Available Bandwidth-Based Association in IEEE Wireless LANs

Size: px
Start display at page:

Download "Available Bandwidth-Based Association in IEEE Wireless LANs"

Transcription

1 Available Bandwidth-Baed Aociation in IEEE 82. Wirele LAN Heeyoung Lee, Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee 2 School of Electrical Engineering & INMC, Seoul National Univerity, Seoul, 5-744, Korea 2 Multimedia Communication & Networking Lab, Hewlett-Packard Laboratorie, Palo Alto, CA 9434 {hylee,kim,ohlee}@mwnl.nu.ac.kr, choi@nu.ac.kr, jlee@hp.com ABSTRACT The performance of an IEEE 82. tation heavily depend on the election of an AP (Acce Point) that the tation i aociated with to acce the Internet. The conventional approach to the AP election i baed on the received ignal trength called RSSI (Received Signal Strength Indication) from AP within the tranmiion range. Thi approach however, might yield unbalanced traffic load among AP a the tation chooe an AP only baed on the ignal trength, intead of conidering the AP load and the level of contention on medium acce. Accordingly, the tation that i aociated with the highet-rssi AP might uffer from poor network performance. In thi paper, we propoe a new aociation metric, EVA (Etimated available bandwidth) with which a tation can find the AP that provide the maximum achievable throughput among canned AP. EVA i deigned to etimate the available bandwidth on a channel with repect to a tation that i to join a WLAN (Wirele Local Area Network). A tation equipped with EVA oberve a channel tate in a per-lot bai, and yet doe not requet any external information from nearby AP or neighbor tation. Our etimation mechanim i nonintruive, fully ditributed, and independent of the infratructure. Through imulation tudy, we evaluate the accuracy of the etimation and how that EVA-baed aociation yield enhanced throughput performance compared with the legacy cheme. Categorie and Subject Decriptor C.2 [Computer Sytem Organization]: Computer-Communication Network ; C.2. [Computer-Communication Network]: Network Architecture and Deign Wirele communication Thi work wa upported in part by Seoul R&BD Program (544). Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. MSWiM 8, October 27 3, 28, Vancouver, BC, Canada. Copyright 28 ACM /8/...$5.. General Term Algorithm, Meaurement Keyword IEEE 82. WLAN, Aociation, Available Bandwidth. INTRODUCTION Today, increaing number of uer acce the Internet via IEEE 82. WLAN (Wirele Local Area Network). We can eaily find AP (Acce Point) that are in the vicinity at public/municipal place. The election of the AP that a WLAN tation connect with mut be done prudently a it determine the performance of the tation. In the nomenclature of IEEE 82. [], uch AP election procedure i referred to a aociation. The mot widely ued metric for the aociation of WLAN tation i the received ignal power from an AP, known a RSSI (Received Signal Strength Indication). After canning the channel, a tation chooe the AP from which it receive frame with the highet RSSI. A revealed in the literature, however, uch an RSSI-baed aociation doe not necearily provide the bet throughput performance [2 4]. In addition, the RSSI-baed aociation might reult in unbalanced throughput among BSS (Baic Service Set). Therefore, a tation aociated with the highet-rssi AP might uffer from low throughput that reult from the overloaded bandwidth utilization in that BSS. We propoe a new aociation metric called EVA (Etimated available bandwidth) that i deigned to reflect the available bandwidth in a BSS, i.e., the maximum achievable throughput when aociated with the target AP. In order to accurately etimate the available bandwidth, EVA etimator conider the contention level on a BSS by calculating colliion probability and channel idle ratio baed on channel tate aement. After earching all acceible channel and, in turn, available AP on canned channel, a tation with the EVA etimator chooe the AP that provide the larget EVA. In order to make EVA a practical olution, we et the following deign goal. Firt, available bandwidth etimation hould be performed in a non-intruive manner a reource in WLAN i carce. Second, to avoid the modification of IEEE 82. protocol, EVA doe not require any extra frame exchange between tation and AP. Moreover, we do not For clarity, the term EVA will be ued to repreent the value of available bandwidth calculated through the propoed EVA etimator.

2 employ a centralized olution to control a WLAN or etimate available bandwidth. Third, our propoed approach hould provide highly accurate etimation in a timely fahion. Through imulation tudy, we evaluate the accuracy of the propoed EVA etimator on colliion probability and available bandwidth in a BSS. We alo evaluate the effectivene of EVA-baed aociation in term of individual and aggregate throughput performance. The ret of the paper i organized a follow. Section 2 review the related work, and the legacy 82. aociation proce i introduced in Section 3. The formulation of EVA i preented in Section 4. Section 5 decribe the algorithmic detail, and Section 6 how the accuracy of EVA etimator and the correponding throughput performance. Finally, the paper conclude with Section 7. IEEE 82. aociation procea Aociation Authentication Scanning tation probe requet (broadcat) probe repone probe requet (broadcat) authentication authentication aociation requet aociation repone AP elected AP 2. RELATED WORK RSSI i commonly ued a an aociation metric in WLAN. Thi approach i however, well known to have poor network performance when load ditribution i highly unbalanced [2 6]. There have been propoal to olve thi inefficient network reource uage. One of thee attempt i to receive information from AP. In [2, 4 6], by collecting information uch a the number of aociated tation or it tranmiion rate, tation can elect an AP with better link quality that i meaured by different method. Such an approach hould be accompanied with a protocol modification in the AP ide, and i not likely to work with already-deployed WLAN device. There are a few centralized olution [3,7]. A repreentative, uually the AP, control the whole aociation proce. Particularly, the AP decide whether to grant the aociation of tation. Thi approach alo need to modify AP behavior, and bring additional overhead to let the AP be aware of the detail of the entire network. In EVA, on the other hand, the channel tate i meaured paively. The EVA etimator operate in a ditributed manner (working only at the tation ide) and doe not require any modification of a WLAN infratructure. Furthermore, available bandwidth i predicted when the tation earche AP in the 82. canning proce and hence, doe not incur additional probing overhead. A imilar approach to our i preented in [8] and it algorithm work a follow. A tation oberve a kewed time period of beacon frame reception to etimate how much bandwidth i available. Although it i a purely non-intruive operation, it incur large delay for channel obervation and quality etimation a multiple beacon frame mut be received typically, beacon are tranmitted every milliecond. The etimation of available bandwidth on an 82. link i affected by many factor uch a retranmiion due to colliion or weak ignal, correponding increaed backoff interval, buy channel detection due to different ytem device, etc. VMAC [9] virtually run MAC proce at each tation to etimate colliion probability and available bandwidth. A it empirically oberve the wirele channel, VMAC can etimate the bandwidth that i fluctuating in a time varying manner. The convergence of VMAC etimation however, take relatively a long time a one etimate ample i collected after finihing every backoff procedure, i.e., taking at leat CW min 2 ttimelot duration to get a ample on average, where CW min i the minimum contention window ize and Figure : Frame exchange equence in the 82. infratructure mode. ttimelot i the interval of a ingle backoff timelot. Meanwhile, the EVA etimator oberve the wirele channel in a per-lot bai, thu enuring to have more number of ample and yielding fater convergence time than VMAC. There could be a tradeoff between convergence time and accuracy. We how that our approach get more ample and achieve fater etimation convergence without accuracy compromie in Appendix A. 3. ASSOCIATION IN 82. WLANS IEEE 82. aociation proce i divided into three tep: canning, authentication, and aociation, a illutrated in Fig.. The objective of canning i to elect an appropriate AP to be aociated with, in all available channel. There are two type of canning: active and paive. A the name imply, the tation find AP by litening to periodic beacon frame in the paive mode. The tation uing active canning broadcat a probe requet frame on each channel and may receive multiple probe repone frame from different AP working on the ame channel. Figure how the frame exchange equence in the active canning. Typically for mot exiting WLAN device, active canning i ued by default for aociation. The criterion that pecifie which channel hould be canned i addreed in the tandard []. MAC layer management entity called MLME (MAC ub-layer Management Entity), initiate canning channel upon receiving the correponding requet with a lit of channel to be canned, ChannelLit, from SME (Station Management Entity). Practically, the functional detail of SME can be implemented a a form of application oftware that control the aociation of WLAN client, including the ChannelLit. Baed on the belief that the highet-ignal-trength AP would provide the bet performance, mot commercial device rely on the conventional aociation metric, RSSI. Although the 82. DCF (Ditributed Coordination Function) i deigned to offer long-term equal medium acce opportunitie to all contending tation, RSSI-baed AP election might not provide the deired performance of the tation. The AP election hould conider load balancing and fairne among tation a well a throughput. After canning, the tation attempt to get authenticated

3 Buy medium DIFS Backoff O c PHY RTS SIFS SIFS DATA SIFS O a PHY CTS PHY U PHY ACK Figure 2: IEEE 82. DCF channel acce. and aociated with the elected AP by exchanging authentication and aociation requet/repone frame a depicted in Fig.. 4. METRIC FORMULATION We firt formulate the aociation metric EVA, tarting with it definition. We then decribe how to decompoe the metric formulation into multiple component that can be eparately calculated and etimated. 4. EVA Definition The deign of EVA aim to etimate available bandwidth on an operating channel, being aware of the contention intenity around the tation. We define available bandwidth a the maximum achievable bandwidth on the target 82. link. We define the concept of EVA along with the frame exchange equence of the 82. DCF. A illutrated in Fig. 2, after backing off, a tation accee the wirele medium by exchanging RTS (Requet-To-Send) and CTS (Clear-To- Send) frame. 2 A data frame tranmiion then follow and the frame exchange complete by the ACK (Acknowledgement) frame tranmiion. Keeping the frame exchange in mind, we define EVA a follow. Definition. We conider two equence of random variable, T i and n i: the former i the time duration pent by the tation in conideration to tranmit a data frame (including both contention delay and frame tranmiion time a illutrated in Fig. 2) at the tation i th tranmiion attempt; and the latter denote the tranmiion reult at the i th attempt, i.e., for ucce and for failure. The ubcript i indexe a et of M(t) tranmiion attempt of the tation by the time t. We define EVA a the frame ize (F) divided by the fraction of thoe random equence: F EVA(t) P M(t) i= Ti/ P, () M(t) i= ni where the denominator repreent the time average of the time pent by the tation in order to uccefully tranmit a data frame over the total oberved time interval, t. EVA(t) formulated by a function of random equence i not ueful ince it accuracy varie over the ize of M(t). Moreover, EVA(t) doe not quickly react to wirele channel variation and contention intenity. The following propoition tate that EVA(t) converge to the non-random (probabilitic) mean. 2 In thi paper, we conider RTS/CTS-enabled DCF MAC in EVA formulation. However, the uage of EVA a an aociation metric i not limited to the RTS/CTS uage, thu being able to change the formulation to be uitable for the acce without RTS/CTS exchange. Notation O phy CW min CW max tframe tdifs tsifs tbo tbuy ttimelot F τ Table : Notation. Definition tranmiion duration for PHY header and preamble the minimum contention window the maximum contention window tranmiion duration for that Frame type time interval of DIFS (DCF Interframe Space) time interval of SIFS (Short Interframe Space) backoff interval time interval holding medium acce due to buy channel unit time interval of a ingle timelot frame ize propagation delay Propoition. Eq. () and (2) are aymptotically equivalent a t : F EVA = E[T ]/E[n], (2) where E[T ] i the expected frame tranmiion time and E[n] i the expected number of uccefully tranmitted data frame at a unit tranmiion attempt. Proof. The random ample (tatitical) mean of the M(t) random variable with repect to T i and n i are defined by: T i = P M(t) i= Ti, n i = M(t) P M(t) i= ni. M(t) By the Law of Large Number, T i E[T ] and n i E[n] a t. In conequence, it follow that EVA = F E[T ]/E[n]. 4.2 Frame Exchange Sequence Decompoition From Propoition, EVA can be obtained by calculating E[T ] and E[n]. In order to obtain E[T ], we decompoe the unit frame exchange equence, a hown in Fig. 2, into three temporal component: O c : channel contention overhead, O a : channel acce overhead, and U : unit tranmiion time required for a data frame tranmiion. Therefore, we can revie Eq. (2) a follow: EVA = F E[n] O c + O a + U, (3) and the problem change to deriving each decompoed component: E[n], O c, O a, and U. Table lit notation of related parameter ued in the following derivation E[n], the expected number of uccefully tranmitted data frame Note that E[n] i equal to P, the probability that a data frame i uccefully tranmitted in a unit frame exchange. P can be preented by: E[n] = P = p rt p data, (4)

4 where p rt and p data denote the ucce probabilitie of RTS/CTS and data/ack exchange, repectively. Note that if we aume no hidden tation that i not carrier-ened by the tranmitter, but interfere frame reception at the deignated receiver, a frame colliion only happen with the imultaneou tranmiion of RTS frame. Accordingly, the colliion probability with repect to the tranmitting tation that etimate EVA can be denoted by p rt c and p data in Eq. (4) are preented a follow: j p rt p data = ` p rt e = ` p data e ` p ct e ` p rt c, ` p ack, e. Therefore, p rt where p Frame e i FER (Frame Error Rate) of the pecific Frame type, uch a RTS, CTS, data, and ACK frame. A the calculation of Eq. (4) and (5) i baed on the knowledge of FER that depend on F and the employed modulation and coding cheme, i.e., tranmiion rate (r), an FER etimation method hould precede. If we have a predetermined FER v. SNR (Signal-to-Noie Ratio) table in advance, the problem become imple. Such a table can be obtained either from meaurement, e.g., [], or from the vendor dataheet, e.g., []. Upon the reception of frame from an AP, the tation meaure the average SNR by meauring both RSSI and the oberved background noie level, and then FER i obtained from the table O c, the channel contention overhead From Fig. 2, O c can be divided into two time interval, tbo and tbuy, where tdifs i included into tbuy, i.e., (5) O c = E[tBO] + E[tBuy]. (6) Let σ denote the channel idle ratio during an O c period. σ i then preented by: σ = E[tBO] E[tBO] + E[tBuy]. (7) By inerting Eq. (6) into Eq. (7), we have O c = E[tBO]/σ and hence, the problem of O c calculation become finding σ and E[tBO]. We will preent a way to etimate σ in the following ection. In the cae of a tranmiion failure, the backoff procedure update CW (Contention Window) to [2 (CW + ) ]. Once CW reache CW max, it remain at thi value until finihing the tranmiion uccefully or dropping the frame due to the retry limit, reetting to CW min. The backoff interval of the i th tranmiion attempt can be denoted by tbo i = rand[,cw i], where CW i i the ize of contention window at the i th tranmiion and i written by: i CW i = min h2 i (CW min + ),CW max. (8) rand[x, y] i the operator that randomly draw an integer number from a uniform ditribution over the interval [x, y]. Accordingly, we can ay that tbo i CW i/2 on average. The average backoff interval per unit tranmiion, E[tBO] i derived a follow: E[tBO] = γx i= (i) CWi 2 ttimelot, (9) where γ i the retry limit and (i) i the probability that a data frame i uccefully tranmitted after the i th tranmiion attempt, being preented by: (i) = ( P ) i P. () for p c rt for buy idle 2. 3 DIFS Oberved timelot Figure 3: An illutrative example of channel obervation for p rt c, σ etimation. Accordingly, having the etimate of p rt c play a key role in knowing E[tBO], which i imilar to the cae of E[n] O a and U A illutrated in Fig. 2, O a and U can be written a: j Oa = 2O phy + trts + tsifs + tcts + 2τ, U = 2O phy + tdata + 2tSIFS + tack + 2τ. () DIFS 5. ESTIMATION ALGORITHM We preent how to etimate colliion probability, p rt c and channel idle ratio, σ with which we can calculate EVA a decribed in Section 4. We firt preent an illutrative example and then propoe the EVA etimator. 5. An Example Figure 3 depict that a tation i oberving the wirele channel to etimate p rt c and σ. The bold horizontal line repreent the channel tate: upper and lower level mean buy and idle tate of the channel, repectively. Small rectangle are timelot oberved by the tation. Upper timelot enumerated up to 9 i ued for p rt c etimation. Suppoe that the channel tate change up and down due to the frame tranmiion from other tation, and the oberving tation, ay A, aee that the channel become buy three time (at the 2 nd, 5 th, and 8 th timelot). Note that a colliion would happen, if A tried to tranmit a frame at thee timelot from which the channel become buy. Likewie, A can etimate it colliion probability by counting uch colliion-induced timelot out of all elaped timelot. In thi example, the etimated p rt c when the 9 th timelot expire become. 3 Similarly, we can alo etimate σ uing lower indexed timelot a follow. A count all idle timelot out of the total oberved lot. In thi example, the total number of idle timelot i 5 out of the total elaped lot, i.e., 5. A a reult, σ become 6 when the latet timelot expire. Note 5 that the etimation of p rt c and σ can be done concurrently. 5.2 EVA Etimator In order to etimate p rt c and σ, we employ the ARMA (Autoregreive Moving Average) etimator [2]. The typical ARMA etimator ha the following form: ŷ i = αŷ i + α K K X j= DIFS x i j, (2) where ŷ i i the target etimate and x i j, with j =,, K are the lat K timelot ample. K and α are deign parameter that determine the accuracy of the etimator.

5 K play a role to mooth meaurement that are fed to the weighted average; however, a revealed in [3], the election of K value ha little impact on the performance of ARMA etimator, and i ued for K in our etting. On the other hand, the filter memory (or autoregreive weighting factor) α work a a tuner controlling the tradeoff between the etimation accuracy and the repone time. In Section 6, we tudy the impact of α on the performance tradeoff and chooe a uitable α baed on which tation can elect the bet AP. At each timelot, a tation aee the channel tate whether it become buy or idle. For p rt c etimation, x i, which i a ample of colliion event, i et to if the channel tate change from idle to buy in the i th timelot, while x i i for every idle timelot. When etimating σ, x i mean a ample of an idle timelot. Therefore, for every idle timelot expiration, x i become ; otherwie, x i i. Note that for both p rt c and σ etimation, timelot during which the target tation tranmit it frame are not conidered, ince the tation only oberve per-timelot channel occupancy taken by other tation, not itelf. A tation, ay A, which trie to find the bet AP to achieve the highet throughput uing the EVA metric, run the following algorithm: Algorithm. EVA etimator. For all ttimelot, A aee the channel tate and determine an etimation ample, x i. 2. A run Eq. (2) with every valid ample, x i, and update the new etimate, ŷ i, i.e., ˆp rt c or ˆσ. 3. Going through Eq. (5), (4), (), and (9) with the etimated ˆp rt c, A obtain E[tBO]. 4. A inert E[tBO] and the etimated ˆσ into Eq. (7) and (6) to get E[tBuy] and O c. 5. EVA i etimated uing Eq. (3). 5.3 Implementation Iue Finding a practical etimation interval for accurate available bandwidth etimation i important. Too hort of an etimation interval would reult in an inaccurate EVA etimation. A longer etimation interval would yield an enhanced accuracy on the other hand, but might make the etimation uele for the aociation proce becaue of the long, unaffordable etimation interval. According to [4, 5], the typical time pent on canning the 82.b channel varie from 3 to 5 milliecond depending on WLAN client device. Since three to four different channel are ued in the 82.b band, i.e., 2.4 GHz, we can argue that approximately milliecond i ued to can a ingle channel. A addreed previouly, the only phyically required operation for a tation to etimate an EVA value i to oberve the change of wirele medium from buy to idle, or vice vera. Moreover, the channel obervation might not incur much overhead and hould be done along with the normal 82. operation. We will tudy how accurately the EVA etimator can calculate the available bandwidth within a pragmatic time interval, i.e., milliecond per each 82.b channel in Section 6. We will alo invetigate the appropriate α value in order to achieve an accurate EVA etimation within that time interval. 6. PERFORMANCE EVALUATION We preent our imulation tudy to evaluate the effectivene of the propoed EVA aociation metric. We firt decribe the imulation environment and identify the performance tradeoff between accuracy and reponivene of the EVA etimator. Finally, we evaluate the throughput performance baed on the propoed aociation metric, EVA. 6. Simulation Setup We enhance the 82. DCF module in the n-2 imulator [6] to upport the propoed EVA-baed aociation. The 82.b i conidered a the PHY module [7], and the highet tranmiion rate, i.e., Mbp, i employed by all tation. Each tation tranmit 28-byte frame with 2 dbm power and all tation are tatic. We ue the empirical BER (Bit Error Rate) v. SNR curve provided by Interil 3 to etimate the FER (Frame Error Rate) []. The background noie level i et to 96 dbm. We ue a log-ditance path-lo model with the path-lo exponent of four to imulate the indoor office environment [8]. A addreed in Section 5, we et the number K of ample for moving average proce to, and vary α, the weighting factor for autoregreive proce from.99 to.9999 to tudy it impact on the etimation accuracy and reponivene tradeoff in the ARMA etimator. 6.2 Accuracy and Reponivene In order to evaluate the accuracy of the EVA etimator, we compare the etimation reult with thoe of imulation and analytic model. We run the etimator by varying the filter memory of α (.99 α.9999), while oberving the performance tradeoff. The compared imulation reult i obtained baed on the etting that a tation in conideration i aociated and communicate with an AP in an infinite backlogged condition. For the analytical reult, we employ the Markov chain-baed analyi model propoed in [9]. We conider two different cenario: () when a tation that etimate EVA trie to aociate with an AP; (2) and when a tation trie to change it aociation to another AP to achieve a better throughput performance, i.e., the tation i already aociated with an AP. The correponding reult are hown in Fig. 4 and 5, repectively. In both cenario, the number of tation i et to including the tation of our interet, and each tation i aociated with a ingle AP. Note that only the firt cenario repreent the cae for the initial aociation attempt of a tation. A hown in both Fig. 4 and 5, the target tation oberve the channel for ten econd and etimate p rt c and EVA. Both cae how the imilar trend in the convergence and fluctuation tradeoff when α varie. Larger α how le etimation fluctuation, but take longer to converge. 3 The BER curve in [] were meaured in an AWGN (Additive White Gauian Noie) environment. Table 2: RMS error of the etimated value. Not aociated Aociated α p rt c EVA p rt c EVA

6 Colliion probability Etimation: α =.99 Etimation: α =.999 Etimation: α =.9999 Simulation Analyi Available bandwidth (Mbp) Etimation: α =.99 Etimation: α =.999 Etimation: α =.9999 Simulation Analyi Simulation time (ec) (a) Colliion probability (p rt c ) Simulation time (ec) (b) Etimated available bandwidth (EVA). Figure 4: Comparion of etimated reult with the imulated and analyzed when not aociated. Colliion probability Etimation: α =.99 Etimation: α =.999 Etimation: α =.9999 Simulation Analyi Available bandwidth (Mbp) Etimation: α =.99 Etimation: α =.999 Etimation: α =.9999 Simulation Analyi Simulation time (ec) (a) Colliion probability (p rt c ) Simulation time (ec) (b) Etimated available bandwidth (EVA). Figure 5: Comparion of etimated reult with the imulated and analyzed when aociated. Per-tation throughput (Mbp) EVA RSSI Number of tation Standard deviation (Mbp) Number of tation EVA RSSI CDF EVA RSSI Throughput (Mbp) (a) Average per-tation throughput. (b) Standard deviation of achieved throughput among contending tation. (c) Cumulative fraction of achieved throughput of each contending tation when the number of tation i. Figure 6: Performance comparion of EVA and RSSI-baed aociation procee.

7 AP AP 2 3m 2m tation 2m Figure 7: The topology of imulation. m To further invetigate the effect of α, we calculate RMS (Root-Mean-Square) error of all etimate. We collect random ample of p rt c and EVA at milliecond, and derive enemble average to find which α value yield the mallet etimation error for both etimate. Table 2 how the RMS error calculated for all α value. For all α value and whether aociated or not, we oberve that α =.999 how the minimum RMS error. Therefore, we fix the value of α and the etimation interval to.999 and milliecond, repectively, for the following imulation environment. 6.3 AP Selection by EVA We now evaluate the effectivene of the propoed EVA aociation metric by comparing it with the legacy cheme, RSSI-baed aociation. The conidered topology i hown in Fig. 7, where two AP and multiple tation are deployed. Two AP (denoted a AP and AP 2) are eparated by 3 m from each other, and tation are randomly located in the area of 2 2 m 2, which i hifted toward AP 2 a hown in Fig. 7. In thi topology, we expect that more tation aociate with AP 2 than AP if the RSSI metric i employed. Meanwhile, tation working with EVA might aociate with AP in pite of lower RSSI value, ince each tation etimate it maximum achievable throughput and elect the highet-throughput AP. Different frequency channel are aigned to each AP thu having no inter-channel interference. The carrier ene range i et to 8 m, o that all tation and AP can ee frame tranmiion from other in thi topology. The offered load of each tation i et to.4 Mbp during imulation run. Figure 6(a) how the per-tation throughput of both EVA and RSSI-baed aociation. All reult are averaged over run. We oberve that the propoed EVA-baed aociation how about 6.2 % enhanced throughput gain over the legacy aociation. We alo how the tandard deviation of the achieved throughput of all contending tation in Fig. 6(b). While EVA-baed aociation preent maller tandard deviation (i.e., at mot.7 Mbp when the number of tation i 9), the legacy cheme how larger tandard deviation for all the cae, which mean that the achieved throughput among tation i often highly unbalanced. In the cae of contending tation, we preent the cumulative fraction of the achieved throughput of each contending tation in Fig. 6(c). EVA-baed aociation (the olid line) how teeper lope of curve, meaning that mot tation achieve throughput evenly. We alo count the number of aociated tation with different AP. With RSSI, 3.25 tation (out of ) aociate with AP on average, while the number of tation that are aociated with AP 2 i On the other hand, tation with the EVA etimator are more evenly ditributed between two AP: 4.25 tation with AP and 5.75 with AP 2. A the reult indicate, we can achieve better balanced throughput hare a well a higher individual/aggregate throughput performance with the propoed EVA-baed aociation. 7. CONCLUSION We preented a new aociation metric called EVA (Etimated available bandwidth) for IEEE 82. tation. EVA i deigned to enhance the throughput performance of an individual tation by etimating the available bandwidth provided by multiple AP and electing the bet one to aociate with. We firt howed the accuracy of the propoed etimation method by comparing our etimation of colliion probability and available bandwidth with the imulation and analytic model. We compared EVA-baed aociation with the legacy cheme in term of individual and aggregate throughput performance. We howed that EVA-baed aociation increae the per-tation throughput, balance the load of the AP, and conequently, enhance the aggregate network throughput. Moreover, the EVA etimator doe not require any extra probing overhead. A future work, we plan to extend the formulation of EVA to incorporate the impact of hidden tation into the available bandwidth etimation. Moreover, we plan to apply the uage of EVA to the handoff deciion criterion o a to enhance the throughput performance of mobile tation. 8. REFERENCES [] IEEE , Part : Wirele LAN Medium Acce Control (MAC) and Phyical Layer (PHY) pecification, IEEE Std., Aug [2] A. Balachandran, P. Bahl, and G. M. Voelker, Hot-Spot Congetion Relief in Public-area Wirele Network, in Proc. IEEE MCSA 2, Callicoon, NY, USA, June 22, pp [3] Y. Bejerano, S.-J. Han, and L. Li, Fairne and Load Balancing in Wirele LAN Uing Aociation Control, in Proc. ACM MobiCom 4, Philadelphia, PA, USA, Sept. 24, pp [4] T. Koraki, O. Ercetin, S. Krihnamurthy, L. Taiula, and S. Tripathi, Link Quality baed Aociation Mechanim in IEEE 82.h Compliant Wirele LAN, in Proc. RAWNET 6, Boton, MA, Apr. 26, pp [5] O. Ekici and A. Yongacoglu, A Novel Aociation Algorithm for Congetion Relief in IEEE 82. WLAN, in Proc. ACM IWCMC 6, Vancouver, Britih Columbia, Canada, July 26, pp [6] G. Athanaiou, T. Koraki, O. Ercetin, and L. Taiula, Dynamic Cro-Layer Aociation in 82.-baed Meh Network, in Proc. IEEE INFOCOM 7, Anchorage, AK, USA, May 27, pp

8 [7] A. P. Jardoh, K. Mittal, K. N. Ramachandran, E. M. Belding, and K. C. Almeroth, IQU: Practical Queue-Baed Uer Aociation Management for WLAN, in Proc. ACM MobiCom 6, Lo Angele, California, USA, 26, pp [8] S. Vaudevan, K. Papagiannaki, C. Diot, J. Kuroe, and D. Towley, Facilitating Acce Point Selection in IEEE 82. Wirele Network, in Proc. ACM IMC 5, Berkeley, CA, USA, Oct. 25, pp [9] A. Vere, A. T. Campbell, M. Barry, and L.-H. Sun, Supporting Service Differentiation in Wirele Packet Network Uing Ditributed Control, IEEE J. Select. Area Commun., vol. 9, no., pp , Oct. 22. [] L. Verma, S. Kim, S. Choi, and S.-J. Lee, Reliable, Low Overhead Link Quality Etimation for 82. Wirele Meh Network, in Proc. IEEE WiMeh 8, San Francico, CA, USA, June 28. [] Interil, HFA386B; Direct Sequence Spread Spectrum Baeband Proceor. Jan. 2. [2] W. A. Gardner, Introduction to Random Procee: with application to ignal and ytem, 2nd ed. McGraw-Hill, 99. [3] G. Bianchi and I. Tinnirello, Kalman Filter Etimation of the Number of Competing Terminal in an IEEE 82. Network, in Proc. IEEE INFOCOM 3, San Francico, CA, USA, Mar. 23, pp [4] S. Kim, S. Choi, S.-K. Park, J. Lee, and S. Kim, An Empirical Meaurement-baed Analyi of Public WLAN Handoff Operation, in Proc. WILLOPAN 6, New Delhi, India, Jan. 26. [5] A. Mihra, M. Shin, and W. Arbaugh, An Empirical Analyi of the IEEE 82. MAC Layer Handoff Proce, ACM SIGCOMM Computer Communication Review (CCR), vol. 33, pp. 93 2, Apr. 23. [6] The Network Simulator n-2. [7] IEEE 82.b, Part : Wirele LAN Medium Acce Control (MAC) and Phyical Layer (PHY) pecification: Higher-peed Phyical Layer Extenion in the 2.4 GHz Band, IEEE Std., Sept [8] T. S. Rappaport, Wirele Communication: Principle and Practice, 2nd ed. Prentice-Hall, 22. [9] G. Bianchi, Performance Analyi of the IEEE 82. Ditributed Coordination Function, IEEE J. Select. Area Commun., vol. 8, no. 3, pp , Mar. 2. APPENDIX A. COMPARISON OF CONVERGENCE TIME OF EVA AND VMAC ALGORITHMS Propoition 2. Every timelot conidered a a valid one for the etimation of EVA ha the ame probability to be ampled in the VMAC algorithm. Proof. Let p n be the probability that the n th timelot i choen by a VMAC tation to get an etimation ample, l be the total number of contention window tage, i.e., l = log 2 ( CWmax+ CW min ) +, and qn,i be the probability that the + contention window ize i CW i when deriving p n. The probability that an etimation ample i choen at the (n + ) th timelot i written by: p n+ = lx i= CW X i q n+,i j= Prob[BC = j CW i] p n j, (3) where BC i a backoff counter elected by the VMAC algorithm out of [,CW i]. Suppoe that each VMAC tation join a WLAN in a random manner. At the very firt ampling attempt, the probability that a VMAC tation obtain an etimation ample in an arbitrary timelot hould be the ame with thoe for all other timelot to be choen. In other word, p n j in Eq. (3) become identical for j. Conequently, Eq. (3) reduce to: p n+ = p n, which mean that any timelot ued in the EVA etimator can be an etimation ample with the ame probability in a VMAC tation. Baed on Propoition 2, both EVA and VMAC algorithm hould have the imilar etimation accuracy. However, the convergence time of EVA hould be horter than that of VMAC a EVA collect more ample for a given time duration.

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function Proceeding of the World Congre on Engineering and Computer Science 2012 Vol II, October 24-26, 2012, San Francico, USA Modeling Throughput and Delay in 802.11 Infratructure Mode Network with QoS Support

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

A study on turbo decoding iterative algorithms

A study on turbo decoding iterative algorithms Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication

More information

Research Article Real-Time Communications in Large-Scale Wireless Networks

Research Article Real-Time Communications in Large-Scale Wireless Networks Hindawi Publihing Corporation International Journal of Digital Multimedia Broadcating Volume 2008, Article ID 586067, 16 page doi:10.1155/2008/586067 eearch Article eal-time Communication in Large-Scale

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

SPHERE DECODING FOR MULTIPROCESSOR ARCHITECTURES. Q. Qi, C. Chakrabarti

SPHERE DECODING FOR MULTIPROCESSOR ARCHITECTURES. Q. Qi, C. Chakrabarti SPHERE DECODING FOR MULIPROCESSOR ARCHIECURES Q. Qi, C. Chakrabarti Arizona State Univerity Department of Electrical Engineering {qi,chaitali}@au.edu ABSRAC Motivated by the need for high throughput phere

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information