the SSD. The file migration algorithm moves files
from overloaded to underloaded SSDs to meet bandwidth limit requirements while
minimizing the overall ADWD as a result of migration, and then migrates
additional popular files to improve SSD bandwidth utilization. To use these
algorithms in actual distributed file systems, we implemented a suite of tools
for file placement and migration in the Hadoop distributed file system (HDFS).
Experimental results show that the proposed algorithm reduces the mean of ADWD
by 35.44% and its standard deviation by 69.78% compared to the benchmark methods
on average.
View
Show abstract
EC-360: Speeding Up 360° Video Streaming Using Tile-based Online Erasure Coding
Conference Paper
 * Dec 2021

 * Jianxin Shi
 * Lingjun pu
 * Tian Zhang
 * Jingdong Xu

View
Latency Optimal Storage and Scheduling of Replicated Fragments for Memory
Constrained Servers
Article
 * Jun 2022
 * IEEE T INFORM THEORY

 * Rooji Jinan
 * Ajay Badita
 * Pradeep Kiran Sarvepalli
 * Parimal Parag

We consider the setting of a distributed storage system where a single file is
subdivided into smaller fragments of same size which are then replicated with a
common replication factor across servers of identical cache size. An incoming
file download request is sent to all the servers, and the download is completed
whenever the request gathers all the fragments. At each server, we are
interested in determining the set of fragments to be stored, and the sequence in
which fragments should be accessed, such that the mean file download time for a
request is minimized. We model the fragment download time as an exponential
random variable independent and identically distributed for all fragments across
all servers, and show that the mean file download time can be lower bounded in
terms of the expected number of useful servers summed over all distinct fragment
downloads. We present deterministic storage schemes that attempt to maximize the
number of useful servers. We show that finding the optimal sequence of accessing
the fragments is a Markov decision problem, whose complexity grows exponentially
with the number of fragments. We propose heuristic algorithms that determine the
sequence of access to the fragments which are empirically shown to perform well.
View
Show abstract
Latency-Redundancy Tradeoff in Distributed Read-Write Systems
Conference Paper
 * Jan 2022

 * Saraswathy Ramanathan
 * Gaurav Gautam
 * Vikram Srinivasan
 * Parimal Parag

View
Latency Minimization for Mobile Edge Computing Networks
Article
 * Oct 2021
 * IEEE T MOBILE COMPUT

 * Chang-Lin Chen
 * Christopher G. Brinton
 * Vaneet Aggarwal

The proliferation of data-intensive mobile applications is causing latency to
become an issue in mobile edge computing (MEC) systems. In this work, we propose
a novel methodology that optimizes communication, computation, and caching
configurations in MEC to minimize the mean latency experienced by mobile
devices. Transmission and computation processes are modeled using M/G/1 queues
to account for service rates and warm-up times. Our caching scheme includes time
variables for each file at each edge server in determining when to discard files
from storage. We theoretically analyze the latency experienced by mobile devices
due to communication, computation, and caching, showing how MEC system latency
depends on the offloading decisions of mobile devices, bandwidth and CPU
resources, and expiration times of files in the storage of edge servers. Our
method for solving the latency minimization problem consists of two main
components: iNner cOnVex Approximation (NOVA) to deal with non-convexity in the
optimization, and an online algorithm for preventing cache storage violations as
new tasks arrive and are serviced by the MEC system. Simulation results show
that our algorithm outperforms several baselines in minimizing latency, and
verify the benefit of including different resource allocation variables in our
optimization.
View
Show abstract
Latency-Redundancy Tradeoff in Distributed Read-Write Systems
Preprint
Full-text available
 * Aug 2021

 * Saraswathy Ramanathan
 * Gaurav Gautam
 * Vikram Srinivasan
 * Parimal Parag

Data is replicated and stored redundantly over multiple servers for availability
in distributed databases. We focus on databases with frequent reads and writes,
where both read and write latencies are important. This is in contrast to
databases designed primarily for either read or write applications. Redundancy
has contrasting effects on read and write latency. Read latency can be reduced
by potential parallel access from multiple servers, whereas write latency
increases as a larger number of replicas have to be updated. We quantify this
tradeoff between read and write latency as a function of redundancy, and provide
a closed-form approximation when the request arrival is Poisson and the service
is memoryless. We empirically show that this approximation is tight across all
ranges of system parameters. Thus, we provide guidelines for redundancy
selection in distributed databases.
View
Show abstract
Optimizing QoS for Erasure-Coded Wireless Data Centers
Conference Paper
 * Jun 2021

 * Srujan Thomdapu
 * Ketan Rajawat

View
Show more

Taming Tail Latency for Erasure-coded, Distributed Storage Systems
Article
Full-text available
 * Mar 2017

 * Vaneet Aggarwal
 * Abubakr Alabbasi
 * Jingxian Fan
 * Tian Lan

Distributed storage systems are known to be susceptible to long tails in
response time. In modern online storage systems such as Bing, Facebook, and
Amazon, the long tails of the service latency are of particular concern. with
99.9th percentile response times being orders of magnitude worse than the mean.
As erasure codes emerge as a popular technique to achieve high data reliability
in distributed storage while attaining space efficiency, taming tail latency
still remains an open problem due to the lack of mathematical models for
analyzing such systems. To this end, we propose a framework for quantifying and
optimizing tail latency in erasure-coded storage systems. In particular, we
derive upper bounds on tail latency in closed form for arbitrary service time
distribution and heterogeneous files. Based on the model, we formulate an
optimization problem to jointly minimize the weighted latency tail probability
of all files over the placement of files on the servers, and the choice of
servers to access the requested files. The non-convex problem is solved using an
efficient, alternating optimization algorithm. Numerical results show
significant reduction of tail latency for erasure-coded storage systems with a
realistic workload.
View
Show abstract
Taming tail latency for erasure-coded, distributee storage systems
Conference Paper
 * May 2017

 * Vaneet Aggarwal
 * Jingxian Fan
 * Tian Lan

View
The MDS Queue: Analysing the Latency Performance of Erasure Codes
Article
 * Feb 2017
 * IEEE T INFORM THEORY

 * Kangwook Lee
 * Nihar Shah
 * Longbo Huang
 * Kannan Ramchandran

In order to scale economically, data centers are increasingly evolving their
data storage methods from simple data replication to more powerful erasure
codes, which provide the same level of reliability as replication but at a
significantly lower storage cost. In particular, it is well known that Maximum-
Distance-Separable (MDS) codes, such as Reed-Solomon codes, can achieve a target
reliability with the maximum storage efficiency. While the use of codes for
providing improved reliability in archival storage systems, where data is less
frequently accessed (or so-called “cold data”), is well understood, the role of
codes in storing more frequently accessed and active “hot data”, where latency
is the key metric, is less clear. In this paper, we study data storage systems
based on MDS codes through the lens of queueing theory, and term the queueing
system arising under codes as an “MDS queue.” We provide lower and upper bounds
on the average job latency for both centralized and decentralized versions of
MDS queues. We also provide extensive simulations to corroborate our analysis as
well as obtain additional insights.
View
Show abstract
Exponential laws of computing growth
Article
 * Jan 2017
 * COMMUN ACM

 * Ted G Lewis

A new look at Moore’s Law opens an inquiry into the causes of exponential growth
in the power of computer chips and systems and their market adoptions. The
observed doubling of computational speeds relies on exponentially growing
processes at three levels of the computing ecosystem: chips, systems, and
communities. At the chip level, the exponential growth of number of components
on computer chips is enabled by the regular geometry of chip layouts. Multiple
cores were introduced when clock speeds maxed out in the 1990s; now cores double
with each chip generation. At the system level, Gustafson’s law assures us that
data intensive applications will keep the cores fully busy, thereby doubling the
computational output with every generation. And Koomey’s laws demonstrate the
continuing successes of system designers: both computation speeds of computer
systems and computations per unit of energy expenditure have doubled every 1.57
years. At the community level, the S-curve model of technology adoption is
exponential until its inflection point. Businesses try to forecast the
inflection points and jump to new technologies; technology jumping enables
exponential growth over many generations of technologies. Empirically validated
diffusion models of technology adoption account for the S-curves and show why
the initial stages of adoption grow exponentially. It is now plausible that
Moore’s-law-like exponential growth for information technologies will continue
for several more decades.
View
Show abstract
Parallel and Distributed Methods for Constrained Nonconvex Optimization􀀀Part I:
Theory
Article
 * Dec 2016
 * IEEE T SIGNAL PROCES

 * Gesualdo Scutari
 * Francisco Facchinei
 * Lorenzo Lampariello

In this two-part paper, we propose a general algorithmic framework for the
minimization of a nonconvex smooth function subject to nonconvex smooth
constraints, and also consider extensions to some structured, nonsmooth
problems. The algorithm solves a sequence of (separable) strongly convex
problems and maintains feasibility at each iteration. Convergence to a
stationary solution of the original nonconvex optimization is established. Our
framework is very general and flexible and unifies several existing Successive
Convex Approximation (SCA)- based algorithms More importantly, and differently
from current SCA approaches, it naturally leads to distributed and
parallelizable implementations for a large class of nonconvex problems. This
Part I is devoted to the description of the framework in its generality. In Part
II we customize our general methods to several multi-agent optimization problems
in communications, networking, and machine learning; the result is a new class
of centralized and distributed algorithms that compare favorably to existing
ad-hoc (centralized) schemes.
View
Show abstract
Parallel and Distributed Methods for Constrained Nonconvex Optimization--Part
II: Applications in Communications and Machine Learning
Article
 * Dec 2016
 * IEEE T SIGNAL PROCES

 * Gesualdo Scutari
 * Francisco Facchinei
 * Lorenzo Lampariello
 * Peiran Song

In Part I of this paper, we proposed and analyzed a novel algorithmic framework
for the minimization of a nonconvex objective function, subject to nonconvex
constraints, based on inner convex approximations. This Part II is devoted to
the (nontrivial) application of the framework to the following relevant
large-scale problems ranging from communications to machine learning: i)
(generalizations of) the rate profile maximization in MIMO interference
broadcast networks; ii) the max-min fair multicast multigroup beamforming
problem in a multicell environment; and iii) a general nonconvex constrained
bicriteria formulation for k-sparse variable selection in statistical learning;
the two criteria are a nonconvex loss objective function, measuring the fitness
of the model to data, and the latter is a nonconvex sparsity-inducing constraint
in the general form of difference-of-convex (DC) functions, which allows to
accomodate in a unified fashion convex and nonconvex surrogates of the '0
function. The proposed algorithms outperform current state-ofthe- art schemes
for i)-iii) both theoretically and numerically. For instance, they are the first
distributed schemes for the class of problems i) and ii); and they also lead to
subproblems enjoying closed form solutions.
View
Show abstract
Implementation of cloud based live streaming for surveillance
Conference Paper
 * Apr 2016

 * Neel Oza
 * Naitik B Gohil

Rapid technological growth made surveillance as most promising application
domain. With great extent of smart city most of the things are controlled by
internet. Security is one of the applications that everyone needs to be
controlled remotely. This paper presents cloud based surveillance system for
live video streaming that can be surveillance from anywhere and anytime. This
system provides the live streaming by using cloud; Raspberry Pi 2 module and
FFMPEG based USB Camera.
View
Show abstract
MP-DASH: Adaptive Video Streaming Over Preference-Aware Multipath
Conference Paper
 * Nov 2016

 * Bo Han
 * Feng Qian
 * Lusheng Ji
 * Vijay Gopalakrishnan

Compared with using only a single wireless path such as WiFi, leveraging
multipath (e.g., WiFi and cellular) can dramatically improve users' quality of
experience (QoE) for mobile video streaming. However, Multipath TCP (MPTCP), the
de-facto multipath solution, lacks the support to prioritize one path over
another. When applied to video streaming, it may cause undesired network usage
such as substantial over-utilization of the metered cellular link. In this
paper, we propose MP-DASH, a multipath framework for video streaming with the
awareness of network interface preferences from users. The basic idea behind
MP-DASH is to strategically schedule video chunks' delivery and thus satisfy
user preferences. MP-DASH can work with a wide range of off-the-shelf video rate
adaptation algorithms with very small changes. Our extensive field studies at 33
locations in three U.S. states suggest that MP-DASH is very effective: it can
reduce cellular usage by up to 99% and radio energy consumption by up to 85%
with negligible degradation of QoE, compared with off-the-shelf MPTCP.
View
Show abstract
The fork-join queue and related systems with synchronization constraints:
stochastic ordering and computable bounds
Article
 * Sep 1989

 * Francois Baccelli
 * Armand M Makowski
 * Adam Shwartz

A simple queueing system, known as the fork-join queue, is considered with basic
performance measure defined as the delay between the fork and join dates. Simple
lower and upper bounds are derived for some of the statistics of this quantity.
They are obtained, in both transient and steady-state regimes, by stochastically
comparing the original system to other queueing systems with a structure simpler
than the original system, yet with identical stability characteristics. In
steady-state, under renewal assumptions, the computation reduces to standard
GI/GI /1 calculations and the bounds constitute a first sizing-up of system
performance. These bounds can also be used to show that for homogeneous
fork-join queue system under assumptions, the moments of the system response
time grow logarithmically in the number of parallel processors provided the
service time distribution has rational Laplace–Stieltjes transform. The bounding
arguments combine ideas from the theory of stochastic ordering with the notion
of associated random variables, and are of independent interest to study various
other queueing systems with synchronization constraints. The paper is an
abridged version of a more complete report on the matter [6].
View
Show abstract
Cache content-selection policies for streaming video services
Conference Paper
 * Apr 2016

 * Stefan Dernbach
 * Nina Taft
 * Jim Kurose
 * Azin Ashkan

View
Show more




RECOMMENDATIONS

Discover more
Conference Paper
Full-text available


QWATCH: DETECTING AND LOCATING QOE ANOMALY FOR VOD IN THE CLOUD

December 2016
 * Chen Wang
 * Hyong S. Kim
 * Ricardo Morla

View full-text
Conference Paper


QUALITY ASSESSMENT AND ERROR CONCEALMENT FOR SVC TRANSMISSION OVER UNRELIABLE
CHANNELS

July 2011
 * Marco Brandas
 * Maria G Martini
 * Mikko Uitto
 * Janne Vehkaperä

Scalable video coding (SVC) has aroused a wide interest in the areas of video
coding and transmission technology, since it provides desirable features for
heterogeneous error-prone network environments. The layered video structure
allows not only adaptation to the avail able bandwidth but also a device
adaptation capability via multiple decodable sub-streams. In this paper, we
focus on SVC ... [Show full abstract] Medium-Grain Scalability (MGS) and
investigate the end user's quality of experience (QoE) in error-prone
transmission conditions. We describe our error detection and concealment
implementation on the JSVM 9.15 reference decoder and assess its effectiveness
through several quality indicators. Results show an improvement of the proposed
concealment strategy when compared to the standard Frame Copy (FC) and
Interpolation, in terms of Peak Signal-to-Signal Noise Ratio (PSNR) and
Structural Similarity Index Metric (SSIM) quality metrics. This improvement is
evident in the case of concealment on quality enhancement layers, since video
fluidity is preserved assuring an acceptable QoE to the end users.
Read more
Article


LIFE IN THE DIGITAL CLOUD

January 2011 · IEEE Network
 * Thomas M. Chen

Inferring the subjective perception of a video stream in real time continues to
be a stiff problem. This article presents MintMOS: a lightweight, no-reference,
loadable kernel module to infer the QoE of a video stream in transit and offer
suggestions ...
Read more
Article


A METHOD TO EVALUATE QUALITY OF REAL TIME VIDEO STREAMING IN RADIO ACCESS
NETWORK

December 2014
 * Liang Chen
 * Xiaolin Deng
 * Yongmei Qi
 * [...]
 * Jianyin Zhang

Video streaming is one of the most popular applications in today's networks,
ranging from communications to entertainment, it penetrates into every aspect of
our lives. Service providers concern more and more about Quality of Experience
perceived by end user. This paper proposes a new model to evaluate the
end-to-end video quality in LTE networks. Specially, we focus on real time
streaming video ... [Show full abstract] service that based on Real Time
Streaming Protocol. This paper investigate the impact of RAN parameters, namely,
SINR and the number of users, on the user's QoE. According to simulation
results, a mapping model between these arguments and the video quality is given
eventually. This assessment method will help mobile network operators to
optimize RAN performance to satisfy users' video quality expectations.
Read more
Conference Paper


PP2DB: A PRIVACY-PRESERVING, P2P-BASED SCALABLE STORAGE SYSTEM FOR MOBILE
NETWORKS

January 2012
 * Manuel Crotti
 * Diego Ferri
 * Francesco Gringoli
 * [...]
 * Luca Salgarelli

Reputation-based systems that handle millions of users face the problem of
simultaneously supporting privacy and trust in an efficient way. In order to
scale, often existing systems either sacrifice privacy to preserve trust, or
vice versa. The introduction of advanced cryptographic techniques such as Group
Signatures might offer a solution, but their applicability to large, distributed
systems ... [Show full abstract] such as P2P-based ones has yet to be proved. In
this paper we introduce PP2db, a privacy-preserving, scalable and distributed
storage system targeted at mobile networks, specifically designed to support the
anonymous but trusted exchange of Quality of Experience (QoE) information. In
such case-study, QoE data is exchanged among users so as to make informed
decisions on which network to select at any given time. We demonstrate that by
enriching a P2P database with Group Signatures it is possible to create
distributed storage mechanisms that guarantee privacy-preserving features, while
offering strong trust at the group level. Furthermore, we demonstrate that the
resulting architecture can scale in a realistic mobile network scenario to
handle millions of users.
Read more

Discover the world's research
Join ResearchGate to find the people and research you need to help your work.
Join for free

ResearchGate iOS App
Get it from the App Store now.
Install
Keep up with your stats and more
Access scientific knowledge from anywhere

or
Discover by subject area
 * Recruit researchers
 * Join for free
 * Login
   Email
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   
   Welcome back! Please log in.
   Email
   · Hint
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   No account? Sign up
   

Company
About us
News
Careers
Support
Help Center
Business solutions
Advertising
Recruiting

© 2008-2023 ResearchGate GmbH. All rights reserved.
 * Terms
 * Privacy
 * Copyright
 * Imprint