Next Generation Networking with SDN and NFV

Μέγεθος: px
Εμφάνιση ξεκινά από τη σελίδα:

Download "Next Generation Networking with SDN and NFV"

Transcript

1 Next Generation Networking with SDN and NFV Salvatore Costanzo Department of Informatics and Telecommunications, University of Athens 1

2 Outline Networking Technology Trends: Network Virtualization and Cloud Orchestration Why virtualize the network? What are the benefits for network operators and their customers? The Need for Elastic Network Architectures Enabler solutions for elastic networks: Management of network services through abstraction of lower level functionality using Software Defined Networking (SDN) Virtualization of network node functions (NFV) SDN/NFV Use Case Scenarios: LTE Mobile Network Virtualization: benefits, challenges and solutions Cloud mobile Radio Access Network 2

3 Challenges in networking Explosion of devices and traffic: huge capital investment Network operators face an increasing disparity between costs and revenues Complexity: large and increasing variety of proprietary network hardware appliances Lack of flexibility and agility: launching new services is difficult and takes too long 3

4 The need of elastic networks Enablers? Network Virtualization Software Defined Networking Network Functions Virtualization Cloud orchestration 4

5 Network Virtualization 5

6 What is Virtualization? Virtualization is the process of creating virtual versions of physical resources that emulate the same physical characteristics. Trend of Virtualized everything: Virtual machines: VMware, Xen Data-center virtualization Network Virtualization

7 Example: Virtualization in computers: Virtual Machine Physical Machine CPU CPU CPU Mem Net

8 Example: Virtualization in computers: Virtual Machine Virtual Machine Monitor (VMM) Physical Machine CPU CPU CPU Mem Net

9 Example: Virtualization in computers: Virtual Machine App B.1 App B.2 App B.3 Virtual Machine 2 Operating System B CPU Mem Net Virtual Machine Monitor (VMM) Physical Machine CPU CPU CPU Mem Net

10 Example: Virtualization in computers: Virtual Machine App A.1 App A.2 App A.3 Virtual Machine 1 Operating System A App B.1 App B.2 App B.3 Virtual Machine 2 Operating System B CPU CPU Mem CPU Mem Net Virtual Machine Monitor (VMM) Physical Machine CPU CPU CPU Mem Net

11 Why Virtualize? Virtualization adds flexibility, allows heterogeneity, and improves manageability of the computing infrastructure Virtualization allows resource sharing : Reduced number of equipment devices Higher availability Reduced time needed for deployments using virtualized infrastructure Lower cost of ownership More resilient and simpler to manage

12 Computer and Network virtualization Virtualization in Computer Industry Apps Apps Apps Windows Windows Windows Windows Windows Linux Windows Windows FreeBSD Virtualization x86 Openflow

13 Computer and Network virtualization Virtualization in Computer Industry Virtualization in Network Industry Apps Apps Apps Apps Apps Apps Windows Windows Windows Windows Windows Linux Windows Windows FreeBSD Network Windows Windows OS Windows Windows NOX Windows Windows Beacon Virtualization Virtualization x86 Openflow

14 Virtual Networks: applications Overlay Networks An overlay network is a computer network which is built on the top of another network. Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network

15 Network Virtualization Scenario Infrastructure Provider UEs UEs UEs

16 Network Virtualization Scenario Service Provider 1 Virtual network 1 Infrastructure Provider Physical node Virtual node Physical link Virtual link UEs UEs UEs

17 Network Virtualization Scenario Service Provider 2 Virtual network 2 Service Provider 1 Virtual network 1 Infrastructure Provider Physical node Virtual node Physical link Virtual link UEs UEs UEs

18 Network Virtualization: Business roles Network virtualization refers to the creation of a set of overlay architectures built on top of one or more existing physical infrastructures.

19 Network Virtualization: Business roles Network virtualization refers to the creation of a set of overlay architectures built on top of one or more existing physical infrastructures. Infrastructure providers: They own and manage the physical network devices and virtualize the physical resources

20 Network Virtualization: Business roles Network virtualization refers to the creation of a set of overlay architectures built on top of one or more existing physical infrastructures. Virtual Network Providers : who combine the virtual resources in order to form Virtual Networks Infrastructure providers: They own and manage the physical network devices and virtualize the physical resources

21 Network Virtualization: Business roles Network virtualization refers to the creation of a set of overlay architectures built on top of one or more existing physical infrastructures. Virtual Network Operators : who run the Virtual Network and provide their services to the end-users. Virtual Network Providers : who combine the virtual resources in order to form Virtual Networks Infrastructure providers: They own and manage the physical network devices and virtualize the physical resources

22 Network Virtualization for Mobile networks?

23 Motivations The wireless resources of mobile networks are expensive and scarce. Network Virtualization will bring a more efficient utilization of the scarce wireless resources. Network Virtualization is a good solution for: reducing the number of base stations (reduce energy usage) reducing the overall investment capital required by mobile operators to setup their own infrastructure. allowing smaller players to come into the market and provide new services to their customers using a virtual network without the need of built a network infrastructure

24 Use Case for LTE: Virtualization of base stations Two layers of scheduling: one layer for splitting the spectrum between the different virtual operators and one layer for splitting the allocated spectrum among the users belonging to the same operator The scheduling can be based on different criteria such as: bandwidth, data rate, power, interference, pre-defined contract, channel condition, traffic load or a combination of these *As appears in Yasir Zaki,Liang Zhao,Carmelita Goerg,Andreas Timm-Giel, LTE mobile network virtualization Exploiting multiplexing and multi-user diversity gain, in Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th

25 Enable rapid innovation in networking with Network Virtualization 25

26 Ossification in networking The growth and extension of the current Internet is marked by ossification. Network virtualization is viewed as one of the enablers to overcome this ossification since make it easier to introduce innovation in networking

27 Ossification in networking The growth and extension of the current Internet is marked by ossification. Network virtualization is viewed as one of the enablers to overcome this ossification since make it easier to introduce innovation in networking Let s take a look to the evolution of networking

28 Everything is evolving: machines, O.S., games. Fist laptop IBM 5100 (1973) ipad OS-8 (1971) Macosx Pacman (1980) Nintendo wii

29 Everthing is evolving except the Network TCP/IP (70 s)

30 Everthing is evolving except the Network TCP/IP (70 s) Today? Still.. TCP/IP We are still using the same network architecture of 1970!

31 Why networks don't evolve? Internet Hourglass problem Firefox Silver light Thunder bird MPlayer HTTP SMTP RTP TCP UDP IPv4 PPP Ethernet Optical Fiber Twisted Pair Coaxial Cable

32 Why networks don't evolve? Internet Hourglass problem Firefox Silver light Thunder bird MPlayer HTTP SMTP RTP TCP UDP IPv4 PPP Ethernet Optical Fiber Twisted Pair Coaxial Cable

33 Limitations of Current Networking Technologies Complexity that leads to Static Nature Inability to Scale Vendor Dependence Hardware based networks, not easy to evolve

34 Limitations of Current Networking Technologies Complexity that leads to Static Nature Inability to Scale Vendor Dependence Hardware based networks, not easy to evolve We need a software based approach

35 Why a modern smartphone is better than Nokia 3310? Because of a software oriented paradigm!

36 Benefits of a Software-oriented paradigm Abstract models hide technical, complicated, useless details Applications on abstract models can run on many different devices Applications can be replaced in any time without the need to change the hardware Are there benefits of applying a software paradigm in a network architecture?

37 Internet, after 30+ years Almost the same protocols, same philosophy Reason: static and monolithic network apparatus: Black box policy: no one can modify them, except the manufacturer 37

38 Planes of Networking Data Forwarding plane: Packet forwarding Fragmentation and reassembly Control plane: Making routing tables Setting packet handling policies 3

39 Software Defined Network Paradigm that introduces the possibility to program the network Based on three pillars Separation of control and forwarding functions Centralization of control Well-defined interfaces (northbound and southbound) 39

40 SDN approach Control logic is moved to a central controller Switches only have forwarding elements One expensive controller with a lot of cheap switches By programming the controller, we can quickly change the entire network behavior Network Management is not more platform dependent! 40

41 Specifies behavior Compiles to topology Transmits to switches Control Programs SDN architecture Control Programs Abstract Network View Network Virtualization Global Network View Control Programs Network Operating System Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding

42 Why SDN? Abstraction In Computers an abstraction is a representation that reveals semantics needed at a given level while hiding implementation details: a programmer to focus on necessary concepts without getting bogged down in unnecessary details Much of the progress in CS resulted from finding new abstractions: It is very slow to code directly in assembly language (with 1 abstraction : mnemonics for opcodes) It is much faster coding in high-level imperative language like Python It is much faster yet coding in a declarative language It is fastest coding in a domain-specific language (only contains the needed abstractions)

43 Control plane abstractions SDN principle 1: APIs instead of protocols Replace control plane protocols with well-defined APIs to network applications SDN works as a Network Operating System Network Apps can be added without changing the NOS user application user application user application network application network application network application Computer Operating System Network Operating System HW component HW component HW component SDN switch SDN switch SDN switch

44 Packet forwarding abstraction SDN principle 2: Packet forwarding as a computational problem The function of any network node is to 1. receive a packet 2. observe packet fields 3. apply algorithm (classification, decision logic) 4. optionally edit packet 5. forward or discard packet SDN switch treats an incoming packet as a simple sequence of bytes. SDN switch neither knows nor cares to which network layer the bytes it examines belong

45 Flows SDN principle 3: Packets are handled solely based on the flow to which they belong Flows are thus just like Forwarding Equivalence Classes A a flow may be determined by an IP prefix in an IP network A label in an MPLS network VLANs in VLAN cross-connect networks The granularity of a flow depends on the application

46 Network state and graph algorithms SDN principle 4: Eliminate distributed protocols Replace distributed routing protocols with graph algorithms performed at a central location The forwarding algorithm is not performed at the network node, So, how does it know how to forward packets? In order to perform the forwarding algorithm on a packet belonging to a flow it need to know something of the network state (complete knowledge or very limited local knowledge) The decision algorithms is performed in a central location by an entity with full knowledge: CONTROLLER

47 SDN principle 5: Configuration SDN switches are stupid and flows are configured by an SDN controller The network state to be stored at the individual NE is just a flow table describing how to forward a packet belonging to a flow Conventional network elements have two parts: 1. smart but slow CPUs that calculate the forwarding policy 2. simple switch that just forwards packets according to the policy at step 1 Since the algorithms to build the forwarding policy are performed elsewhere SDN brings the added bonus that we don t need the CPU Such a simplified network element is called SDN switch The flow table is configured by the SDN controller

48 Is SDN better than routing? OK, SDN switches may be cheaper but is that the only advantage of SDN? Distributed routing protocols are limited to finding simple connectivity minimizing number of hops but can not perform more sophisticated operations, such as optimizing paths under constraints (e.g., security) setting up non-overlapping backup paths integrating networking functionalities (e.g., NAT, firewall) into paths An SDN controller is omniscient ( God box ) can perform arbitrary optimization calculations on the network graph directly configures the forwarding actions of the SDN switches But this advantage comes at a price the controller is a single point of failure additional (overhead) bandwidth is required additional set-up delay may be incurred

49 Standardization of SDN solutions

50 SDN Standard Developing Organizations

51 Open Networking Foundation (ONF) A non-profit industry consortium Founded: March 2011, >130 member organizations Telecom operators, network providers, service providers Equipment vendors, networking and virtualization software suppliers, and chip technology providers Vision: Make Software-Defined Networking the new norm for networks ONF wants to transform networking industry to software industry through open SDN standards Mission: commercialize and promote SDN and its underlying technologies for their user benefits ONF attempts to create the most relevant SDN standards Aims at the dissemination and practical implementation of SDN through open standard development such as OpenFlow

52 ONF structure Management Structure Board of Directors (no vendors allowed) Executive Director (presently Dan Pitt, employee, reports to board) Technical Advisory Group (makes recommendations not decisions, reports to board) Working Groups (chartered by board, chair appointed by board) Council of Chairs (chaired by executive director, forwards draft standards to board) ONF Board members Dan Pitt Executive Director Nick McKeown Stanford University Scott Shenker UC Berkeley and ICSI Deutsche Telecom AG Facebook Goldman Sachs Google Microsoft NTT Communications Verizon Yahoo Working Groups Architecture and Framework Forwarding Abstraction Northbound Interface (new) Optical Transport (new) Wireless and Mobile (new) Configuration and Management Testing and Interoperability Extensibility Migration Market Education Hybrid - closed

53 ONF SDN Architecture Overview Key features Applications can be network aware Control plane is logically centralized Control plane is decoupled from the data plane SDN Controller has complete control of the SDN Datapaths

54 ONF SDN Architecture Overview

55 Define mechanisms for configuration of OpenFlow capable network devices to realize the vision of Software Defined Networking The OpenFlow specifications describe the southbound protocol between OF controller and OF switches the operation of the OF switch The OpenFlow specifications do not define the northbound interface from OF controller to applications how to boot the network how an E2E path is set up by touching multiple OF switches how to configure or maintain an OF switch (see of-config) The OF-CONFIG specification defines a configuration and management protocol between OF configuration point and OF capable switch configures which OpenFlow controller(s) to use configures queues and ports remotely changes port status (e.g., up/down)

56 OpenFlow matching The basic entity in OpenFlow is the flow A flow is a sequence of packets that are forwarded through the network in the same way Packets are classified as belonging to flows based on match fields (switch ingress port, packet headers, metadata) detailed in a flow table (list of match criteria) Only a finite set of match fields is presently defined The matching operation is exact match with certain fields allowing bit-masking Since OF 1.1 the matching proceeds in a pipeline

57 OpenFlow: flow table match fields actions counters flow entry match fields actions counters match fields actions counters flow miss entry actions counters The flow table is populated only by the controller The incoming packet is matched by comparing to match fields For simplicity, matching is exact match to a static set of fields If matched, actions are performed and counters are updated Actions include editing, metering, and forwarding

58 Research Experiments Step 1: Separate Control from Datapath

59 Step 2: Cache flow decisions in datapath If header = x, send to port 4 If header = y, overwrite header with z, send to ports 5,6 If header =?, send to me Flow Table

60 CONTROLLER ARCHITECTURES Centralized Or Distribuited Multilayer

61 OpenFlow Switch An OpenFlow Switch consists of : one or more flow tables and a group table, which perform packet lookups and forwarding an OpenFlow channel to an external controller The controller manages the switch via the OpenFlow protocol. Using this protocol, the controller can add, update, and delete flow entries, both reactively (in response to packets) and proactively.

62 OpenFlow Basics Flow Table Entries Rule Action Stats Packet + byte counters 1. Forward packet to port(s) 2. Encapsulate and forward to controller 3. Drop packet 4. Send to normal processing pipeline 5. Modify Fields Switch Port VLAN ID MAC src MAC dst Eth type IP Src IP Dst IP Prot TCP sport TCP dport + mask what fields to match

63 Examples Switching Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot TCP sport TCP dport Action * * 00:1f:.. * * * * * * * port6 Flow Switching Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot TCP sport TCP dport Action port3 00: :1f vlan port6 Firewall Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot TCP sport TCP dport Forward * * * * * * * * * 22 drop

64 Examples Routing Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot TCP sport TCP dport Action * * * * * * * * * port6 VLAN Switching Switch Port * MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot TCP sport * 00:1f.. * vlan1 * * * * * TCP dport Action port6, port7, port9

65 packet in flow table 0 flow table 1 flow table n OF 1.1+ flow table operation action set packet out Table matching each flow table is ordered by priority highest priority match is used (match can be made negative using drop action) matching is exact match with certain fields allowing bit masking table may specify ANY to wildcard the field fields matched may have been modified in a previous step Although the pipeline was introduced for scalability it gives more expressibility to OF matching syntax (although no additional semantics) In addition to the verbose if (field1=value1) AND (field2=value2) then if (field1=value3) AND (field2=value4) then it is now possible to accommodate if (field1=value1) then if (field2=value2) then else if (field2=value4) then

66 Unmatched packets What happens when no match is found in the flow table? A flow table may contain a flow miss entry to catch unmatched packets The flow miss entry must be inserted by the controller just like any other entry it is defined as wildcard on all fields, and lowest priority The flow miss entry may be configured to : discard packet forward to subsequent table forward (OF-encapsulated) packet to controller use normal (conventional) forwarding (for OF-hybrid switches) If there is no flow miss entry the packet is by default discarded but this behavior may be changed via of-configuration operations

67 OF switch ports The ports of an OpenFlow switch can be physical or logical The following ports are defined : physical ports (connected to switch hardware interface) logical ports connected to tunnels (tunnel ID and physical port are reported to controller) ALL output port (packet sent to all ports except input and blocked ports) CONTROLLER packet from or to controller TABLE represents start of pipeline IN_PORT output port which represents the packet s input port NORMAL optional port sends packet for conventional processing (hybrid switches only) FLOOD output port sends packet for conventional flooding

68 OpenFlow statistics OF switches maintain counters for every flow table flow entry port queue group group bucket meter meter band Counters are unsigned and wrap around without overflow indication Counters may count received/transmitted packets, bytes, or durations

69 Flow removal and expiry Flows may be explicitly deleted by the controller at any time Flows may be configured with finite lifetimes and are automatically removed upon expiry Each flow entry has two timeouts hard_timeout : if non-zero, the flow times out after X seconds idle_timeout : if non-zero, the flow times out after not receiving a packet for X seconds When a flow is removed for any reason, there is flag which requires the switch to inform the controller: that the flow has been removed the reason for its removal (expiry/delete) the lifetime of the flow statistics of the flow

70 OpenFlow Applications: Dynamic Access Control Controller Inspect first packet of a connection Consult the access control policy Install rules to block or route traffic

71 Seamless Mobility/Migration Controller See host send traffic at new location Modify rules to reroute the traffic

72 Server Load Balancing Controller Pre-install load-balancing policy Split traffic based on source IP src=0* src=1* 72

73 Network Slicing Controller #1 Controller #2 Controller #3 Partition the space of packet headers 73

74 Network Slicing Divide the production network into logical slices o each slice/service controls its own packet forwarding o users pick which slice controls their traffic: opt-in o existing production services run in their own slice e.g., Spanning tree, OSPF/BGP Enforce strong isolation between slices o actions in one slice do not affect another Allows the (logical) testbed to mirror the production network o real hardware, performance, topologies, scale, users o Prototype implementation: FlowVisor

75 Add a Slicing Layer Between Planes Slice 2 Controller Slice 1 Controller Slice 3 Controller Slice Policies Rules Control/Data Protocol Excepts Data Plane

76 Network Slicing Architecture A network slice is a collection of sliced switches/routers Data plane is unmodified Packets forwarded with no performance penalty Slicing with existing ASIC Transparent slicing layer each slice believes it owns the data path enforces isolation between slices i.e., rewrites, drops rules to adhere to slice police forwards exceptions to correct slice(s)

77 Slicing Policies The policy specifies resource limits for each slice: Link bandwidth Maximum number of forwarding rules Topology Fraction of switch/router CPU FlowSpace: which packets does the slice control?

78 FlowVisor Implemented on OpenFlow Server Servers Custom Control Plane OpenFlow Controller OpenFlow Controller OpenFlow Controller OpenFlow Controller Network Stub Control Plane Data Plane OpenFlow Firmware OpenFlow Protocol Data Path OpenFlow FlowVisor OpenFlow OpenFlow Firmware Data Path Switch/ Switch/ Router Router

79 FlowVisor Message Handling Alice Controller Bob Controller Cathy Controller Rule Policy Check: Is this rule allowed? OpenFlow FlowVisor OpenFlow Policy Check: Who controls this packet? OpenFlow Firmware Exception Packet Packet Data Path

80 OpenFlow OpenFlow protocol packet format OF runs over TCP (optionally SSL for secure operation) using port 6633 and is specified by C structs OF is a very low-level specification (assembly-language-like) Ethernet header IP header (20B) TCP header with destination port 6633 (20B) Version (1B) 0x01/2/3/4 Type (1B) Length (2B) Transaction ID (4B) Type-specific information

81 OpenFlow messages The OF protocol was built to be minimal and powerful (like x86 instruction set ) and indeed it is low-level assembly language-like There are 3 types of OpenFlow messages : OF controller to switch populates flow tables which SDN switch uses to forward request statistics OF switch to controller (asynchronous messages) packet/byte counters for defined flows sends packets not matching a defined flow Symmetric messages hellos (startup) echoes (heartbeats, measure control path latency) experimental messages for extensions

82 Symmetric messages 0 HELLO 1 ERROR 2 ECHO_REQUEST 3 ECHO_REPLY 4 EXPERIMENTER Switch configuration 5 FEATURES_REQUEST 6 FEATURES_REPLY 7 GET_CONFIG_REQUEST 8 GET_CONFIG_REPLY 9 SET_CONFIG Asynchronous messages 10 PACKET_IN = FLOW_REMOVED = PORT_STATUS = 12 OpenFlow message types Controller command messages 13 PACKET_OUT 14 FLOW_MOD 15 GROUP_MOD 16 PORT_MOD 17 TABLE_MOD Multipart messages 18 MULTIPART_REQUEST 19 MULTIPART_REPLY Barrier messages 20 BARRIER_REQUEST 21 BARRIER_REPLY Queue Configuration messages 22 QUEUE_GET_CONFIG_REQUEST 23 QUEUE_GET_CONFIG_REPLY Controller role change request messages 24 ROLE_REQUEST 25 ROLE_REPLY Asynchronous message configuration 26 GET_ASYNC_REQUEST 27 GET_ASYNC_REPLY 28 SET_ASYNC Meters and rate limiters configuration 29 METER_MOD

83 Session setup and maintenance An OF switch may contain default flow entries to use before connecting with a controller The switch will boot into a special failure mode An OF switch is usually pre-configured with the IP address of a controller OF is best run over a secure connection (TLS/SSL), but can be run over unprotected TCP Hello messages are exchanged between switch and controller upon startup Echo_Request and Echo_reply are used to verify connection liveliness and optionally to measure its latency or bandwidth If a session is interrupted by connection failure the OF switch continues operation with the current configuration Upon re-establishing connection the controller may delete all flow entries

84 Switch flows Can OpenFlow architecture scale to large networks? Existing OF switch table can handle 1000s of flows With multiple tables, or use of switch fabric and memory for basic matching, this grows to 100s of thousands of flows per switch Controller based on commercial server can handle a single server processor can handle 100Gbps = 150 Mpps (enough to control many 1000s of switches) A single server can handle 1000s to 10,000s of TCP connections: limitation of about 10K switches per controller solution is slicing to use multiple controllers, (still an open issue)

85 SDN success story- Google Google operates two large backbone networks: Internet-facing backbone (user traffic): I-scale Datacenter backbone (internal traffic): G-scale Managing large backbones is hard OpenFlow has helped Google to improve backbone performance and reduce backbone complexity and cost The two backbones have very different requirements and traffic characteristics I-scale has smooth diurnal pattern G-scale is bursty with wild demand swings, requires complex TE Since early 2012 G-scale is managed using OpenFlow Since no suitable OF device was available Google built its own switches from merchant silicon and open source stacks

86 SDN success story Google (cont.) Why did Google re-engineer G-scale? The new network has centralized traffic engineering that leads to network utilization is close to 95%! This is done by continuously collecting real-time metrics global topology data bandwidth demand from applications/services fiber utilization Path computation simplified due to global visibility and computation can be concentrated in latest generation of servers The system computes optimal path assignments for traffic flows and then programs the paths into the switches using OpenFlow. As demand changes or network failures occur the service re-computes path assignments and reprograms the switches Network can respond quickly and be hitlessly upgraded

87 OK, so we can virtualize a basic switch What else may be useful? 87

88 Network Functions Virtualization 88

89 NFV Approximately two years after its creation, the concept of Network Functions Virtualization (NFV) has established its pre-eminence in the telecoms operators scenario: Has already brought together around 150 members in an Industry Specification Group (ISG) within the European Telecommunication Standards Institute (ETSI). 89

90 The NFV Concept A means to make the network more flexible and simple by minimising dependence on HW constraints Traditional Network Model: APPLIANCE APPROACH DPI Firewall BRAS CG-NAT v GGSN/SGSN Session Border Controller PE Router Network Functions are based on specific HW&SW One physical node per role Virtualised Network Model: VIRTUAL APPLIANCE APPROACH v DPI CG-NAT GGSN/ BRAS SGSN Firewall PE Router VIRTUAL APPLIANCES ORCHESTRATION, AUTOMATION & REMOTE INSTALL STANDARD HIGH VOLUME SERVERS Network Functions are SW-based over well-known HW Multiple roles over same HW Source: Adapted from D. Lopez Telefonica I+D, NFV

91 Reduce cycle of innovation Telco Cycle Idea!! Idea!! AVAILABLE Service Providers Cycle AVAILABLE Telco Operators Demand Deploy Service Providers Develop Deploy Publish 2-6 Months Equipment Vendors Drive Sell SDOs Critical mass of supporters Standardise Implement 2-6 Years 2-6 years 2-6 months Source: Adapted from D. Lopez Telefonica I+D, NFV

92 Benefits & Promises of NFV Network Functions Virtualization is about implementing network functions in software - that today run on proprietary hardware - leveraging (high volume) standard servers and IT virtualization Supports multi-versioning and multi-tenancy of network functions, which allows use of a single physical platform for different applications, users and tenants Flexibility to easily, rapidly, dynamically provision and instantiate new services in various locations Software-oriented innovation to rapidly prototype and test new services and generate new revenue streams More service differentiation & customization Reduced (OPEX) operational costs: reduced power, reduced space, improved network monitoring

93 So, why we need/want NFV(/SDN)? 1. Virtualization: Use network resource without worrying about where it is physically located, how much it is, how it is organized, etc. 2. Orchestration: Manage thousands of devices 3. Programmable: Should be able to change behavior on the fly. 4. Dynamic Scaling: Should be able to change size, quantity 5. Automation 6. Visibility: Monitor resources, connectivity 7. Performance: Optimize network device utilization 8. Multi-tenancy 9. Service Integration 10. Openness: Full choice of modular plug-ins Note: These are exactly the same reasons why we need/want SDN.

94 NFV and SDN NFV and SDN are highly complementary Both topics are mutually beneficial but not dependent on each other Creates competitive supply of innovative applications by third parties Open Innovation Software Defined Networking Creates network abstractions to enable faster innovation Network Functions Virtualization Reduces CAPEX, OPEX, Space & Power Consumption

95 NFV vs SDN NFV: re-definition of network equipment architecture NFV was born to meet Service Provider (SP) needs: Lower CAPEX by reducing/eliminating proprietary hardware Consolidate multiple network functions onto industry standard platforms SDN: re-definition of network architecture SDN comes from the IT world: Separate the data and control layers, while centralizing the control Deliver the ability to program network behavior using well-defined interfaces Both have similar goals but approaches are very different SDN needs new interfaces, control modules, applications. NFV requires moving network applications from dedicated hardware to virtual containers

96 High level NFV framework 96

97 Network Services in NFV An end-to-end network service (e.g. mobile voice/data, Internet access, a virtual private network) can be described by an NF Forwarding Graph of interconnected Network Functions (NFs) and end points. 97

98 End to End Network Service Example with VNFs and nested forwarding graphs 98

99 NFV Challenges Achieving high performance virtualised network appliances portable between different HW vendors, and with different hypervisors Management and orchestration of virtual network appliances ensuring security from attack and misconfiguration appropriate level of resilience to HW and SW failure Integrating multiple virtual appliances from different vendors Network operators need to be able to mix & match HW, hypervisors and virtual appliances from different vendors, without incurring significant integration costs and avoiding lock-in.

100 OpenFlow-enabled SDN and Network Functions Virtualization Source: ONF Solution Brief February 17,

101 NFV and SDN NFV is intended to optimize the deployment of network functions (such as firewalls, DNS, load balancers, etc.), OpenFlow-based SDN is focused on optimizing the underlying networks. ONF is undertaking SDN standardization. The ETSI NFV ISG is not a standards body, but rather will produce requirements that network operators can adapt for their individual environments. Both bodies are driven by a strong end-user culture. 101

102 NFV and SDN 102

103 NFV use cases

104 NFV INFRASTRUCTURE AS A SERVICE For the delivery of cloud services: One service provider can offer services using the NFV infrastructure (NFVI) of another service provider. Example: service provider X offers a virtualized load balancing service. Some of carrier X s customers need load balancing services at locations where that company doesn t maintain NFVI, but where service provider Z does. 104

105 NFV INFRASTRUCTURE AS A SERVICE NFVIaaS offers a means for carrier Z to lease NFV infrastructure (compute, network, hypervisors, etc.) to service provider X, which gives the latter access to infrastructure that would otherwise be prohibitively expensive to obtain. Through leasing, such capacity is available on demand, and can be scaled as needed. 105

106 OpenFlow-enabled SDN: A Flexible NFV Networking Solution 106

107 NFV: Use Cases 107

108 NFV: Use Cases 108

109 NFV: Use Cases 109

110 Virtualization of Mobile Core Network Possible advantages: Reduced TCO (Total Cost of Ownership). Improved network usage efficiency due to flexible allocation of different Network Functions on such hardware resource pool. Higher service availability and resiliency provided to end users/customers by dynamic network reconfiguration inherent to virtualization technology. Elasticity: Capacity dedicated to each Network function can be dynamically modified according to actual load on the network, thus increasing scalability. Topology reconfiguration: Network topology can be dynamically reconfigured to optimize performances. 110

111 Virtualization of Mobile Core Network Virtualization of Mobile Core Network Functions: EPC Core & Adjunct Network Functions e.g. MME, S/P-GW, PCRF, etc. 3G/EPC Interworking Network Functions e.g. SGSN, GGSN, etc. 111

112 Different scenarios may be enabled where, for example, the entire EPC is Virtualised in a single NFVI-PoP or only some NFs are Virtualised Virtualization of EPC Partial virtualization of the core network Coexistence of Virtualized and non Virtualized mobile core network: 112

113 Virtualization of base stations A RAN node utilization is usually lower than its MAX capacity because the system is designed to cover the peak load Base Station virtualization can achieve sharing of resources among multiple logical RAN nodes from different systems, dynamically allocating the resource Centralized-RAN (C-RAN) technology with virtualization can leverage more efficient resource utilization among different physical BSs 113

114 Cloud-RAN Cloud-RAN is a new cellular network architecture for the future mobile network infrastructure. It was first introduced by China Mobile Research Institute in April 2010 in Beijing, China. C-RAN is a centralized, cloud computing based new radio access network (commonly known as cellular network) architecture that can support 2G, 3G, 4G system and future wireless communication standards. 114

115 C-RAN Motivations Limitations of traditional cellular architectures: each BTS is costly to build and operate. when more BTS are added to the system to improve capacity: Increasing of interference among BTS because mobile users are moving from one place to another, the traffic of each BTS is fluctuating very much from time to time, (tide effect): the average utilization rate of individual BTS is pretty low. these processing resources cannot be shared with other BTS. Thus all the BTS must be designed to handle the maximum traffic expected no matter the size of the average traffic. A lot of waste of processing resources and waste of powers at idle times 115

116 Challenges in Mobile Internet Era BS cell site is the major source of power consumption. Other Support Equipment, 3% Air Conditioners, 46% Major Equipment, 51% *Source: Base on China Mobile survey on commercial networks

117 Base Station Architecture Model the radio function unit, remote radio head (RRH), is separated from the digital function unit, the baseband unit (BBU) by fiber. The RRH can be installed on the top of tower The fibre link between RRH and BBU allows much more flexibility in network planning and deployment as they can be placed a few hundreds meters or a few kilometres away now. 117

118 C-RAN approach It makes use of the latest CPRI standard, low cost CWDM/DWDM technology, or mmwave to allow transmission of baseband signal over long distance thus achieving large scale centralized base station deployment It applies recent Data Centre Network technology to allow a low cost, high reliability, low latency and high bandwidth interconnect network in the BBU pool It utilizes open platform and real-time virtualization technology rooted in cloud computing to achieve dynamic shared resource allocation in BBU pool and support of multi-vendor, multi-technology environment. 118

119 C-RAN Centralized Baseband Pool Traditional macro base-stations C-RAN Centralized baseband pool

120 C-RAN Virtual BS Pool Centralized baseband pool real time Cloud computing Optical Network RRU RRU RRU RRU RRU RRU RRU

121 C-RAN Collaborative Radio interference signal Separately processing Joint-processing

122 C-RAN App Service TD-LTE TD-SCDMA GSM TD-LTE TD-SCDMA GSM Traditional baseband equipments Software Defined Radio based on Virtualized Cloud Platform

123 C-RAN Clean System Target Construction cost per site reduced by 1/3 Power consumption reduced by at most 71% Macro BS C-RAN 29% 71% saved *Source: Base on China Mobile field trial surveys

124 Cloud-RAN Separates the computing intensive baseband processing from the remote radio deployments Baseband processing is pooled at a semi-centralized location C-RAN Enables Use of commodity HW to run baseband processing tasks More fluid resource allocation Enables new feature implementation like CoMP and eicic Helps ease capacity crunch by placing radios closer to the user 124

125 C-RAN concept Services are provided through optimum access technology Resources and coverage of a geographical area can be changed dynamically SON can be used to get information for providing the necessary configuration Resources are aggregated and dynamically allocated Reconfigurable BSs and controllers to support multiple Radio Access technologies 125

126 Radio Access Network Virtualization Open the wireless infrastructure so users can choose any free spectrum, any network, or many networks, any time WiMAX 3G WiFi Any network.

127 The road towards 5G 127

128 (R)Evolution towards 5G RAT Evolution GSM, GPRS, EDGE G UMTS HSPA 3G LTE LTE-A INCREASING CAPACITY RAT Evolution 5G REVOLUTION Decreasing Cell Size: Macro- Micro-Pico-Femto Cells Cloud RAN D2D communication Universal RAT Network Intelligence closer to users 128

129 Are we ready for the 5G objectives? 129

130 Summary We looked at the concept of virtualization and architectures and paradigms for enabling elasticity in the future networks. Network Virtualization offers: transparent abstraction of networking platform and resources multiple logical interpretations of the physical characteristics resource partitioning resource sharing Network Functions Virtualization offers the potential to transform carrier/network operator operations while achieving significant agility and cost reduction. SDN is emerging as the key enabler for NFV, offering the dynamic behavior, automation, and openness required for carrier networks in the future. 130

131 References 1. Chowdhury, N.M.M.K.; Boutaba, R., "Network virtualization: state of the art and research challenges," Communications Magazine, IEEE, vol.47, no.7, pp.20,26, July J. Carapinha and J. Jimenez, Network virtualization a view from the bottom," ACM SIGCOMM workshop on Virtualized Infrastructure Systems and Architectures (visa), Barcelona, Spain, August O. M. E. Committee. Software-defined Networking: The New Norm for Networks. Open Networking Foundation, Open Networking Foundation: 5. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling Innovation in Campus Networks. White paper. March Y.Stein, SDN-NFV and all that, mini course,available at 7. Network Sharing in LTE Opportunity & Solutions. Network Sharing in LTE, Technology White Paper, Alcatel Lucent, Liang Zhao; Ming Li; Zaki, Y.; Timm-Giel, A.; Gorg, C., "LTE virtualization: From theoretical gain to practical solution," Teletraffic Congress (ITC), rd International, vol., no., pp.71,78, 6-9 Sept Costa-Perez, X.; Swetina, J.; Tao Guo; Mahindra, R.; Rangarajan, S., Radio Access Network Virtualization for Future Mobile Carrier Networks, Communications Magazine, IEEE, vol.51, no.7, pp.27, 35, July ETSI GS NFV 001: "Network Functions Virtualisation (NFV); Use Cases 11. ONF Solution Brief., February 17, 2014, available at China Mobile Research institute "C-RAN the road towards green RAN", white paper, version 3 December Felita, C.; Suryanegara, M., "5G key technologies: Identifying innovation opportunity," QiR (Quality in Research), 2013 International Conference on, vol., no., pp.235,238, June

132 Thank you 132

EE512: Error Control Coding

EE512: Error Control Coding EE512: Error Control Coding Solution for Assignment on Finite Fields February 16, 2007 1. (a) Addition and Multiplication tables for GF (5) and GF (7) are shown in Tables 1 and 2. + 0 1 2 3 4 0 0 1 2 3

Διαβάστε περισσότερα

Internet protocol stack Encapsulation Connection oriented VS connectionless services Circuit Switching Packet Switching Store-and-forward switches

Internet protocol stack Encapsulation Connection oriented VS connectionless services Circuit Switching Packet Switching Store-and-forward switches Internet protocol stack Encapsulation Connection oriented VS connectionless services Circuit Switching Packet Switching Store-and-forward switches ultiplexing: TD, FD, Statistical multiplexing, CDA OSI

Διαβάστε περισσότερα

CYTA Cloud Server Set Up Instructions

CYTA Cloud Server Set Up Instructions CYTA Cloud Server Set Up Instructions ΕΛΛΗΝΙΚΑ ENGLISH Initial Set-up Cloud Server To proceed with the initial setup of your Cloud Server first login to the Cyta CloudMarketPlace on https://cloudmarketplace.cyta.com.cy

Διαβάστε περισσότερα

Β. Μάγκλαρης 14/12/2015.

Β. Μάγκλαρης 14/12/2015. ΔΙΑΧΕΙΡΙΣΗ ΔΙΚΤΥΩΝ Ευφυείς Προγραμματιζόμενες Δικτυακές Υποδομές (Ι) Κίνητρα για Software Defined Networking SDN Το Πρωτόκολλο OpenFlow Εφαρμογές σε Κατανεμημένες Υπολογιστικές Υποδομές Β. Μάγκλαρης maglaris@netmode.ntua.gr

Διαβάστε περισσότερα

Instruction Execution Times

Instruction Execution Times 1 C Execution Times InThisAppendix... Introduction DL330 Execution Times DL330P Execution Times DL340 Execution Times C-2 Execution Times Introduction Data Registers This appendix contains several tables

Διαβάστε περισσότερα

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ. Υπηρεσίες ιαχείρισης, Ελέγχου και Προώθησης εδοµένων σε Περιβάλλοντα Εικονικής ικτύωσης Οριζόµενης από Λογισµικό (SDN)

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ. Υπηρεσίες ιαχείρισης, Ελέγχου και Προώθησης εδοµένων σε Περιβάλλοντα Εικονικής ικτύωσης Οριζόµενης από Λογισµικό (SDN) ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΕΠΙΚΟΙΝΩΝΙΩΝ, ΗΛΕΚΤΡΟΝΙΚΗΣ ΚΑΙ ΣΥΣΤΗΜΑΤΩΝ ΠΛΗΡΟΦΟΡΙΚΗΣ Υπηρεσίες ιαχείρισης, Ελέγχου και Προώθησης εδοµένων σε

Διαβάστε περισσότερα

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων Εξάμηνο 7 ο Procedures and Functions Stored procedures and functions are named blocks of code that enable you to group and organize a series of SQL and PL/SQL

Διαβάστε περισσότερα

TaxiCounter Android App. Περδίκης Ανδρέας ME10069

TaxiCounter Android App. Περδίκης Ανδρέας ME10069 TaxiCounter Android App Περδίκης Ανδρέας ME10069 Content Android Operating System Development Tools Taxi Counter Algorithm Design Development Process Android Operating System Android is a Linux-based operating

Διαβάστε περισσότερα

ΕΥΦΥΗ ΠΡΟΓΡΑΜΑΤΙΖΟΜΕΝΑ ΙΚΤΥΑ Software Defined Networks (SDN)

ΕΥΦΥΗ ΠΡΟΓΡΑΜΑΤΙΖΟΜΕΝΑ ΙΚΤΥΑ Software Defined Networks (SDN) Εργαστήριο ιαχείρισης και Βέλτιστου Σχεδιασµού ικτύων (NETMODE) ΕΥΦΥΗ ΠΡΟΓΡΑΜΑΤΙΖΟΜΕΝΑ ΙΚΤΥΑ Software Defined Networks (SDN) Άσκηση 7 ΓΙΑΤΙ ΧΡΕΙΑΖΟΜΑΣΤΕ ΠΡΟΓΡΑΜΜΑΤΙΖΟΜΕΝΑ ΙΚΤΥΑ ; Κάθε δικτυακός κόµβος

Διαβάστε περισσότερα

HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:

HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch: HOMEWORK 4 Problem a For the fast loading case, we want to derive the relationship between P zz and λ z. We know that the nominal stress is expressed as: P zz = ψ λ z where λ z = λ λ z. Therefore, applying

Διαβάστε περισσότερα

Assalamu `alaikum wr. wb.

Assalamu `alaikum wr. wb. LUMP SUM Assalamu `alaikum wr. wb. LUMP SUM Wassalamu alaikum wr. wb. Assalamu `alaikum wr. wb. LUMP SUM Wassalamu alaikum wr. wb. LUMP SUM Lump sum lump sum lump sum. lump sum fixed price lump sum lump

Διαβάστε περισσότερα

Test Data Management in Practice

Test Data Management in Practice Problems, Concepts, and the Swisscom Test Data Organizer Do you have issues with your legal and compliance department because test environments contain sensitive data outsourcing partners must not see?

Διαβάστε περισσότερα

University of Macedonia Master in Information Systems. Networking Technologies professors: A. Economides A. Pobortsis AGREEMENT AND ACCOUNTING

University of Macedonia Master in Information Systems. Networking Technologies professors: A. Economides A. Pobortsis AGREEMENT AND ACCOUNTING University of Macedonia Master in Information Systems professors: A. Economides A. Pobortsis SERVICE LEVEL AGREEMENT (SLA) NEGOTIATING,, MEASURINGM AND ACCOUNTING Simeonidis Efstathios MIS18/05 January

Διαβάστε περισσότερα

Κάθε δικτυακός κόµβος έχει δικό του: 1. ΛΣ (OS) 2. επίπεδο προώθησης δεδοµένων (forwarding plane) 3. επίπεδο ελέγχου

Κάθε δικτυακός κόµβος έχει δικό του: 1. ΛΣ (OS) 2. επίπεδο προώθησης δεδοµένων (forwarding plane) 3. επίπεδο ελέγχου Άδεια Χρήσης Το παρόν εκπαιδευτικό υλικό υπόκειται σε άδειες χρήσης Creative Commons. Για εκπαιδευτικό υλικό, όπως εικόνες, που υπόκειται σε άδεια χρήσης άλλου τύπου, αυτή πρέπει να αναφέρεται ρητώς. ΓΙΑΤΙ

Διαβάστε περισσότερα

Strain gauge and rosettes

Strain gauge and rosettes Strain gauge and rosettes Introduction A strain gauge is a device which is used to measure strain (deformation) on an object subjected to forces. Strain can be measured using various types of devices classified

Διαβάστε περισσότερα

The Simply Typed Lambda Calculus

The Simply Typed Lambda Calculus Type Inference Instead of writing type annotations, can we use an algorithm to infer what the type annotations should be? That depends on the type system. For simple type systems the answer is yes, and

Διαβάστε περισσότερα

Physical DB Design. B-Trees Index files can become quite large for large main files Indices on index files are possible.

Physical DB Design. B-Trees Index files can become quite large for large main files Indices on index files are possible. B-Trees Index files can become quite large for large main files Indices on index files are possible 3 rd -level index 2 nd -level index 1 st -level index Main file 1 The 1 st -level index consists of pairs

Διαβάστε περισσότερα

Διπλωματική Εργασία του φοιτητή του Τμήματος Ηλεκτρολόγων Μηχανικών και Τεχνολογίας Υπολογιστών της Πολυτεχνικής Σχολής του Πανεπιστημίου Πατρών

Διπλωματική Εργασία του φοιτητή του Τμήματος Ηλεκτρολόγων Μηχανικών και Τεχνολογίας Υπολογιστών της Πολυτεχνικής Σχολής του Πανεπιστημίου Πατρών ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΑΤΡΩΝ ΤΜΗΜΑ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ: ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ & ΤΕΧΝΟΛΟΓΙΑΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ ΕΡΓΑΣΤΗΡΙΟ ΕΝΣΥΡΜΑΤΗΣ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΣ Διπλωματική Εργασία του φοιτητή

Διαβάστε περισσότερα

Capacitors - Capacitance, Charge and Potential Difference

Capacitors - Capacitance, Charge and Potential Difference Capacitors - Capacitance, Charge and Potential Difference Capacitors store electric charge. This ability to store electric charge is known as capacitance. A simple capacitor consists of 2 parallel metal

Διαβάστε περισσότερα

A browser-based digital signing solution over the web

A browser-based digital signing solution over the web A browser-based digital signing solution over the web Fotis Loukos Charalampos Tsipizidis Dimitris Daskopoulos The problem Contents Proposed solution Architecture Native Messaging Host Native Messaging

Διαβάστε περισσότερα

Block Ciphers Modes. Ramki Thurimella

Block Ciphers Modes. Ramki Thurimella Block Ciphers Modes Ramki Thurimella Only Encryption I.e. messages could be modified Should not assume that nonsensical messages do no harm Always must be combined with authentication 2 Padding Must be

Διαβάστε περισσότερα

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΗΛΕΚΤΡΙΚΗΣ ΙΣΧΥΟΣ

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΗΛΕΚΤΡΙΚΗΣ ΙΣΧΥΟΣ ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΗΛΕΚΤΡΙΚΗΣ ΙΣΧΥΟΣ Προοπτικές Εναρμόνισης της Ελληνικής Αγοράς Ηλεκτρικής Ενέργειας με τις Προδιαγραφές του Μοντέλου

Διαβάστε περισσότερα

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007 Οδηγίες: Να απαντηθούν όλες οι ερωτήσεις. Αν κάπου κάνετε κάποιες υποθέσεις να αναφερθούν στη σχετική ερώτηση. Όλα τα αρχεία που αναφέρονται στα προβλήματα βρίσκονται στον ίδιο φάκελο με το εκτελέσιμο

Διαβάστε περισσότερα

Démographie spatiale/spatial Demography

Démographie spatiale/spatial Demography ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ Démographie spatiale/spatial Demography Session 1: Introduction to spatial demography Basic concepts Michail Agorastakis Department of Planning & Regional Development Άδειες Χρήσης

Διαβάστε περισσότερα

ΓΡΑΜΜΙΚΟΣ & ΔΙΚΤΥΑΚΟΣ ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ

ΓΡΑΜΜΙΚΟΣ & ΔΙΚΤΥΑΚΟΣ ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ ΓΡΑΜΜΙΚΟΣ & ΔΙΚΤΥΑΚΟΣ ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ Ενότητα 12: Συνοπτική Παρουσίαση Ανάπτυξης Κώδικα με το Matlab Σαμαράς Νικόλαος Άδειες Χρήσης Το παρόν εκπαιδευτικό υλικό υπόκειται σε άδειες χρήσης Creative Commons.

Διαβάστε περισσότερα

ίκτυο προστασίας για τα Ελληνικά αγροτικά και οικόσιτα ζώα on.net e-foundatio //www.save itute: http:/ toring Insti SAVE-Monit

ίκτυο προστασίας για τα Ελληνικά αγροτικά και οικόσιτα ζώα on.net e-foundatio //www.save itute: http:/ toring Insti SAVE-Monit How to run a Herdbook: Basics and Basics According to the pedigree scheme, you need to write down the ancestors of your animals. Breeders should be able easily to write down the necessary data It is better

Διαβάστε περισσότερα

Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)

Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required) Phys460.nb 81 ψ n (t) is still the (same) eigenstate of H But for tdependent H. The answer is NO. 5.5.5. Solution for the tdependent Schrodinger s equation If we assume that at time t 0, the electron starts

Διαβάστε περισσότερα

Δίκτυα Επικοινωνιών ΙΙ: OSPF Configuration

Δίκτυα Επικοινωνιών ΙΙ: OSPF Configuration Δίκτυα Επικοινωνιών ΙΙ: OSPF Configuration Δρ. Απόστολος Γκάμας Διδάσκων 407/80 gkamas@uop.gr Δίκτυα Επικοινωνιών ΙΙ Διαφάνεια 1 1 Dynamic Routing Configuration Router (config) # router protocol [ keyword

Διαβάστε περισσότερα

Approximation of distance between locations on earth given by latitude and longitude

Approximation of distance between locations on earth given by latitude and longitude Approximation of distance between locations on earth given by latitude and longitude Jan Behrens 2012-12-31 In this paper we shall provide a method to approximate distances between two points on earth

Διαβάστε περισσότερα

Γιπλυμαηική Δπγαζία. «Ανθπυποκενηπικόρ ζσεδιαζμόρ γέθςπαρ πλοίος» Φοςζιάνηρ Αθανάζιορ. Δπιβλέπυν Καθηγηηήρ: Νηθφιανο Π. Βεληίθνο

Γιπλυμαηική Δπγαζία. «Ανθπυποκενηπικόρ ζσεδιαζμόρ γέθςπαρ πλοίος» Φοςζιάνηρ Αθανάζιορ. Δπιβλέπυν Καθηγηηήρ: Νηθφιανο Π. Βεληίθνο ΔΘΝΙΚΟ ΜΔΣΟΒΙΟ ΠΟΛΤΣΔΥΝΔΙΟ ΥΟΛΗ ΝΑΤΠΗΓΩΝ ΜΗΥΑΝΟΛΟΓΩΝ ΜΗΥΑΝΙΚΩΝ Γιπλυμαηική Δπγαζία «Ανθπυποκενηπικόρ ζσεδιαζμόρ γέθςπαρ πλοίος» Φοςζιάνηρ Αθανάζιορ Δπιβλέπυν Καθηγηηήρ: Νηθφιανο Π. Βεληίθνο Σπιμελήρ Δξεηαζηική

Διαβάστε περισσότερα

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: OSPF Cost

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: OSPF Cost Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: OSPF Cost Πανεπιστήμιο Πελοποννήσου Τμήμα Επιστήμης & Τεχνολογίας Τηλεπικοινωνιών Ευάγγελος Α. Κοσμάτος Basic OSPF Configuration Υλοποίηση Δικτυακών Υποδομών

Διαβάστε περισσότερα

Πανεπιστήμιο Πειραιώς Τμήμα Πληροφορικής Πρόγραμμα Μεταπτυχιακών Σπουδών «Πληροφορική»

Πανεπιστήμιο Πειραιώς Τμήμα Πληροφορικής Πρόγραμμα Μεταπτυχιακών Σπουδών «Πληροφορική» Πανεπιστήμιο Πειραιώς Τμήμα Πληροφορικής Πρόγραμμα Μεταπτυχιακών Σπουδών «Πληροφορική» Μεταπτυχιακή Διατριβή Τίτλος Διατριβής Επίκαιρα Θέματα Ηλεκτρονικής Διακυβέρνησης Ονοματεπώνυμο Φοιτητή Σταμάτιος

Διαβάστε περισσότερα

ΑΠΟΔΟΤΙΚΗ ΑΠΟΤΙΜΗΣΗ ΕΡΩΤΗΣΕΩΝ OLAP Η ΜΕΤΑΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ ΕΞΕΙΔΙΚΕΥΣΗΣ. Υποβάλλεται στην

ΑΠΟΔΟΤΙΚΗ ΑΠΟΤΙΜΗΣΗ ΕΡΩΤΗΣΕΩΝ OLAP Η ΜΕΤΑΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ ΕΞΕΙΔΙΚΕΥΣΗΣ. Υποβάλλεται στην ΑΠΟΔΟΤΙΚΗ ΑΠΟΤΙΜΗΣΗ ΕΡΩΤΗΣΕΩΝ OLAP Η ΜΕΤΑΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ ΕΞΕΙΔΙΚΕΥΣΗΣ Υποβάλλεται στην ορισθείσα από την Γενική Συνέλευση Ειδικής Σύνθεσης του Τμήματος Πληροφορικής Εξεταστική Επιτροπή από την Χαρά Παπαγεωργίου

Διαβάστε περισσότερα

Αλίκη Λέσση. CNS&P Presales Engineer

Αλίκη Λέσση. CNS&P Presales Engineer Αλίκη Λέσση CNS&P Presales Engineer Agenda Η BYTE Διεθνείς τάσεις A New Reality All Virtual Case Study 2 Από τις μεγαλύτερες ελληνικές εταιρείες παροχής ολοκληρωμένων λύσεων πληροφορικής και επικοινωνιών

Διαβάστε περισσότερα

Terabyte Technology Ltd

Terabyte Technology Ltd Terabyte Technology Ltd is a Web and Graphic design company in Limassol with dedicated staff who will endeavour to deliver the highest quality of work in our field. We offer a range of services such as

Διαβάστε περισσότερα

Dynamic types, Lambda calculus machines Section and Practice Problems Apr 21 22, 2016

Dynamic types, Lambda calculus machines Section and Practice Problems Apr 21 22, 2016 Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Dynamic types, Lambda calculus machines Apr 21 22, 2016 1 Dynamic types and contracts (a) To make sure you understand the

Διαβάστε περισσότερα

Από την ιδέα στο έργο

Από την ιδέα στο έργο Από την ιδέα στο έργο Δρ. Κωνσταντίνος Νίκας Μεταδιδακτορικός Ερευνητής CSLab: Computing Systems Laboratory 4 ΜΕΛΗ ΔΕΠ 30 χρόνια προσφοράς, από το 1986 5 ΜΕΤΑΔΙΔΑΚΤΟΡΙΚΟΙ ΕΡΕΥΝΗΤΕΣ 17 ΥΠΟΨΗΦΙΟΙ ΔΙΔΑΚΤΟΡΕΣ

Διαβάστε περισσότερα

2 Composition. Invertible Mappings

2 Composition. Invertible Mappings Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan Composition. Invertible Mappings In this section we discuss two procedures for creating new mappings from old ones, namely,

Διαβάστε περισσότερα

department listing department name αχχουντσ ϕανε βαλικτ δδσϕηασδδη σδηφγ ασκϕηλκ τεχηνιχαλ αλαν ϕουν διξ τεχηνιχαλ ϕοην µαριανι

department listing department name αχχουντσ ϕανε βαλικτ δδσϕηασδδη σδηφγ ασκϕηλκ τεχηνιχαλ αλαν ϕουν διξ τεχηνιχαλ ϕοην µαριανι She selects the option. Jenny starts with the al listing. This has employees listed within She drills down through the employee. The inferred ER sttricture relates this to the redcords in the databasee

Διαβάστε περισσότερα

A Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks

A Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks P2P 1,a) 1 1 1 P2P P2P P2P P2P A Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks NARISHIGE Yuki 1,a) ABE Kota 1 ISHIBASHI Hayato 1 MATSUURA Toshio 1

Διαβάστε περισσότερα

Εισαγωγή στα Πληροφοριακά Συστήματα. Ενότητα 11: Αρχιτεκτονική Cloud

Εισαγωγή στα Πληροφοριακά Συστήματα. Ενότητα 11: Αρχιτεκτονική Cloud Εισαγωγή στα Πληροφοριακά Συστήματα Ενότητα 11: Κωνσταντίνος Ταραμπάνης Τμήμα Οργάνωσης & Διοίκησης Επιχειρήσεων ΕΙΣΑΓΩΓΗ ΣΤΑ ΠΛΗΡΟΦΟΡΙΑΚΑ ΣΥΣΤΗΜΑΤΑ Κωνσταντίνος Ταραμπάνης Άδειες Χρήσης Το παρόν εκπαιδευτικό

Διαβάστε περισσότερα

Modbus basic setup notes for IO-Link AL1xxx Master Block

Modbus basic setup notes for IO-Link AL1xxx Master Block n Modbus has four tables/registers where data is stored along with their associated addresses. We will be using the holding registers from address 40001 to 49999 that are R/W 16 bit/word. Two tables that

Διαβάστε περισσότερα

the total number of electrons passing through the lamp.

the total number of electrons passing through the lamp. 1. A 12 V 36 W lamp is lit to normal brightness using a 12 V car battery of negligible internal resistance. The lamp is switched on for one hour (3600 s). For the time of 1 hour, calculate (i) the energy

Διαβάστε περισσότερα

The challenges of non-stable predicates

The challenges of non-stable predicates The challenges of non-stable predicates Consider a non-stable predicate Φ encoding, say, a safety property. We want to determine whether Φ holds for our program. The challenges of non-stable predicates

Διαβάστε περισσότερα

derivation of the Laplacian from rectangular to spherical coordinates

derivation of the Laplacian from rectangular to spherical coordinates derivation of the Laplacian from rectangular to spherical coordinates swapnizzle 03-03- :5:43 We begin by recognizing the familiar conversion from rectangular to spherical coordinates (note that φ is used

Διαβάστε περισσότερα

ΜΟΝΤΕΛΑ ΛΗΨΗΣ ΑΠΟΦΑΣΕΩΝ

ΜΟΝΤΕΛΑ ΛΗΨΗΣ ΑΠΟΦΑΣΕΩΝ ΜΟΝΤΕΛΑ ΛΗΨΗΣ ΑΠΟΦΑΣΕΩΝ Ενότητα 12 Τμήμα Εφαρμοσμένης Πληροφορικής Άδειες Χρήσης Το παρόν εκπαιδευτικό υλικό υπόκειται σε άδειες χρήσης Creative Commons. Για εκπαιδευτικό υλικό, όπως εικόνες, που υπόκειται

Διαβάστε περισσότερα

Στρατηγικές Ασφάλειας

Στρατηγικές Ασφάλειας Στρατηγικές Ασφάλειας Ασφάλεια Πληροφοριακών Συστημάτων. Διδάσκων: Σ. Κοντογιάννης Least/(Most) Privileges Defense in Depth Συγκεντρωτική Στρατηγική Weakest Link Strategy Fail Safe Stance Fail Safe Stance

Διαβάστε περισσότερα

Β. Μάγκλαρης.

Β. Μάγκλαρης. ΔΙΑΧΕΙΡΙΣΗ ΔΙΚΤΥΩΝ Αρχιτεκτονική & Δρομολόγηση στο Internet (Τμήμα 2/2) Ορισμοί & Ταξινόμηση Τεχνικών Δρομολόγησης Δρομολόγηση Επιπέδου Δικτύου (IP) Intra-AS & Inter-AS Β. Μάγκλαρης maglaris@netmode.ntua.gr

Διαβάστε περισσότερα

Right Rear Door. Let's now finish the door hinge saga with the right rear door

Right Rear Door. Let's now finish the door hinge saga with the right rear door Right Rear Door Let's now finish the door hinge saga with the right rear door You may have been already guessed my steps, so there is not much to describe in detail. Old upper one file:///c /Documents

Διαβάστε περισσότερα

6.003: Signals and Systems. Modulation

6.003: Signals and Systems. Modulation 6.003: Signals and Systems Modulation May 6, 200 Communications Systems Signals are not always well matched to the media through which we wish to transmit them. signal audio video internet applications

Διαβάστε περισσότερα

Επίπεδο Μεταφοράς. (ανεβαίνουμε προς τα πάνω) Εργαστήριο Δικτύων Υπολογιστών Τμήμα Μηχανικών Η/Υ και Πληροφορικής

Επίπεδο Μεταφοράς. (ανεβαίνουμε προς τα πάνω) Εργαστήριο Δικτύων Υπολογιστών Τμήμα Μηχανικών Η/Υ και Πληροφορικής Επίπεδο Μεταφοράς (ανεβαίνουμε προς τα πάνω) Εργαστήριο Δικτύων Υπολογιστών 2014-2015 Τμήμα Μηχανικών Η/Υ και Πληροφορικής Επίπεδο Μεταφοράς(Transport layer) Επίπεδο εφαρμογής (Application layer): Συντονισμός

Διαβάστε περισσότερα

GREECE BULGARIA 6 th JOINT MONITORING

GREECE BULGARIA 6 th JOINT MONITORING GREECE BULGARIA 6 th JOINT MONITORING COMMITTEE BANSKO 26-5-2015 «GREECE BULGARIA» Timeline 02 Future actions of the new GR-BG 20 Programme June 2015: Re - submission of the modified d Programme according

Διαβάστε περισσότερα

Radio Communion Modes

Radio Communion Modes Radio Communion Modes Simplex Repeater Trunking Presented to, September 2, 2009 By Phil Henderson, KF6ZSQ 1 Radio Communion Modes Simplex Point to point communications between radios Ties up one frequency

Διαβάστε περισσότερα

Classification and Comparison of Energy-Efficient Routing Algorithms in Wireless Networks

Classification and Comparison of Energy-Efficient Routing Algorithms in Wireless Networks University of Macedonia Master in Information Systems Computer Networks Professor: A. A. Economides Classification and Comparison of Energy-Efficient Routing Algorithms in Wireless Networks Zinovia I.

Διαβάστε περισσότερα

(C) 2010 Pearson Education, Inc. All rights reserved.

(C) 2010 Pearson Education, Inc. All rights reserved. Connectionless transmission with datagrams. Connection-oriented transmission is like the telephone system You dial and are given a connection to the telephone of fthe person with whom you wish to communicate.

Διαβάστε περισσότερα

Homework 3 Solutions

Homework 3 Solutions Homework 3 Solutions Igor Yanovsky (Math 151A TA) Problem 1: Compute the absolute error and relative error in approximations of p by p. (Use calculator!) a) p π, p 22/7; b) p π, p 3.141. Solution: For

Διαβάστε περισσότερα

EPL 603 TOPICS IN SOFTWARE ENGINEERING. Lab 5: Component Adaptation Environment (COPE)

EPL 603 TOPICS IN SOFTWARE ENGINEERING. Lab 5: Component Adaptation Environment (COPE) EPL 603 TOPICS IN SOFTWARE ENGINEERING Lab 5: Component Adaptation Environment (COPE) Performing Static Analysis 1 Class Name: The fully qualified name of the specific class Type: The type of the class

Διαβάστε περισσότερα

Β. Μάγκλαρης.

Β. Μάγκλαρης. ΔΙΑΧΕΙΡΙΣΗ ΔΙΚΤΥΩΝ Ευφυή Δίκτυα ΙΙΙ Προγραμματιζόμενες Δικτυακές Υποδομές Κίνητρα για Software Defined Networking SDN Το Πρωτόκολλο OpenFlow Εφαρμογές σε Κατανεμημένες Υπολογιστικές Υποδομές Β. Μάγκλαρης

Διαβάστε περισσότερα

Lecture 2. Soundness and completeness of propositional logic

Lecture 2. Soundness and completeness of propositional logic Lecture 2 Soundness and completeness of propositional logic February 9, 2004 1 Overview Review of natural deduction. Soundness and completeness. Semantics of propositional formulas. Soundness proof. Completeness

Διαβάστε περισσότερα

Απόστολος Μπιζάκης Δνων Σύμβουλος

Απόστολος Μπιζάκης Δνων Σύμβουλος Με την επίσημη υποστήριξη: Απόστολος Μπιζάκης Δνων Σύμβουλος Διημερίδα ITS Hellas «Ευφυή Συστήματα Μεταφορών & Eξελίξεις στην Ελλάδα» Αθήνα, 15-16 Δεκεμβρίου 2015 Value-Added Services Port Community System

Διαβάστε περισσότερα

Study of In-vehicle Sound Field Creation by Simultaneous Equation Method

Study of In-vehicle Sound Field Creation by Simultaneous Equation Method Study of In-vehicle Sound Field Creation by Simultaneous Equation Method Kensaku FUJII Isao WAKABAYASI Tadashi UJINO Shigeki KATO Abstract FUJITSU TEN Limited has developed "TOYOTA remium Sound System"

Διαβάστε περισσότερα

Σχολή Εφαρμοσμένων Μαθηματικών και Φυσικών Επιστημών. Εθνικό Μετσόβιο Πολυτεχνείο. Thales Workshop, 1-3 July 2015

Σχολή Εφαρμοσμένων Μαθηματικών και Φυσικών Επιστημών. Εθνικό Μετσόβιο Πολυτεχνείο. Thales Workshop, 1-3 July 2015 Σχολή Εφαρμοσμένων Μαθηματικών και Φυσικών Επιστημών Εθνικό Μετσόβιο Πολυτεχνείο Thales Workshop, 1-3 July 2015 Integrating Behavioural Algebraic Specifications and Design by Contract Nikolaos Triantafyllou

Διαβάστε περισσότερα

Section 8.3 Trigonometric Equations

Section 8.3 Trigonometric Equations 99 Section 8. Trigonometric Equations Objective 1: Solve Equations Involving One Trigonometric Function. In this section and the next, we will exple how to solving equations involving trigonometric functions.

Διαβάστε περισσότερα

Finite Field Problems: Solutions

Finite Field Problems: Solutions Finite Field Problems: Solutions 1. Let f = x 2 +1 Z 11 [x] and let F = Z 11 [x]/(f), a field. Let Solution: F =11 2 = 121, so F = 121 1 = 120. The possible orders are the divisors of 120. Solution: The

Διαβάστε περισσότερα

Εποχές( 1. Εποχή(του(mainframe((πολλοί( χρήστες,(ένας(υπολογιστής)(( 2. Εποχή(του(PC((ένας(χρήστης,(

Εποχές( 1. Εποχή(του(mainframe((πολλοί( χρήστες,(ένας(υπολογιστής)(( 2. Εποχή(του(PC((ένας(χρήστης,( Κίνητρα( Η(εξάπλωση(των(υπολογιστικών(συσκευών( Πως(έγινε;( Ανάγκη(για(πληροφορία( Προς(τι;( Εφαρμογές(του(διάχυτου(υπολογισμού( Μπορούμε(να(σχεδιάσουμε(&(να(αναπτύξουμε(ώστε(οι( άνθρωποι(να(μπορούν(να(τον(χρησιμοποιούν(

Διαβάστε περισσότερα

TMA4115 Matematikk 3

TMA4115 Matematikk 3 TMA4115 Matematikk 3 Andrew Stacey Norges Teknisk-Naturvitenskapelige Universitet Trondheim Spring 2010 Lecture 12: Mathematics Marvellous Matrices Andrew Stacey Norges Teknisk-Naturvitenskapelige Universitet

Διαβάστε περισσότερα

Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1

Main source: Discrete-time systems and computer control by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1 Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1 A Brief History of Sampling Research 1915 - Edmund Taylor Whittaker (1873-1956) devised a

Διαβάστε περισσότερα

Congruence Classes of Invertible Matrices of Order 3 over F 2

Congruence Classes of Invertible Matrices of Order 3 over F 2 International Journal of Algebra, Vol. 8, 24, no. 5, 239-246 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.2988/ija.24.422 Congruence Classes of Invertible Matrices of Order 3 over F 2 Ligong An and

Διαβάστε περισσότερα

Εισαγωγή. Ρόλοι και τύποι cloud. Ορισμός και σύγκριση.

Εισαγωγή. Ρόλοι και τύποι cloud. Ορισμός και σύγκριση. Εισαγωγή. Το συγκεκριμένο άρθρο προσπαθεί να δώσει ένα σαφή, περιεκτικό και καθολικά αποδεκτό ορισμό του cloud computing. Επιπλέον εστιάζει στις διαφορές και τις ομοιότητες ανάμεσα σε grid και cloud computing.

Διαβάστε περισσότερα

Other Test Constructions: Likelihood Ratio & Bayes Tests

Other Test Constructions: Likelihood Ratio & Bayes Tests Other Test Constructions: Likelihood Ratio & Bayes Tests Side-Note: So far we have seen a few approaches for creating tests such as Neyman-Pearson Lemma ( most powerful tests of H 0 : θ = θ 0 vs H 1 :

Διαβάστε περισσότερα

Thesis presentation. Turo Brunou

Thesis presentation. Turo Brunou Thesis presentation Turo Brunou 11.8.2008 Topic System Dynamics Model of Handset Bundling Business. Goal to examine the effect of handset bundling on mobile diffusion and data usage Structure Intro Industry

Διαβάστε περισσότερα

Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in

Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in : tail in X, head in A nowhere-zero Γ-flow is a Γ-circulation such that

Διαβάστε περισσότερα

Quantifying the Financial Benefits of Chemical Inventory Management Using CISPro

Quantifying the Financial Benefits of Chemical Inventory Management Using CISPro of Chemical Inventory Management Using CISPro by Darryl Braaksma Sr. Business and Financial Consultant, ChemSW, Inc. of Chemical Inventory Management Using CISPro Table of Contents Introduction 3 About

Διαβάστε περισσότερα

Bring Your Own Device (BYOD) Legal Challenges of the new Business Trend MINA ZOULOVITS LAWYER, PARNTER FILOTHEIDIS & PARTNERS LAW FIRM

Bring Your Own Device (BYOD) Legal Challenges of the new Business Trend MINA ZOULOVITS LAWYER, PARNTER FILOTHEIDIS & PARTNERS LAW FIRM Bring Your Own Device (BYOD) Legal Challenges of the new Business Trend MINA ZOULOVITS LAWYER, PARNTER FILOTHEIDIS & PARTNERS LAW FIRM minazoulovits@phrlaw.gr What is BYOD? Information Commissioner's Office

Διαβάστε περισσότερα

Math 6 SL Probability Distributions Practice Test Mark Scheme

Math 6 SL Probability Distributions Practice Test Mark Scheme Math 6 SL Probability Distributions Practice Test Mark Scheme. (a) Note: Award A for vertical line to right of mean, A for shading to right of their vertical line. AA N (b) evidence of recognizing symmetry

Διαβάστε περισσότερα

[1] P Q. Fig. 3.1

[1] P Q. Fig. 3.1 1 (a) Define resistance....... [1] (b) The smallest conductor within a computer processing chip can be represented as a rectangular block that is one atom high, four atoms wide and twenty atoms long. One

Διαβάστε περισσότερα

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων Εξάμηνο 7 ο Oracle SQL Developer An Oracle Database stores and organizes information. Oracle SQL Developer is a tool for accessing and maintaining the data

Διαβάστε περισσότερα

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 6/5/2006

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 6/5/2006 Οδηγίες: Να απαντηθούν όλες οι ερωτήσεις. Ολοι οι αριθμοί που αναφέρονται σε όλα τα ερωτήματα είναι μικρότεροι το 1000 εκτός αν ορίζεται διαφορετικά στη διατύπωση του προβλήματος. Διάρκεια: 3,5 ώρες Καλή

Διαβάστε περισσότερα

Context-aware και mhealth

Context-aware και mhealth ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΣΧΟΛΗ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΜΗΧΑΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΣΥΣΤΗΜΑΤΩΝ ΜΕΤΑΔΟΣΗΣ ΠΛΗΡΟΦΟΡΙΑΣ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΥΛΙΚΩΝ Context-aware και mhealth ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Του Κουβαρά

Διαβάστε περισσότερα

Systems with unlimited supply of work: MCQN with infinite virtual buffers A Push Pull multiclass system

Systems with unlimited supply of work: MCQN with infinite virtual buffers A Push Pull multiclass system Systems with unlimited supply of work: MCQN with infinite virtual buffers A Push Pull multiclass system Gideon Weiss University of Haifa Joint work with students: Anat (Anastasia) Kopzon Yoni Nazarathy

Διαβάστε περισσότερα

SPEEDO AQUABEAT. Specially Designed for Aquatic Athletes and Active People

SPEEDO AQUABEAT. Specially Designed for Aquatic Athletes and Active People SPEEDO AQUABEAT TM Specially Designed for Aquatic Athletes and Active People 1 2 Decrease Volume Increase Volume Reset EarphonesUSBJack Power Off / Rewind Power On / Fast Forward Goggle clip LED Status

Διαβάστε περισσότερα

Πώς μπορεί κανείς να έχει έναν διερμηνέα κατά την επίσκεψή του στον Οικογενειακό του Γιατρό στο Ίσλινγκτον Getting an interpreter when you visit your

Πώς μπορεί κανείς να έχει έναν διερμηνέα κατά την επίσκεψή του στον Οικογενειακό του Γιατρό στο Ίσλινγκτον Getting an interpreter when you visit your Πώς μπορεί κανείς να έχει έναν διερμηνέα κατά την επίσκεψή του στον Οικογενειακό του Γιατρό στο Ίσλινγκτον Getting an interpreter when you visit your GP practice in Islington Σε όλα τα Ιατρεία Οικογενειακού

Διαβάστε περισσότερα

Numerical Analysis FMN011

Numerical Analysis FMN011 Numerical Analysis FMN011 Carmen Arévalo Lund University carmen@maths.lth.se Lecture 12 Periodic data A function g has period P if g(x + P ) = g(x) Model: Trigonometric polynomial of order M T M (x) =

Διαβάστε περισσότερα

Special edition of the Technical Chamber of Greece on Video Conference Services on the Internet, 2000 NUTWBCAM

Special edition of the Technical Chamber of Greece on Video Conference Services on the Internet, 2000 NUTWBCAM NUTWBCAM A.S. DRIGAS Applied Technologies Department NCSR DEMOKRITOS Ag. Paraskevi GREECE dr@imm.demokritos.gr http://imm.demokritos.gr Το NutWBCam είναι ένα RealVideo πρόγραµµα που σας δίνει τη δυνατότητα

Διαβάστε περισσότερα

Calculating the propagation delay of coaxial cable

Calculating the propagation delay of coaxial cable Your source for quality GNSS Networking Solutions and Design Services! Page 1 of 5 Calculating the propagation delay of coaxial cable The delay of a cable or velocity factor is determined by the dielectric

Διαβάστε περισσότερα

Potential Dividers. 46 minutes. 46 marks. Page 1 of 11

Potential Dividers. 46 minutes. 46 marks. Page 1 of 11 Potential Dividers 46 minutes 46 marks Page 1 of 11 Q1. In the circuit shown in the figure below, the battery, of negligible internal resistance, has an emf of 30 V. The pd across the lamp is 6.0 V and

Διαβάστε περισσότερα

Δίκτυα Δακτυλίου. Token Ring - Polling

Δίκτυα Δακτυλίου. Token Ring - Polling Δίκτυα Δακτυλίου Token Ring - Polling Όλοι οι κόμβοι είναι τοποθετημένοι σε ένα δακτύλιο. Εκπέμπει μόνο ο κόμβος ο οποίος έχει τη σκυτάλη (token). The token consists of a number of octets in a specific

Διαβάστε περισσότερα

Μειέηε θαη αλάιπζε επίδνζεο πξσηνθόιισλ δξνκνιόγεζεο ζε θηλεηά ad hoc δίθηπα κε βάζε ελεξγεηαθά θξηηήξηα ΓΗΠΛΩΜΑΣΗΚΖ ΔΡΓΑΗΑ

Μειέηε θαη αλάιπζε επίδνζεο πξσηνθόιισλ δξνκνιόγεζεο ζε θηλεηά ad hoc δίθηπα κε βάζε ελεξγεηαθά θξηηήξηα ΓΗΠΛΩΜΑΣΗΚΖ ΔΡΓΑΗΑ ΔΘΝΗΚΟ ΜΔΣΟΒΗΟ ΠΟΛΤΣΔΥΝΔΗΟ ΥΟΛΖ ΖΛΔΚΣΡΟΛΟΓΩΝ ΜΖΥΑΝΗΚΩΝ ΚΑΗ ΜΖΥΑΝΗΚΩΝ ΤΠΟΛΟΓΗΣΩΝ ΣΟΜΔΑ ΤΣΖΜΑΣΩΝ ΜΔΣΑΓΟΖ ΠΛΖΡΟΦΟΡΗΑ ΚΑΗ ΣΔΥΝΟΛΟΓΗΑ ΤΛΗΚΩΝ Μειέηε θαη αλάιπζε επίδνζεο πξσηνθόιισλ δξνκνιόγεζεο ζε θηλεηά ad

Διαβάστε περισσότερα

Επίπεδο δικτύου IP Forwading κτλ

Επίπεδο δικτύου IP Forwading κτλ Επίπεδο δικτύου IP Forwading κτλ (IP για που το έβαλες) Εργαστήριο Δικτύων Υπολογιστών 2014-2015 Τμήμα Μηχανικών Η/Υ και Πληροφορικής Επίπεδο δικτύου (Network layer) Επίπεδο εφαρμογής (Application layer):

Διαβάστε περισσότερα

forms This gives Remark 1. How to remember the above formulas: Substituting these into the equation we obtain with

forms This gives Remark 1. How to remember the above formulas: Substituting these into the equation we obtain with Week 03: C lassification of S econd- Order L inear Equations In last week s lectures we have illustrated how to obtain the general solutions of first order PDEs using the method of characteristics. We

Διαβάστε περισσότερα

The new Remote Networks Regulatory Framework Το νέο Ρυθμιστικό Πλαίσιο των Απομακρυσμένων Δικτύων

The new Remote Networks Regulatory Framework Το νέο Ρυθμιστικό Πλαίσιο των Απομακρυσμένων Δικτύων The new Remote Networks Regulatory Framework Το νέο Ρυθμιστικό Πλαίσιο των Απομακρυσμένων Δικτύων Irene Iacovides Head, Gas Networks Unit Ειρήνη Ιακωβίδου Προϊσταμένη Τμήματος Δικτύων Φυσικού Αερίου Thessaloniki,

Διαβάστε περισσότερα

Elements of Information Theory

Elements of Information Theory Elements of Information Theory Model of Digital Communications System A Logarithmic Measure for Information Mutual Information Units of Information Self-Information News... Example Information Measure

Διαβάστε περισσότερα

ΔΘΝΗΚΖ ΥΟΛΖ ΓΖΜΟΗΑ ΓΗΟΗΚΖΖ ΚΑ ΔΚΠΑΙΓΔΤΣΙΚΗ ΔΙΡΑ ΣΔΛΗΚΖ ΔΡΓΑΗΑ

ΔΘΝΗΚΖ ΥΟΛΖ ΓΖΜΟΗΑ ΓΗΟΗΚΖΖ ΚΑ ΔΚΠΑΙΓΔΤΣΙΚΗ ΔΙΡΑ ΣΔΛΗΚΖ ΔΡΓΑΗΑ Δ ΔΘΝΗΚΖ ΥΟΛΖ ΓΖΜΟΗΑ ΓΗΟΗΚΖΖ ΚΑ ΔΚΠΑΙΓΔΤΣΙΚΗ ΔΙΡΑ ΣΜΖΜΑ ΓΔΝΗΚΖ ΓΗΟΗΚΖΖ ΣΔΛΗΚΖ ΔΡΓΑΗΑ Θέκα: «Ζ εθαξκνγή εξγαιείσλ Γηνίθεζεο Οιηθήο Πνηφηεηαο ζην Γεκφζην θαη Ηδησηηθφ ηνκέα: Ζ πεξίπησζε ηνπ Κνηλνχ Πιαηζίνπ

Διαβάστε περισσότερα

Το πλαίσιο για την ανάθεση δημοσίων συμβάσεων έργων agile IT

Το πλαίσιο για την ανάθεση δημοσίων συμβάσεων έργων agile IT Το πλαίσιο για την ανάθεση δημοσίων συμβάσεων έργων agile IT UK Government ICT Strategy 2011 The Government intends to use agile in information and communications technology (ICT) procurement and delivery

Διαβάστε περισσότερα

Every set of first-order formulas is equivalent to an independent set

Every set of first-order formulas is equivalent to an independent set Every set of first-order formulas is equivalent to an independent set May 6, 2008 Abstract A set of first-order formulas, whatever the cardinality of the set of symbols, is equivalent to an independent

Διαβάστε περισσότερα

ΤΕΧΝΟΛΟΓΙΚΟ ΕΚΠΑΙΔΕΥΤΙΚΟ ΙΔΡΥΜΑ ΚΡΗΤΗΣ. Σχολή Τεχνολογικών Εφαρμογών Τμήμα Εφαρμοσμένης Πληροφορικής & Πολυμέσων

ΤΕΧΝΟΛΟΓΙΚΟ ΕΚΠΑΙΔΕΥΤΙΚΟ ΙΔΡΥΜΑ ΚΡΗΤΗΣ. Σχολή Τεχνολογικών Εφαρμογών Τμήμα Εφαρμοσμένης Πληροφορικής & Πολυμέσων ΤΕΧΝΟΛΟΓΙΚΟ ΕΚΠΑΙΔΕΥΤΙΚΟ ΙΔΡΥΜΑ ΚΡΗΤΗΣ Σχολή Τεχνολογικών Εφαρμογών Τμήμα Εφαρμοσμένης Πληροφορικής & Πολυμέσων Πτυχιακή Εργασία Εξερεύνηση / Ανασκαφή σε μεγάλης κλίμακας κοινοτικά δίκτυα του διαδικτύου:

Διαβάστε περισσότερα

ΑΝΑΠΤΥΞΗ ΣΕΝΑΡΙΩΝ ΒΕΛΤΙΣΤΟΠΟΙΗΣΗΣ ΤΗΣ ΔΙΑΧΕΙΡΙΣΗΣ ΚΑΙ ΤΗΣ ΥΔΡΟΗΛΕΚΤΡΙΚΗΣ ΠΑΡΑΓΩΓΗΣ ΤΟΥ ΥΔΡΟΣΥΣΤΗΜΑΤΟΣ ΤΟΥ ΠΟΤΑΜΟΥ ΝΕΣΤΟΥ

ΑΝΑΠΤΥΞΗ ΣΕΝΑΡΙΩΝ ΒΕΛΤΙΣΤΟΠΟΙΗΣΗΣ ΤΗΣ ΔΙΑΧΕΙΡΙΣΗΣ ΚΑΙ ΤΗΣ ΥΔΡΟΗΛΕΚΤΡΙΚΗΣ ΠΑΡΑΓΩΓΗΣ ΤΟΥ ΥΔΡΟΣΥΣΤΗΜΑΤΟΣ ΤΟΥ ΠΟΤΑΜΟΥ ΝΕΣΤΟΥ ΑΝΑΠΤΥΞΗ ΣΕΝΑΡΙΩΝ ΒΕΛΤΙΣΤΟΠΟΙΗΣΗΣ ΤΗΣ ΔΙΑΧΕΙΡΙΣΗΣ ΚΑΙ ΤΗΣ ΥΔΡΟΗΛΕΚΤΡΙΚΗΣ ΠΑΡΑΓΩΓΗΣ ΤΟΥ ΥΔΡΟΣΥΣΤΗΜΑΤΟΣ ΤΟΥ ΠΟΤΑΜΟΥ ΝΕΣΤΟΥ ΑΝΑΠΤΥΞΗ ΣΕΝΑΡΙΩΝ ΒΕΛΤΙΣΤΟΠΟΙΗΣΗΣ ΤΗΣ ΔΙΑΧΕΙΡΙΣΗΣ ΚΑΙ ΤΗΣ ΥΔΡΟΗΛΕΚΤΡΙΚΗΣ ΠΑΡΑΓΩΓΗΣ

Διαβάστε περισσότερα

Στο εστιατόριο «ToDokimasesPrinToBgaleisStonKosmo?» έξω από τους δακτυλίους του Κρόνου, οι παραγγελίες γίνονται ηλεκτρονικά.

Στο εστιατόριο «ToDokimasesPrinToBgaleisStonKosmo?» έξω από τους δακτυλίους του Κρόνου, οι παραγγελίες γίνονται ηλεκτρονικά. Διαστημικό εστιατόριο του (Μ)ΑστροΈκτορα Στο εστιατόριο «ToDokimasesPrinToBgaleisStonKosmo?» έξω από τους δακτυλίους του Κρόνου, οι παραγγελίες γίνονται ηλεκτρονικά. Μόλις μια παρέα πελατών κάτσει σε ένα

Διαβάστε περισσότερα

Bounding Nonsplitting Enumeration Degrees

Bounding Nonsplitting Enumeration Degrees Bounding Nonsplitting Enumeration Degrees Thomas F. Kent Andrea Sorbi Università degli Studi di Siena Italia July 18, 2007 Goal: Introduce a form of Σ 0 2-permitting for the enumeration degrees. Till now,

Διαβάστε περισσότερα

3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β

3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β 3.4 SUM AND DIFFERENCE FORMULAS Page Theorem cos(αβ cos α cos β -sin α cos(α-β cos α cos β sin α NOTE: cos(αβ cos α cos β cos(α-β cos α -cos β Proof of cos(α-β cos α cos β sin α Let s use a unit circle

Διαβάστε περισσότερα