DUE to the rapid progress of wireless communication

Size: px
Start display at page:

Download "DUE to the rapid progress of wireless communication"

Transcription

1 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER An Effcent Fault-Tolerant Approach for Moble IP n Wreless Systems Jenn-We Ln and Joseph Arul, Member, IEEE Abstract Ths paper presents the fault tolerance of Moble IP n wreless systems. Moble IP can support wreless users wth contnuous network connectons whle changng locatons. It s acheved by allocatng a number of moblty agents (foregn agents and home agents) n the archtecture of a wreless system. If a falure occurs n a moblty agent, the wreless users located n the coverage area of the faulty moblty agent wll lose ther network connectons.to tolerate the falures of moblty agents, ths paper proposes an effcent approach to mantanng the network connectons of wreless users wthout beng affected by the falures. Once detectng a falure n a moblty agent, falure-free moblty agents are dynamcally selected to be organzed as a backup set to take over the faulty moblty agent. Compared to the prevous approaches, the proposed approach does not take any actons aganst falures durng the falure-free perod. Besdes, the hardware redundancy technque s also not used n the proposed approach. The overhead of the proposed approach s analyzed usng the M/G/c/c queung model. The results show that the proposed approach can effectvely resolve the fault-tolerant problem of Moble IP n wreless systems. Index Terms Fault tolerance, Moble IP, wreless systems, M/G/c/c queung model. æ 1 INTRODUCTION DUE to the rapd progress of wreless communcaton technology, there s a growng demand for accessng data by wreless systems (wreless data accesses). Moblty s one mportant characterstc of wreless systems. Each wreless user (moble node) may change ts locaton several tmes durng the executon of ts data servce. To avod nterruptng the ongong data sesson, the Internet Engneerng Task Force (IETF) has defned Moble IP [1] as one whch enables wreless users to mantan ongong data sessons wthout nterrupton whle changng locatons. To provde the functonalty of Moble IP n a wreless system, a number of moblty agents are requred n the archtecture of the wreless system. The moblty agents are classfed nto two types: foregn agent () and home agent (). The logcally connects wth several rado access networks (RANs) to form a wreless data servng area. The mantans the current addresses of moble nodes (MNs). When an MN starts a data sesson, a data request s frst sent to the located RAN of the MN, then to a servng and, fnally, to a correspondng applcaton server. The applcaton server processes the data request and sends back the packets of the handlng results to the MN. The packets sent to the MN wll be frst ntercepted by the MN s correspondng. The looks up the current address of the MN and tunnels the packets to the servng the MN. Then, the detunnels the packets and forwards them to the MN. From ths scenaro of a wreless data sesson, we can know that, f a falure occurs n a, all MNs located n ts data servng. The authors are wth the Department of Computer Scence and Informaton Engneerng, Fu Jen Catholc Unversty, 510 Chung Cheng Road, Hsnchuang, Tape 242 Tawan, ROC. E-mal: {jwln, arul}@cse.fju.edu.tw. Manuscrpt receved 18 Aug. 2002; revsed 5 June 2003; accepted 25 June For nformaton on obtanng reprnts of ths artcle, please send e-mal to: tmc@computer.org, and reference IEEECS Log Number area cannot perform wreless data sessons agan. Lkewse, f an crashes, the response packets of the data sesson cannot be sent back to the correspondng MN. Ths paper presents an effcent approach to provdng fault-tolerant capablty n the wreless system wth Moble IP functonalty. The fault-tolerant mportance s descrbed as follows: For a telecom system, fve nnes ( percent) relablty s a usual requrement for the network desgn [2]. To acheve such hgh relablty, the falure rate of equpment n the telecom system may need to be very low. However, the falure rate vares as tme, where the relatonshp can be modeled as a bathtub curve [3]. In the ncreasng part of the bathtub curve, the falure rate of telecom equpment ncreases as tme ncreases. Ths means that telecom equpment wll be prone to ncur falures after t has been functonal for a long perod of tme. The wreless system s also one telecom system. For supportng the fve nnes relablty, t s necessary to provde fault-tolerant solutons for a wreless system. The proposed approach s based on the concept of resource sharng to redrect the workloads of a faulty () to other falure-free s (s). Unlke the prevous approach [4], [5], the fault-tolerant method of an n the proposed approach s dfferent from that of an. Once detectng a falure n a, one or more falure-free s are dynamcally selected to be organzed as a backup set for the faulty. Then, a system-ntated handoff s ssued to vrtually move the MNs now served by the faulty to the servng areas of the s n the backup set. The data executable capabltes for the MNs can be contnuously supported by the falure-free s n the backup set. For the fault tolerance of an, f a falure s detected n an, one or more falure-free s are also dynamcally selected to be the backup members of the faulty. The selected falure-free s, nstead of the faulty, ntercept the /03/$17.00 ß 2003 IEEE Publshed by the IEEE CS, CASS, ComSoc, IES, & SPS

2 208 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 Fg. 1. Wreless data network model. packets movng toward the faulty, and then send the packets to correspondng MNs. The remander of ths paper s organzed as follows: Secton 2 presents the background of ths paper. Secton 3 proposes our approach. Secton 4 descrbes the detals of mplementng the proposed approach. Secton 5 evaluates the overhead of the proposed approach. Secton 6 makes the comparson between the proposed approach and prevous approaches. Fnally, conclusons are made n Secton 7. 2 BACKGROUND Ths secton descrbes the background materals of ths paper. Frst, we gve an overvew of the Moble IP. Then, the system model s descrbed. Next, the fault assumpton s made. Fnally, related work s revewed. 2.1 Moble IP Overvew Moble IP s desgned to support node moblty by usng two types of moblty agents: home agent () and foregn agent (). Intally, each moble node (MN) has a unque address to be managed by an on ts home network. If an MN moves from ts home network to a foregn network, a care-of-address (COA) s allocated to the MN to reflect the MN s current pont of attachment. The on the foregn network also adds an entry correspondng to the MN n ts vstor lst. Then, a regster message s sent to the MN s to create or modfy the MN s moblty bndng whch assocates the MN s home address, the located, and the COA. Packets from a correspondent host (CH) to an MN are addressed to the home address of the MN. If the MN s away from ts home network, the on the home network can ntercept the packets and tunnel them to the located of the MN. Then, the decapsulates the packets and forwards them to the MN. 2.2 System Model The system model consdered n ths paper refers to the archtecture of a thrd generaton (3G) wreless system [6], [7], as shown n Fg. 1. The system model contans three major components: moble node (MN), rado access network (RAN), and core network. The MN nteracts wth an RAN to obtan rado resources for performng wreless data sessons. The RAN provdes the transmsson across the ar nterface. Wth the core network, t s an IP-based network and contans the followng equpment: foregn agent (), home agent (), and ntermedate routers. The and provde the wreless data sessons wth Moble IP functonalty. The ntermedate routers assst s and s to forward packets. In addton, between RANs and s, there s an nterconnecton network to delver the wreless data requests from MNs to the core network and to send back the response packets from the core network to MNs. Based on the specfcatons of [8], [9], [10], the nterconnecton network can be a Frame Relay network, ATM network, or IP network, respectvely. To manage all equpment n the wreless system, operatons, admnstraton, and mantenance (OA&M) functons are necessary. The OA&M functons are classfed nto confguraton management, fault management, performance management, and securty management [11]. The confguraton management confgures equpment (e.g., RAN,,, AAA server, router, etc.) wth sutable resource parameters. The performance management measures the resource utlzaton, loadng status, and other concerned values n the equpment. The fault management s capable of detectng and reportng falures n the equpment. The securty management montors the access rghts to the equpment. 2.3 Fault Assumpton In ths paper, falures are only assumed to occur n moblty agents. To announce the presence of a moblty agent ( or

3 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 209 ), the moblty agent perodcally transmts an agent advertsement message on ts located subnet [1]. When a falure occurs n a moblty agent, the falure can be detected by not recevng an agent advertsement message wthn a perod of tme. The fal-stop assumpton s also made so that the faulty moblty agent cannot send any agent advertsement message agan. As an fals, ts n-processng data requests wll be lost. For a faulty, ts n-processng response packets are also lost. However, these lost data requests and response packets can be retransmtted by an end-to-end relable transport layer such as Transmsson Control Protocol (TCP). Several modfcatons have been proposed to mprove TCP n wreless systems [12], [13]. In ths paper, we do not dscuss how to resend the lost data requests and response packets. 2.4 Related Work For Moble IP, many fault-tolerant approaches have been proposed [4], [5], [14], [15], [16], [17]. However, only [4] and [5] deal wth the ssue of toleratng falures n moblty agents. Accordng to [4], a moblty agent s statcally equpped wth one or more redundant moblty agents as ts backup set. The moblty agent can cooperate wth ts backup set to work n the standby or load-sharng model. If a moblty agent fals, one member n ts backup set wll be selected to act as the prmary moblty agent. Here, the Address Resoluton Protocol (ARP) [18] s used to map the IP address of the faulty moblty agent onto the network lnk-layer address of the selected backup member. Other backup members stll cowork wth the new prmary moblty agent, but the total processng capablty s less one. However, n the approach of [4], there s nontrval overhead for preservng the moblty bndng nformaton. When an MN regsters wth a moblty agent, the regstraton s requred to be addtonally done on all backup members. Ths possble long regstraton delay wll ntroduce sgnfcant performance degradaton. To avod the long regstraton delay, the approach of [5] suggests checkpontng and loggng technques to store the moblty bndngs n stable storage. After a moblty agent fals, ts backup s also selected from one of ts equpped redundances. Unlke the approach of [4], the backup does not have the moblty bndngs of the faulty moblty agent. It needs to restore the moblty bndngs from stable storage. The stable storage s assumed to be nvulnerable. Bascally, the approach of [5] s smlar to the approach of [4]. 3 THE PROPOSED APPROACH Ths secton presents a new approach to toleratng the falures of moblty agents. To avod sgnfcant performance degradaton, the approach dynamcally selects multple falure-free moblty agents to form a backup set for the faulty moblty agent. The workloads of the faulty moblty agent are redrected to the falure-free moblty agents n the backup set. 3.1 Fault Tolerance of Foregn Upon detectng a falure n an, the MNs located n ts servng area wll not be able to execute wreless data Fg. 2. Remappng the relatonshp between RANs and s for fault tolerance. sessons. The new arrvng MNs are also affected. These MNs are called as _falure-affected MNs. To resume the data executve abltes of the _falure-affected MNs, a system-ntated handoff s performed to dynamcally select multple falure-free s to organze a backup set for the faulty. Then, the _falure-affected MNs are vrtually moved to the servng areas of the selected falure-free s. Each of the selected falure-free s adds a number of vstor entres for the _falure-affected MNs that have moved to t and nforms those MNs correspondng s of the new servng s and the care-of-addresses to update ther moblty bndngs. After performng the system-ntated handoff, the network connectons of the _falure-affected MNs can be contnuously supported by ther new servng s. The workloads of the faulty are redrected to other falure-free s. Orgnally, a handoff functons to swtch an MN s wreless communcaton and mantans ts network connecton when the MN moves from one rado coverage area to another. In the proposed approach, the system-ntated handoff s to redrect the workloads of the faulty, but t does not ntroduce locaton changes of the _falureaffected MNs. Ths objectve s attaned by modfyng the relatonshp between RANs and s, descrbed as follows: As shown n Fg. 1, there s an nterconnecton network to connect RANs wth s. From the logc pont of vew, there exsts at least one delvery path from an RAN to each. Therefore, f an RAN receves a data request from a MN, t can delver the data request to any to process t. The RAN determnes whch to process ts receved data requests based on ts nternal -servng record. Intally, the -servng record of an RAN s set to be the dentfer of a fxed. After detectng a falure n an, one or more falure-free s are selected to be the backup members of the faulty. Then, the -servng records of the falureaffeced RANs (the RANs whch have an ntal servng relatonshp wth the faulty ) are reset as the dentfers of the backup members. By modfyng the servng records, the servng s of the falure-affected RANs become the backup members. Therefore, the _falure-affected MNs are now served by the backup members, but ther locatons are not changed (they stll locate n ther respectve rado coverage areas), as shown n Fg. 2.

4 210 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 Fg. 3. Packets destned to an _falure-affected MN. 3.2 Fault Tolerance of Home An asssts a correspondent host (CH) to send packets to an MN based on the followng three functons: moblty bndng mantenance, packet ntercepton, and packet tunnelng. If an fals, the _falure-affected MNs (the MNs managed by the faulty ) wll not be able to receve packets from CHs. To resume the packet recevng abltes of the _falure-affected MNs, one or more falure-free s are also dynamcally selected to be the backup members of the faulty. Then, the above three functons of the faulty are restored on the backup members, descrbed as follows: As mentoned n Secton 2.1, when an MN enters nto a data servng area, the correspondng adds a vstor entry n ts vstor lst to record the followng nformaton: the MN s data lnk-layer address, IP address, and home agent address. When the MN leaves the data servng area, ts correspondng vstor entry s made nvald. Therefore, f an MN has a vald entry n an s vstor lst, the MN s now located n the servng area of the. From the s vstor lsts, the up-to-date locatons of all MNs can be known. Ths ponts out that the moblty bndngs of the faulty can be restored by searchng all the s vstor lsts. The restored moblty bndngs are then dstrbuted to the backup members. Wth regard to the packet ntercepton of the faulty, t s restored on the backup members usng the tunnelng technque. Usually, one or more routers are collocated wth an on the same network segment to connect the wth the core network and the Internet. When an CH sends packets to an MN, the packet s frst receved by the collocated routers, and s then ntercepted by the MN s. After detectng a falure n an, ts collected routers do not forward ther receved packets to the faulty. Instead, the collected routers tunnel the packets to the backup members, as shown n Fg. 3. In such a case, a packet from a CH to an _falure-affected MN s sent by twce tunnelng. One s to let one backup member ntercept the packet. Another s to tunnel the packet to the located of the _falure-affected MN. As for the restoraton of the packet tunnelng, the falurefree s selected as the backup members, already possess the tunnelng functon. 4 IMPLEMENTATION The mplementaton of the proposed approach can be ntegrated nto the OA&M. As descrbed n Secton 2.2, there are four man functons n the OA&M. When a falure n an () s detected, the falure event s sent to the fault management. The fault management ntates the proposed fault-tolerant approach for the (). At frst, t nteracts wth the performance management to acqure the loadng status of the falure-free s (s). Based on ths loadng nformaton, multple falure-free s (s) wth low traffc are selected to be the backup members of the faulty (). Then, the confguraton management s nformed to confgure the backup members of the faulty () by resettng approprate parameters to some equpment n the core network. Thereafter, the ncomng workloads of the faulty () are redrected to ts backup members. 4.1 Implementaton of Foregn To understand the mplementaton n more detal, the fault-tolerant procedure for the s gven n Fg. 4. There are three man tasks n the procedure. The frst task Fg. 4. The fault-tolerant procedure for the. (a) Collectng the loadng status of falure-free s and the number of _falure-affected MNs.

5 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 211 Fg. 4. (Contnued). (b) Selectng the backup members. s to collect the loadng status of each falure-free and calculate the number of _falure-affected MNs, as shown n Fg 4a. The loadng status of each falure-free Fg. 4. (Contnued). (c) Performang the system-nated handoff. can be collected from the performance management of OA&M. For the number of _falure-affected MNs, t can be calculated by countng the number of assocaton entres n the falure-affected RANs. In an RAN s coverage area, f an MN ssues a wreless data sesson, a correspondng entry s generated n the RAN to record the assocaton between the RAN and the servng the MN. The second task selects multple falure-free s to be the backup members of the faulty, as shown n Fg. 4b. Frst, the falure-free s wth lower traffc are selected. If the total resources donated by the selected falure-free s are nsuffcent to serve all falure-affected MNs, some falure-free s wth hgher traffc wll be selected to be the backup members. In addton, each selected falure-free also estmates the number of _falure-affected MNs to be vrtually moved to ts servng area based on the number of the avalable resources n t. The thrd task, as shown n Fg. 4c, performs the systemntated handoff both to vrtually move _falure-affected MNs to the servng areas of the backup members and to update the moblty bndngs of such MNs. From Secton 3.1, we know that the vrtual moves of the _falure-affected MNs are acheved by modfyng the -servng records of the falure-affected RANs. However, the resources of a backup member are derved from a porton of the avalable resources n a falure-free. It s possble that the MNs n the falure-affected RAN cannot be fully served by a sngle backup member. Each falure-affected RAN frst needs to specfy enough backup members to serve the MNs n ts coverage area. Then, t resets ts -servng record to the dentfers of the specfed backup members. Next, each specfed backup member adds the vstor entres for the _falure-affected MNs served by t. Meanwhle, the s of the _falure-affected MNs are notfed to update ther moblty bndngs. Thereafter, the falure-affected RANs can delver ther receved data requests to the backup members. In addton, the packets destned to the _falure-affected MNs can be tunneled to the backup members. 4.2 Implementaton of Home There are also three man tasks n the procedure for mplementng the fault tolerance of the. Based on the s loadng status gven by the OA&M, the frst task selects multple falure-free s wth low traffc to be the backup members of the faulty. One of the backup members s specally desgnated as the s backup manager. The second task restores the moblty bndngs of the faulty by sendng a moblty-reconstructon message to each. Upon recevng the message, each searches ts vstor lst to fnd the vstors entry wth the dentfer of the faulty. Each qualfed vstor entres s then reorganzed as the form of a moblty bndng entry and sends back to the s backup manager. The s backup manager dvdes ts receved moblty bndng entres nto several groups based on ther correspondng MNs IP addresses and then sends each group to a backup member, as shown n Fg. 5a. If a backup member s desgnated to mantan the

6 212 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 Fg. 5. An example of toleratng the falure. (a) Reconstructng the moblty bndngs. (b) Changng the packet nterceptor. (c) Redrectng the packet ntercepton. moblty bndngs of MNs wth IP addresses n the range ½IP 1 ;IP 2 Š, t wll take the responsblty for nterceptng the packets whose destnaton addresses belong to ½IP 1 ;IP 2 Š, and then tunnelng such packets. The thrd task s to change the packet nterceptors of the _falure-affected MNs from the faulty to the backup members. To change the packet nterceptors, the collocated routers of the faulty must remove ther routng entres correspondng to the faulty and add the routng entres correspondng to the backup members, as shown n Fg. 5b. However, the backup members may not have drect physcal nterfaces wth the collocated routers. In each routng entry correspondng to a backup member, ts nterface feld s set to a vrtual nterface. The vrtual nterface ponts to a software program to perform the packet tunnelng. By tunnelng, the packets destned to a _falure-affected MN are ntercepted by backup members (1-4), not the faulty (0), as shown n Fg. 5c. 4.3 Falure Recovery When a faulty s recovered from falure, the _falureaffected_mns can be served back by the recovered. The recovery procedure s shown n Fg. 6a. Frst, the recovered determnes the nformaton whch RANs are preserved by t (the nformaton about the falure-affected RANs). Then, the falure-affected RANs reset ther -servng records to the dentfer of the recovered. The recovered gets back to be the common servng of all _falure-affected MNs. Next, the recovered creates a lot of vstor entres for the _falure-affected MNs. In addton, the respectve s of the _falure-affected MNs are also notfed to update the MNs moblty bndngs. The recovery procedure for an s shown n Fg. 6b. When a faulty s recovered, the responsblty of packet ntercepton can be returned to t. By modfyng the routng tables of the collocated routers of the recovered, the packet nterceptors of _falure-affected MNs are changed back from the backup members to the recovered. In addton, the moblty bndngs of the recovered are also requred to be reconstructed, whch can be done by searchng all s vstor lsts. Ths reconstructon task s smlar to the task of restorng the moblty bndngs of the faulty (see Secton 4.2).

7 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 213 Fg. 6. The falure recovery procedure. (a) and (b). 5 EVALUATION The proposed fault-tolerant approach redrects the workloads of a faulty () to falure-free s (s). To perform the workload redrecton, some control messages are ssued, whch also ntroduce a certan overhead on the system performance. Ths secton analyzes the performance degradaton of a falure-free () and the control message overhead. To obtan the two desred overheads, the parameter notatons are frst defned n Table 1. The data requests sent to an and the response packets ntercepted by an are assumed to follow Posson processes, but the servce tme of a data request and the processng tme of a packet tunnelng are not assumed to obey any specfc dstrbuton. Based on these traffc dstrbutons, the traffc behavor of an and that of an can both be modeled as the M/G/c/c queung model [19]. 5.1 Performance Degradaton of a Moblty As descrbed n Secton 3, the performance degradaton of a falure-free s due to the system-ntated handoff whch vrtually moves some _falure-affected MNs to ts servng area. Therefore, the resources of a falure-free are now contended by the MNs vrtually moved and the MNs orgnally located. The performance of a falure-free ncurs a certan degradaton, whch can be represented n terms of the followng metrc:. Increasng blockng probablty P Blockng that causes a new data request to be more possbly blocked at a falure-free n comparson to prefalure. The probablty P Blockng s derved as follows: The arrval rate of data requests to a falure-free s. Usng the well-known Erlang s loss formula from the M/G/c/c queung model [19], the blockng probablty of a data request to a falure-free s: c c! Pc : ð1þ

8 214 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 TABLE 1 Parameter Notatons After some s fal, the data requests to the faulty s are redrected to falure-free s. Compared to prefalure, the arrval rate of data requests to the falure-free k s larger and becomes as þ F w K f there are F faulty s. The new blockng probablty s as follows: Pc c þf w k c! þf w k : ð2þ From (1) and (2), P Blockng can be derved as follows: c c þf w k P Blockng ¼ Pc c! þf w k c! Pc : ð3þ Lkewse, the performance degradaton of a falure-free k s represented n terms of the followng metrc:. Increasng blockng probablty (P Blockng ) that causes an ntercepted packet to be more possbly blocked at a falure-free n comparson wth prefalure. The dervaton of P Blockng s smlar to P Blockng, whch s represented as: c c þf w k P Blockng ¼ Pc c! þf w k c! Pc : ð4þ 5.2 Control Message Overhead In the proposed approach, the followng control messages are ssued from the OA&M for assstng the fault tolerance of the ():. _Loadng: Collectng the loadng status of each falure-free for reducng the performance degradaton of a falure-free.. RAN_Mappng: Remappng the relatonshp between the RANs and the s for vrtually movng the _falure-affected MNs.. Bndng_Update: Updatng the moblty bndngs of _faure-affected MNs for regsterng ther new servng s.. _Loadng: Collectng the loadng status of each falure-free for reducng the performance degradaton of a falure-free.. Interceptor_Change: Modfyng the routng tables for changng the packet nterceptors of _falureaffected MNs.. Bndng_Restoraton: Searchng the vstor lst of each for restorng the moblty bndngs of a faulty. The frst three control messages are ssued for toleratng the falure. The frst control message nqures of each falure-free ts loadng status. The ntroduced cost of the message ncludes the transmsson tme (T Loadng ) of sendng the message and the transmsson tme (T Re sponse ) of respondng the s loadng status. The second control message notfes each falure-affected RAN to modfy ts -servng record. Snce the modfcaton of the -servng record s a sngle memory access operaton, the ntroduced cost of the message can be only determned by the transmsson tme (T RAN Mappng ) of sendng the message to an RAN. The thrd control message ndcates the backup members of a faulty to send the regstraton messages for updatng the moblty bndngs of _falure-affected MNs. The ntroduced cost of the message s estmated as follows: T Moblty Update þ T Re g ð5þ ¼ T Moblty Bndng þðn MN t Re g Þf MN ; where T Moblty Update s the transmsson tme of sendng a command of the moblty bndng update to each (note that the command can be smultaneously sent to each from the OA&M), and T Re g s the total requred tme for the

9 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 215 falure-free s to send the moblty bndng updates about all _falure-affected MNs. N MN s the total number of the _falure-affected MNs, and t Re g s the average transmsson tme of sendng a regstraton message from an to an. Snce each can smultaneously send the regstraton messages to the correspondng s, T Re g s only requred a fracton (f MN ) of the tme N MN t Re g (the tme for updatng the moblty bndngs of all _falure-affected MNs usng the seral transmsson). The last three control messages are ssued for toleratng the falure. The fourth control message nqures of each falure-free ts loadng status. The ntroduced cost of the message ncludes the transmsson tme (T Loadng ) of sendng the message and the transmsson tme (T Re sponse ) of respondng to the s loadng status. The ffth control message notfes the collocated routers of a faulty to modfy ther routng tables to add and delete routng entres. Snce the routng table of a router s stored n memory, the modfcaton of the routng tables nvolves several trval memory access operatons. The ntroduced cost of ths control message s only dependent on the transmsson tme (T Inteceptor Change ) of sendng the message to a collocated router of the faulty. The last control message ndcates each to search ts vstor lst to select the vstor entres correspondng to the _falure-affected MNs. Snce the s vstor lst s also stored n memory, the cost for searchng the vstor lst can be gnored. For example, the searchng tme of a vstor lst wth 10,000 entres s only sec. The ntroduced cost of the last control message s: T Moblty Bndng þ T Entry ð6þ ¼ T Moblty Bndng þðn MN t Entry Þf MN ; where T Moblty Bndng s the transmsson tme of sendng a command of the moblty bndng restoraton to each, and T Entry s the total requred tme for restorng the lost moblty bndng table of the faulty. N MN s the total number of the _falure-affected MNs, t Entry s the average tme of sendng a qualfed vstor entry, and f MN s a fracton. The dervaton of (6) s smlar to that of (5). The tme metrcs: T Loadng, T Re sponse, T RAN Mappng, T Moblty Update, T Loadng, T Re sponse, T Inteceptor Change, and T Moblty Bndng are manly dependent on the transmsson delays between the OA&M and the s, RANs, s, and routers n the core network. The OA&M and the equpment n the core network are connected through an OA&M network, as shown n Fg. 1. The physcal nterfaces of the OA&M network n a commercal wreless system are usually equpped wth hgh-speed lnes (T1 or above). In addton, the szes of the messages correspondng to the above tme metrcs are also small. The costs of the above tme metrcs can be neglected. To conclude, the control message overhead for toleratng the falure and that for the falure (Control Over and Control Over ) are manly dependent on the moblty bndng updates of the _falureaffected MNs and the moblty bndng restoraton of the _falure-affected MNs, respectvely. Both the overheads have been estmated as ðn MN t Re g Þf MN and ðn MN t Entry Þf MN. Wth respect to N MN and N MN, they can be represented as the followng equatons: N MN ¼ F Xc n P n n¼0 N MN ¼ F Xc n P n ; where P n ðp n Þ s the probablty that there are n nprocessng data requests (response packets) n a faulty (). If each MN s not allowed to smultaneously ssue more than one data sesson, P n ðp n Þ can be represented by the probablty that there are n _falure-affected MNs (_falure-affected MNs) n a faulty (). If the condton s not supported, the N MN and N MN are less than (7) and (8), respectvely. From [19], the formulas of P n and P n has been also gven. Control Over and Control Over can be further deduced as: 0 n¼0 Control Over ¼ F Xc n n¼0 0 f MN Control Over ¼ F Xc n n¼0 6 COMPARISON f MN : n Pc n! n Pc n! 1 t Reg C A 1 t Entry C A ð7þ ð8þ ð9þ ð10þ Table 2 makes a comparson between the proposed approach and the approaches of [4] and [5] wth respect to hardware redundancy, fault-tolerant range, fault-tolerant overhead, falure-free overhead, and falure-recovery overhead. The approaches taken n [4] and [5] are based on the hardware redundancy to equp a prmary moblty agent wth several redundances n a network segment. There are two alternatves: standby and load-sharng to confgure the coworkng mode between the prmary moblty agent and ts redundances. After a prmary moblty agent fals, the two coworkng modes n the above approaches take the ARP to select one redundancy as the new prmary moblty agent, but they have dfferent degrees of performance degradaton on the selected redundancy. In the standby mode, the blockng probablty of the selected redundancy before a falure s 0, snce t does not handle any workload. After a falure, the selected redundancy alone handles all the workloads n the network segment. Based on (3), the performance degradaton mposed on the selected redundancy can be represented as:

10 216 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 TABLE 2 Comparson between the Proposed Approach and the Approaches of [4] and [5] c c! P Blockng ¼ c P : ð11þ In the load-sharng mode, the selected redundancy s responsble for more workloads than other redundances n the same network segment snce t needs to addtonally handle the workloads of the orgnal prmary moblty agent. The performance degradaton mposed on the selected redundancy s: P Blockng ¼! c 2 ð1þr Þ c P c!! 2 ð1þr Þ! c ð1þr Þ c P c!! ð1þr Þ ; ð12þ where ð1 þ R Þ s the number of moblty agents (prmary moblty agent and ts redundances) n a network segment, and ð1þr Þ s the arrval rate of data to a moblty agent based on the load-sharng mode. After the falure, the arrval rate of data to the selected moblty agent s 2 ð1þr Þ. For the fault-tolerant range of the two approaches, f the prmary moblty agent and ts equpped redundances fal smultaneously, the redundances n other network segments (subnets or LANs) cannot be used to tolerate such falure stuaton snce the ARP s only avalable n the LAN envronment [19]. The fault-tolerant range s restrcted n a network segment. In addton, for restorng the moblty bndngs, the approach of [4] ncurs a long regstraton delay durng the falure-free perod. The approach of [5] nvolves a lot of tme-consumng operatons for savng moblty bndngs n stable storage. In the aspect of the falure-recovery overhead, both the approaches use the ARP to actvate the recovered moblty agent. The reconstructon of the moblty bndngs for the approach of [4] and that for the approach of [5] are done by retrevng the lost moblty bndngs from one redundancy and the stable storage, respectvely. Bascally, the falure-recovery overhead of each of the two approaches s smlar to ts respectve faulttolerant overhead but the performance degradaton. In contrast to the prevous approaches, the proposed approach does not ncur the hardware and falure-free overheads. Also, unlke the approaches of [4] and [5], the backup members of a faulty () are not necessary to be located wth the faulty () on the same network segment. In theory, the proposed approach can smultaneously tolerate N 1 faulty s (s) f there are N s (s) n the system. However, for toleratng a faulty (), the falure-free s (s) selected to be the backup members ncur a certan degree of performance degradaton due to handlng a porton of workloads of the faulty (). Two addtonal fault-tolerant overheads are also ncurred due to the ssues of control messages (see Secton 5.2). As for the falure recovery, ts procedure s smlar to the fault-tolerant procedure (see Secton 4.3). The ncurred falure-recovery overhead s nearly same as the fault-tolerant overhead except the performancedegradaton. From Table 2, we can further observe that the approaches of [4] and [5] and the proposed approach gve a dfferent trade off among the above gven comparson metrcs. Among all the approaches, the approach of [4] takes the least falure-recovery overhead. The approach of [5] mproves the approach of [4] to avod the long regstraton delay, but t has to take tme-consumng operatons to save moblty bndngs n stable storage. Comparatvely, the proposed approach has obvous advantages on the hardware overhead, fault-tolerant range, and falure-free overhead. In the aspect of the fault-tolerant overhead, t s dffcult to make a comparson. Intutvely, the cost of the ARP executon s trval. However, all three approaches

11 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 217 TABLE 3 Analytcal Parameters have the performance degradaton. Next, we perform the analytcal comparson to quantfy the dfferences of the three approaches on the performance degradaton. 6.1 Analytcal Comparson The analytcal parameters used are specfed n Table 3. denotes the expected number of arrvals per mean servce tme at a moblty agent ( or ); t s used to represent the traffc ntensty of a moblty agent. The values of the traffc ntensty are, respectvely, set to be 10, 50, 100, and 200. The four chosen values of the traffc ntensty all supply large workloads to a moblty agent ( or ) [20]. As mentoned before, the performance degradaton s n terms of the ncreasng blockng probablty of a falure-free moblty agent. Fg. 7 llustrates the comparson of the ncreasng blockng probabltes n the approaches of [4] and [5] and the proposed approach as a functon of F, when ¼ 10, 50, 100, and 200. For the proposed approach, the workloads of faulty moblty agents (faulty s or s) are evenly redrected to all the falure-free moblty agents snce the same traffc dstrbuton s made n each moblty agent. The rato w k ðw k Þ of redrectng 1 workloads to a falure-free moblty agent s N F. For the approaches of [4] and [5], there are two coworkng modes for the prmary moblty agent and ts redundances. From (11) and (12), we know that f the load-sharng mode s adopted, the number of redundances n a network segment affects the ncreasng blockng probablty. To observe the effects, the number of redundances equpped n a network segment s respectvely set to 1, 2, and 3. As shown n Fg. 7, t s clear that the ncreasng blockng probablty for the proposed approach ncreases as F ncreases. If F ncreases, the workloads of the faulty s (s) redrected to the falure-free s (s) become more. However, the ncreasng blockng probablty for the approaches of [4] and [5] s ndependent of the varance of F snce each redundancy s responsble for takng over only one faulty moblty agent regardless of how many faulty moblty agents n the same network segment. In the aspect of, the ncreasng blockng probablty for the approaches of [4] and [5] ncreases as ncreases snce only one redundancy s selected to take over one faulty moblty agent. When s larger, Fg. 7. Comparson of ncreasng blockng probablty under varous numbers of faulty moblty agents. (a) ¼ 10. (b) (d) ¼ 200. ¼ 50. (c) ¼ 100.

12 218 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 the addtonal workloads to the selected redundancy become more. For the proposed approach, the ncreasng blockng probablty does not always ncrease as ncreases. For example, the ncreasng blockng probablty for the proposed approach at ¼ 200 s less than that at ¼ 50 and 100. The stuaton s explaned as follows: When ¼ 200, the blockng probablty (0.7516) of a falure-free () before a falure s obvously larger than that (0.1048) at ¼ 50 and that (0.5093) at ¼ 100. After some s (s) fal (e.g., F ¼ 8), the new blockng probablty of a falure-free ðþ at ¼ 200 becomes , whch s not much larger than that (0.8010) at ¼ 50 and that (0.9002) at ¼ 100. Therefore, the ncreasng blockng probablty ( = ) of a falure-free () at ¼ 200 s smaller than that ( = ) at ¼ 50 and that ( =0.3909) at ¼ 100. For the comparson results of the ncreasng blockng probabltes n all the three approaches, when ¼ 10, the ncreasng probablty for the approaches of [4] and [5] s close to 0 regardless of the varance of F. In ths traffc ntensty, the resource unts n a redundancy are suffcent to handle the workloads to t snce c s set to 50. The ncreasng blockng probablty of a redundancy s very small. For the proposed approach n such traffc ntensty, f F < 8, the ncreasng blockng probablty s also very small. If F ¼ 8, the ncreasng blockng probablty of each falure-free () s slghtly larger snce only two falure-free s (s) handle all the workloads of the whole system, but t s stll less than When ¼ 100, f the ncreasng blockng probablty for the approaches of [4] and [5] s requred to be less than that of the proposed approach, the two approaches must use the load-sharng mode and equp two or more redundances n each network segment. When ¼ 200, even f the number of the redundances n a network segment s set to 3, the ncreasng blockng probablty for the approaches n [4] and [5] s stll larger than that of the proposed approach. In the proposed approach, there are two addtonal faulttolerant overhead for the fault tolerance of the and, respectvely. These two addtonal overheads are manly dependent on the average number N MN of the moblty bndng updates and the average number N MN of moblty bndng restoraton (see Secton 5.2). Fg. 8 plots N MN ðn MN Þ under one faulty (). Intally, N MN ðn MN Þ s approxmately equal to the value of.as ncreases up to a threshold value, N MN ðn MN Þ ncreases slowly as ncreases agan. Snce the total number of resource unts n an () s 50, f s already larger than 50, the new Fg. 8. Average number of moblty bndng updates (moblty bndng restoraton). data request (response packets) to an () s very possble to be blocked. Therefore, at any tme, the average number of n-processng data requests (response packets) n an () cannot be greater than 50. We have also made the assumpton that each MN s not allowed to smultaneously ssue more than one data sesson (see Secton 5.2). Ths also means that the maxmum value of the number of _falure-affected MNs (_falure-affected MNs) s 50 f only one () fals. Correspondngly, the maxmum number of N MN ðn MN Þ s 50. We can make the concluson that the overhead of the moblty bndng update (the overhead of moblty bndng restoraton) s restrcted by the total number of resources n an (). Furthermore, the analytcal results plotted n Fg. 8 can be also used to represent the falure-recovery overhead of the proposed approach snce the falure-recovery overhead s also dependent on N MN and N MN (see Table 2). 6.2 Smulaton Valdaton To valdate the analytcal results of the ncreasng blockng probablty for the proposed approach, smulaton experments are performed by extendng the gven Moble IP smulaton model n ns-2 [21]. In the extended smulaton model, there are 10 s, 10 s, 1000 MNs, and 5 applcaton servers. The sze of the packet queue n each () s set to 50 unts. Each MN randomly moves between the servng areas of the s and s. The capactes of the communcaton lnks n the smulaton model are randomly set n the nterval 1 to 10 Mpbs. The unform traffc s generated from fve applcaton servers to the 1,000 MNs, and vce versa, where the traffc ntensty s, respectvely, set to 10, 50, 100, and 200. The falures randomly occur to generate one, two, four, and eght faulty moblty agents durng the smulaton tme. The total smulaton tme s set to 5,000 mnutes. The smulaton results are shown n Table 4 n comparson to the analytcal results. The analytcal results match closely wth the smulaton results. In the tables, the

13 LIN AND ARUL: AN EFFICIENT ULT-TOLERANT APPROACH FOR MOBILE IP IN WIRELESS SYSTEMS 219 TABLE 4 The Valdaton of the Increasng Blockng Probablty for the Proposed Approach (a) ¼ 10. (b) ¼ 500. (c) ¼ 100. (d) ¼ 200. dfference rates between the smulaton results and the janalyss Smulatonj analytcal results Analyss are all below 10 percent. Note that the same workloads to an and, P Blockng and P Blockng, have the same value n the numercal analyss based on (3) and (4), but the two probabltes have dfferent values n the smulaton experments. 7 CONCLUSION Ths paper has presented an effcent approach to toleratng the falures of moblty agents n a wreless system. The proposed approach utlzes the avalable resources n other falure-free moblty agents to dynamcally generate a backup set for each faulty moblty agent. Compared to the prevous approaches, the proposed approach possesses the followng advantages:. Not requrng hardware support.. Not ncurrng falure-free overhead.. Dstrbutng the fault-tolerant overhead to avod the sgnfcant performance degradaton on a sngle falure-free moblty agent. However, the proposed approach ssues a more complcated fault-tolerant procedure to redrect the workloads of faulty moblty agents to multple falure-free moblty agents. Wth the fault-tolerant overhead, the M/G/c/c queung model has been used to make the analytcal comparson of the

14 220 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 proposed approach and the approaches of [4] amd [5]. The smulaton experments have been also performed to valdate the analytcal comparson. The comparson results show that when s enlarged to 200, the ncreasng blockng probablty for the proposed approach s obvously less than that n the approaches of [4] and [5]. Ths comparson result s also true n most cases of small faulty moblty agents. The approaches of [4] and [5] gve the smaller ncreasng blockng probablty when s not too large (e.g., ¼ 10 or 50), but they need to equp several redundances n each network segment. ACKNOWLEDGMENT The authors would lke to thank the anonymous revewers. Ther comments have sgnfcantly mproved the qualty of ths paper. Ths research was supported by the Natonal Scence Councl, Tawan, R.O.C., under Grant NSC E and the Socety of the Dvne Word under Grant SVD9021. REFERENCES [1] C. Perkns, IP Moblty Support, Techncal Report IETF RFC 3220, Jan [2] Goahead Software Inc., Buldng Hghly Relable Systems: The Role of Embedded Mddleware, techncal report, avalable at [3] B.W. Johnson, Desgn and Analyss of Fault Tolerant Dgtal Systems. Addson-Wesley, [4] R. Ghosh and G. Varghese, Fault-Tolerant Moble IP, Techncal Report WUCS-98-11, Washngton Unv., Apr [5] J.H Ahn and C.S. Hwang, Effcent Fault-Tolerant Protocol for Moblty s n Moble IP, Proc. 15th Int l Parallel and Dstrbuted Processng Symp., pp , [6] B. Sarkaya, Packet Mode n Wreless Networks: Overvew of Transton to Thrd Generaton, IEEE Comm. Magazne, vol. 38, no. 9, pp , Sept [7] P.J. McCann and T. Hller, An Internet Infrastructure for Cellular CDMA Networks Uusng Moble IP, IEEE Personal Comm., vol. 7, no. 4, pp , Aug [8] ETSI GSM 08.16: Dgtal Cellular Telecommuncatons System (Phase 2+); General Packet Rado Servce (GPRS); Base Staton System (BSS) Servng GPRS Support Node (SGSN) Interface; Network Servce, [9] 3GPP TS : UTRAN Iu Interface: General Aspects and Prncples, [10] 3GPP TR : Archtecture for an All IP Network, [11] R. Mstry, P. Savll, and A. Tofanell, OA&M for Full Servces Access Networks, IEEE Comm. Magazne, pp , Mar [12] R. Caceres and L.R. Iftode, Improvng the Performance of Relable Transport Protocols n Moble Computng Envronments, IEEE J. Selected Areas n Comm., vol. 13, no. 5, pp , June [13] H. Balakrshnan, V.N. Padmanabhan, S. Seshan, and R.H. Katz, A Comparson of Mechansms for Improvng TCP Performance over Wreless Lnks, IEEE/ACM Trans. Networkng, vol. 5, no. 6, pp , Dec [14] C. Graff, M. Bereschnsky, M. Patel, and L.F. Chang, Applcaton of Moble IP to Tactcal Moble Internetworkng, Proc. Mltary Comm. Conf., vol. 2, pp , [15] Y. Mun, Y. Km, Y.J. Km, and G. Hwang, IP Moblty Support over Wreless ATM, Proc. IEEE Int l Conf. Comm., pp , [16] S. Khurana, A. Kahol, S.K.S. Gupta, and P.K. Srman, An Effcent Cache Mantenance Scheme for Moble Envronment, Proc. 20th Int l Conf. Dstrbuted Computng Systems, pp , [17] H. Ahn and C.S. Hwang, Low-Cost Fault-Tolerance for Moble Nodes n Moble IP Based Systems, Proc. 15th Int l Parallel and Dstrbuted Processng Symp., pp , [18] D.C. Plummer, Ethernet Address Resoluton Protocol: Or Convertng Network Protocol Addresses to 48.bt Ethernet Address for Transmsson on Ethernet Hardware, Techncal Report IETF RFC 826, Nov [19] D. Gross and C.M. Harrs, Fundamentals of Queueng Theory. John Wley & Sons, Inc., [20] P. Ln and Y.B. Ln, Channel Allocaton for GPRS, IEEE Trans. Vehcular Technology, vol. 50, no. 2, pp , Mar [21] Ns-2, Creatng Wred-cum-Wreless and Moble IP Smulatons n ns, Jenn-We Ln receved the MS degree n computer and nformaton scence from Natonal Chao Tung Unversty, Hsnchu, Tawan, n 1993, and the PhD degree n electrcal engneerng from Natonal Tawan Unversty, Tape, Tawan, n He s currently an assstant professor n the Department of Computer Scence and Informaton Engneerng at Fu Jen Catholc Unversty, Tawan. He was a researcher at Chunghwa Telecom Co., Ltd., Taoyuan, Tawan, from 1993 to Hs current research nterests are faulttolerant computng, moble computng and networks, dstrbuted systems, and broadband networks. Joseph Arul receved the BSc degree n mathematces n 1981 from Indore Unversty, Inda, and the MS degree n computer scence n 1994 from De Paul Unversty, Chcago. From , he was a lecturer at Fu Jen Catholc Unversty, Tawan. He completed hs PhD degree n computer engneerng at the Unversty of Alabama n Huntsvlle (UAH) n He was also a research assocate n computer engneerng at UAH. He s currently an assstant professor n the Department of Computer Scence and Informaton Engneerng, Fu Jen Catholc Unversty, Tawan. Hs current research nterests are computer archtecture, parallel and dstrbuted computng, multthreaded programs, and complers. He s a member of the IEEE and the IEEE Computer Socety.. For more nformaton on ths or any computng topc, please vst our Dgtal Lbrary at

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS E.N. Onwua and Z. Nu State Key Lab on Mcrowave and Dgtal Communcaton Department

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Transit Networking in ATM/B-ISDN based on Service Category

Transit Networking in ATM/B-ISDN based on Service Category Transt Networkng n ATM/B-ISDN based on Servce Category Young-Tak Km Dept. of Informaton and Communcaton Engneerng, College of Engneerng, YeungNam Unv. E-mal : ytkm@ynucc.yeungnam.ac.kr ABSTRACT The ATM

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS THE MA MATCHING ALGORITHM OF GS DATA WITH RELATIVELY LONG OLLING TIME INTERVALS Jae-seok YANG Graduate Student Graduate School of Engneerng Seoul Natonal Unversty San56-, Shllm-dong, Gwanak-gu, Seoul,

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks Enhanced Sgnalng Scheme wth Admsson Control n the Hybrd Optcal Wreless (HOW) Networks Yng Yan, Hao Yu, Henrk Wessng, and Lars Dttmann Department of Photoncs Techncal Unversty of Denmark Lyngby, Denmark

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Available online at ScienceDirect. Procedia Computer Science 103 (2017 )

Available online at  ScienceDirect. Procedia Computer Science 103 (2017 ) Avalable onlne at www.scencedrect.com ScenceDrect Proceda Computer Scence 03 (207 ) 562 568 XIIth Internatonal Symposum «Intellgent Systems», INTELS 6, 5-7 October 206, Moscow, Russa Retral queueng systems

More information

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM *

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM * Copyrght Notce c 1999 IEEE. Personal use of ths materal s permtted. However, permsson to reprnt/republsh ths materal for advertsng or promotonal purposes or for creatng new collectve wors for resale or

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad Unversty Post-Prnt Admsson Control for Swtched Realtme Ethernet Schedulng Analyss versus etwor Calculus Xng Fan and Magnus Jonsson.B.: When ctng ths wor cte the orgnal artcle. Orgnal Publcaton:

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information