Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications

Size: px
Start display at page:

Download "Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications"

Transcription

1 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Aalysis of Ed-to-Ed Packet Delay for Iteret of Thigs i Wireless Commuicatios Imae Maslouhi 1 Dept: Electroics, Iformatics ad Telecommuicatios ENSAO, Mohammed I Uiversity, Oujda, Morocco El Miloud Ar reyouchi 2 Dept. Telecommuicatios ad Computer sciece Abdelmalek Essaadi Uiversity ad SNRT, Tetoua, Morocco Kamal Ghoumid 3, Kaoutar Baibai 4 Dept. Electroics, Iformatics ad Telecommuicatios, ENSAO, Mohammed I Uiversity Oujda, Morocco Abstract Accurate ad efficiet estimators for Ed to Ed delay (E2EPD) plays a sigificat ad critical role i Quality of Service (QoS) provisioig i Iteret of Thigs (IoT) wireless commuicatios. The purpose of this paper, o oe had, is to propose a ovel real-time evaluatio metrics, o the other had, addresses the effects of varyig packet payload (PP) size. These two objectives rely o the aalysis of E2EPD for QoS provisioig i multi-hop wireless IoT etworks through multiple hops cout from source to destiatio. The results of this study show the critical effect of PP size, hops cout ad iterface speed o the improvig E2EPD use of applicatios requirig real-time IoT commuicatios. Keywords Ed to ed delay; iteret of thigs; multi hop; wireless commuicatio I. INTRODUCTION Ed-to-Ed delay is the time take by a packet to travel from source to destiatio [1], [2],[3]. It is a importat desig ad performace characteristic of IoT wireless commuicatios etworks. It is especially importat for delaysesitive applicatios ad for which eed trasmittig packet data with average delay costraits [4]. E2ED is a commo term i IP etwork moitorig ad differs from Roud-Trip Time (RTT) [5]. The large turout of real-time commuicatio to the IoT gives much importace to improve E2ED. Reducig delay metric is exposed i differet cotexts such as access delay i [6].Delay improvemet for the remote maagemet of reewable eergy usig a radom NC is also evaluated accordig to [7]. The evaluatios of average E2ED ad jitter i wireless tele-ultrasoography medical systems has bee carried i [8]. E2E delay depeds o umber of hops i the path, cogestio o the etwork ad it is affected by various parameters as iterface speed i itermediate odes [9]. I IoT, a excessive E2E delay ca sigificatly affect throughput. Higher delays could result i rejectig the packets by routers due to breachig the limit of Time to Live (TTL), the Iteret Cotrol Message Protocol (ICMP) packets are set to the source ad hece results i re-trasmissios. E2E delay is also ifected directly by the retrasmissio timeout (RTO) as [10]. IoT ca also strogly secure the itelliget etworks platforms which is studied i [11]. The E2EPD is especially importat for delay-sesitive applicatios. Packets are delivered to destiatio odes with delays, which may vary from packet to packet (oe measure is jitter). E2EPD distributio calculatio method it is a aalytical model to calculate E2E delays i packet etworks accordig to [12]. Recetly, simulatio results demostrate the accuracy ad effectiveess of aalytical E2EPD modelig for achievig delay aware as i [13]. TCP (Trasmissio Cotrol Protocol) is more widely used protocol o the Iteret because of their errors correctio. UDP (User Datagram Protocol) is aother more frequetly used protocol o the Iteret. However, UDP is ever used to trasmit valuable data such as database iformatio, webpages, etc. UDP is commoly used for streamig audio ad video. Therefore, UDP is characterized by high-speed data commuicatio. I IoT, protocol specificatio allows iteroperability amog thigs with differet commuicatio stadards as CTP (Commuicatio Thigs Protocol) accordig to [14]. Other study gives a overview of some techical details that pertai to the IoT eablig techologies applicatios as [15]. I the Remote Maagemet field popularity of IoT is icreasig day by day i the area of remote moitorig system as i [16]. The remote moitorig systems iclude, remote satellite moitorig, DVB stream maagemet, data acquisitio i remote areas, eergy grid moitorig etc., I IoT etwork maagemet, the real-world objects commuicate with each other usig source-destiatio which source ad destiatio ca be Supervisory Cotrol ad Data Acquisitio (SCADA) ad remote termial uit (RTU) respectively. The efficiecy of applyig the delay distributio from a sigle ode ad usig covolutio to fid the E2E delay is give i [17]. The E2ED distributio i a liear etwork is derived for homogeeous etworks as i [18]. This paper gives a simplistic overview of the role that ca play the payload legth (based o some basic parameters) for improvig the E2E delay i IoT etwork performace. The rest of this paper is structured as follows. Sectio II discusses the geeral coceptio of payload trasmissio. 338 P a g e

2 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Sectio III gives a geeral descriptio of ed-to-ed packet delay i wireless multi-hop etwork, ad its mathematical model is described. The experimetal ad simulatio setup are give i Sectio IV. Sectio V lists results ad discussio.i Sectio V, the authors provide the coclusios. II. GENERAL CONCEPT A. Trasmissio Average Message Size The basic structure of a packet varies betwee protocols, a typical packet icludes two sectios a header ad payload. I this paper, the authors focus o trasmittig the average message which vary i legth from o to 1500 bytes, ad their headers vary i complexity from five to 50 bytes. The E2ED i IoT etwork ca be strogly depedet of the message size. Data trasmissio over a E2E (source to destiatio) commuicatio chael is beig carried withi a packet does ot itegrate the overhead data. These real data are referred as the payload. For a commuicatios layer that requires some of the overhead data to do its operatio, the payload is sometimes desiged to iclude the part of the overhead data. However, i this operatioal etwork,the payload is the bits that get delivered to the source (SCADA) at the destiatio( RTU). The most importat factors that directly ifluece E2E delay are the arrival rate, the service rate, the umber (cout) of hops i a path, Etheret iterface speed ad the baud rate [kbps] for the serial iterface (COM). Whe data is set over etwork ad Iteret coectios, each IoT odes set icorporate both header iformatio ad the real iformatio beig set. The header cotais various thigs depeds o the used protocol, it ca detects the source ad destiatio of the packet, while the real iformatio is assiged to the payload. Header iformatio is applicated sigly i the trasmissio process, it stripped off from the packet whe it has just arrived at its destiatio. Therefore, the payload is the oly data collected by the destiatio IoT ode. I this paper the trasmissio message size is compared ad aalyzed. B. Data Trasmissio Speed The results cosidered differet value of the payload which is the data itself it eeds to trasfer (usually the user message size without ay headers (IP, TCP, UDP,). Whe crossig more tha oe device i IoT etwork, iterface speed has always played a primordial role for improvig E2E delay. It is ecessary to cofigure the iterface speed of IoT devices. I this paper it is referred to as the baud rate [bps] for the serial (COM) iterface or a Etheret iterface speed. I typical serial iterface commuicatio systems, the available bit rate values are: 2400 kbps, 4800 kbps, 9600 kbps, kbps, kbps ad kbps. Whe usig TCP istead of UDP lowers the total etwork capacity due to the higher TCP overhead (ETH UDP/IP ad serial optios are equal. The performace evaluatio of E2E delay of Radomized TCP is preseted i [19]. UDP seds the packets which cotais just simple thigs i the header as source IP/PORT ad destiatio. TCP, o the other ed cotais some iterestig iformatio, amely the sequece umber of the packet( to guaratee ordered delivery), a lot of flags (to guaratee the packet actually received i it's destiatio) ad checksum of the data (to esure it did't get corrupted) ad received correctly i its destiatio. The protocols TCP ad UDP are used for trasmittig bits of data over the Iteret. They ca build o top of the IP protocol. The packet set directly via TCP or UDP are processed similarly, as they re forwarded from a source itermediary IoT odes ad to the destiatio III. A THEORETICAL STUDY OF END-TO-END PACKET DELAY The E2E delay is typically measured i multiples or fractios of secods, i that oly path i the oe directio from source to destiatio is measured. It is very iterestig to specify how log it takes for a user data size without ay headers to travel across the etwork from source to destiatio. A. Ed to Ed Delay I telecommuicatio ad data etworks, the ed-to-ed packet delay D usually cosists of followig four elemets [20]: ( r) D D Trasmissio delay, Radio propagatio delay, ( s) ( q) D D Sigal processig delay ad Queueig delay. Their mathematical relatio ca be simply expressed as ( t) ( r) ( s) ( q) D D D D D (1) The E2E delay equatio above describes the packet delay at a sigle IoT ode alog its path from source to destiatio. Assumig that the radio trasmissio delay processig becomes D ad sigal ( s) D delay are small eough to eglect, (1) ( t) ( q) D D D (2) I the IoT coectios, if is the umber of IoT odes i the coected path from source to destiatio, the umber of liks is 1, the ed to ed delay is ( t) ( q) D ( 1)( D D ) (3) Where are the odes ca be cosidered for measurig the ed-to-ed delay. B. Network Model ad Performace Cosider the problem of aalyzig the E2E delay over the paths from a ode source S to a ode destiatio T i a complete IoT etwork. The followig Fig.1 shows a Iteret of Thigs Network model. 339 P a g e

3 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Fig. 2. Evolutio of Packet Trasmissio Delay vs Packet Number. Fig. 1. Iteret of Thigs Network model. Assume that the sigal processig delay ode, ad Radio propagatio delay ( r) ( s) D, i the IoT D are equal to 0. Suppose Source S begis to trasmit the first packet at D( t 0) D0 delay over a path with IoT odes. This packet is received by ode T at D0 D, where D is the trasmissio delay of a packet. The packet is re-trasmitted to the destiatio S across IoT odes, while he ext packet is trasmitted o a same path. With IoT odes, the first packet P 1 reaches destiatio ode T at: ( 1) D ( t) (4) If p is the umber of packets, the last packet set to: ( p 1) D ( t) (5) The last packet arrives at (which correspods to the ed of the trasfer): ( p 1) D ( 1) D (6) Either agai, D ( t )( p N ) (7) By posig D ( t) L / p R, where p ad R are the umber of packets ad data rate respectively, the crossig delay of the etwork D is obtaied as : D ( L / pr)( p N) (8) Or D ( L / R)(1 N / p) (9) There however, this formula does ot cosider the protocol data (H), Which should be added to each packet, hece: T p L ph N ( )(1 ) (10) R p The curves give i Fig.1graphically illustrates the theoretical result with the followig hypothesis: L = 1500 bytes, N = 5 The packet trasmissio delay icreases sigificatly versus of packet umber. The values are expressed depedig o the message switchig ( p 1 ad 0 ) that is a etwork switchig techique i which data is routed i its etirety from the source S to the destiatio T. If p 1, 0 Message Switchig if p 1, 0 Circuit Switchig Fig.2 compares the performace accordig to a header: ATM (5 bytes), IPV4 (20 bytes), ad IPV6 (40 bytes). The trasmissio delay, i the etwork, is eve lower tha is small. This leads to search for routes that miimize the umber of odes crossed (routig algorithms) ad to icrease the etwork (icrease the probability of fidig a more direct route). It should be oted that the ifluece of the service header size is ot egligible. IV. EXPERIMENTAL AND SIMULATION SETUP I this practical applicatio, the topology showed i Fig. 1 is well-respected. This paper studies the E2ED of a IoT wireless etwork, the system is cofigured as a sigle source S ode seds packets to sigle destiatio T ode across several IoT odes. The IoT Network system cosists of two parts, related hardware ad maagemet software. The system hardware is divided ito o source ode, wireless trasmissio IoT odes ad destiatio ode. The software adopts a cetralized cotrol maagemet model, providig users basic iformatio maagemet for real-time moitorig, 340 P a g e

4 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, TABLE I. SIMULATION PARAMETERS TABLE II. END TO END DELAY RESULT OF MULTI-HOP PATHS Critical parameters Value Packet Payload [bytes] Processig time[ms] 20 Iterface speed [kbps] 2400,38400, Hops 1-9 ACK The SuSet E20c is a device used to measure E2E delay which provides a full trasmissio testig accordig to [21]. It ca also verify Datacom circuits by moitorig the received iformatio, cotrol leads, ad physical layer results. The simulatio results were developed usig Matlab software. Data trasfer rate ad iterface speed of each IoT odes are same as IoT odes wireless commuicatio module. If more IoT odes are used i E2E delay path it will icrease ad it performace ca improved by reducig the packets size as i [22]. Table I gives some simulatio parameters used for the aalysis of E2E listig coditios selected. off V. RESULTS AND DISCUSSION This sectio describes the experimets ad simulatios results. The preseted results illustrate how E2E delay (betwee S ad T ) varies depedig o the PP for several hops ad UMS (100 Bytes ad 1500 Bytes) of wireless edges i wireless commuicatio for IoT, the compare the simulatio result betwee Etheret TCP/IP ad UDP/IP as iterface speed usig fixed values of PP of multi-hop wireless IoT etworks. Fig.3 reveals the E2E delay measuremets as a fuctio of hops cout per static path for differet sizes of data without ay headers. It also shows the multi hop trasmissio from a source to destiatio through IoT odes. PP bytes Hops For tree, six ad ie hops trasmissio, the average E2ED is aroud 420 ms, 831ms, ad 1241 ms for the maximum payload offered (PP=1500 bytes) respectively, while 178 ms,347 ms, ad 516 ms respectively for PP=100 bytes. It is observed that the respective E2ED were liearly icreased with icreasig hops cout or packet payload. Table II below summarizes some of the simulatio results. Addig oe more hop i trasmissio path icreases the E2E delay by %, % ad % for 100 bytes, 800 bytes ad 1500 bytes respectively. Cosequetly, each of those hops itroduces some delay accordig to a payload size. Fig.4 illustrates the results of idirect trasmissios through IoT odes over 9 hops for differet packet payload size ad give details of how E2E delay varies i terms of differet iterface speed (2400kbps up to kbps) of ie hops. Results idicated i Fig.4 iterface speed has a direct ad sigificat effects o E2ED. The PP=0 bytes i Fig.4 meas that data size is zero because the packet is oly ackowledgig data; it is ot trasmittig ay data. Packets with a ACK flag ad 0 size ca be TCP keep alive packets. There are other circumstaces i which a system will sed TCP packets with zero legth. The Table 3 below represets some simulatios results of E2E delay usig the baud rate [kbps] for the serial (COM) iterface (three differet payload sizes for a path with 9 hops). Fig. 3. Ed to Ed Delay vs Hop Cout Per Static Path. Fig. 4. Ed to Ed Delay vs Iterface Speed. 341 P a g e

5 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, PP bytes TABLE III. E2E DELAY RESULTS OF CRITICAL INTERFACE SPEED Iterface speed Fig. 5. Ed to Ed Delay vs Hop Cout Per Static Path usig ETH TCP/IP ad ETH UDP/IP. From this table it ca be see that the more the iterface speed icrease, the more there is improvemet of E2E delay. Fig. 5 shows experimetal results of the compariso betwee Etheret TCP/IP ad UDP/IP as iterface speed results for PP=500 bytes. Fig.5 illustrates that the UDP is speedily tha TCP. The reaso is because there is o form of flow cotrol or error correctio or its abset ackowledge packet (ACK) that allows a cotiuous packet flow, istead of TCP that ackowledges a determied packets. Whe usig UDP, packets are just set to the recipiet. The seder cotiues trasmittig the ext packets (without waitig that the recipiet received of the previous packet) If the IoT destiatio misses a few UDP packets, they are lost. The seder will ot resed them. Losig all this overhead meas the IoT odes ca commuicate more speedily. Fig. 6 shows simulatio result of the compariso betwee Etheret TCP/IP ad UDP/IP as iterface speed usig two values of PP (500 bytes ad 1500 bytes). Table 4 lists the compariso of the average delay from simulatio ad estimatio results usig Etheret iterface speed. It ca also be further cocluded that the values developed performs well uder differet coditios. TCP/IP is a suite of protocols used by IoT odes to commuicate over the Iteret. UDP/IP is used by applicatios to deliver a speedily stream of iformatio by doig away with error-checkig. I this paper, the aalysis of E2E packet delay for iteret of thigs i wireless commuicatios was developed ad illustrated by both experimetal ad simulatios results. This aalysis, compared to the aalysis results, gives more a simplistic ad quickly overview for improvig the E2E delay i IoT etwork performace as i [17]. Cosider the liks from ode 1 to ode 10, keepig the same assumptios of [12]. For 2 Mbit/s liks ad costat packet legths of 400 bytes, the compariso betwee the E2EPD distributio calculatio method give by [12] ad the proposed method clearly shows the efficiecy ad accuracy of the results of E2EPD obtaied by the proposed method as i Fig.7. TABLE IV. PP (bytes) COMPARISON OF E2E DELAY USING TCP/IP AND UDP/IP 4 Hops 8 Hops TCP/IP UDP/IP TCP/IP UDP/IP Fig. 6. Compariso Ed to Ed Delay vs Hop Cout Per Static Path (PP=500 Bytes ad 1500bytes). Fig. 7. Compariso betwee the E2EPD Distributio Calculatio Method ad the Proposed Method.(PP=400 bytes ). 342 P a g e

6 (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, It was also observed (i Fig.7 with zoomed curves) that the respective E2EPD distributio calculatio method does ot icrease liearly with icreasig hops cout or packet payload while the E2EPD of the proposed method icrease i straight lie. The simple ad the efficiet proposed method for aalyzig E2ED gives a very accurate ad robust results. VI. CONCLUSIONS The authors have performed both a experimetal ad theoretical aalysis of the Ed to Ed delay which is iflueced by critical parameter. The simulatio, measuremet ad estimatio results were show the impacts of payload size, hops cout ad iterface speed o E2E delay performace. The results showed that this estimator provides good estimates of payload packets, Ed to ed delay, ad jitter gave a key isight ito the QoS provisioig for multi-hop wireless etworks. Etheret UDP/IP is exploited whe a speed is requested ad error correctio is ot eedful. The settig parameters discussed i this paper gives a rapid ad easy idea of the E2E delay improvemet i the IoT etwork. The E2EPD for arrowbad Iteret of Thigs i Wireless Commuicatios odes should be aalyzed ad miimized fidig ew techiques ad methods which will be the future works. ACKNOWLEDGMENT This work was partially supported by the SNRT (laboratory of regioal service) Morocco. REFERENCES [1] S.-N. Yeug ad J. Lehoczky, Ed-to-ed delay aalysis for real-time etworks, i Proc. IEEE RTSS, Lodo, U.K., Dec. 2001, pp [2] El.M..AR-REYOUCHII, K. Ghoumid, K. Ameziae, ad O. El Mrabet, The Improvemet of Ed to Ed Delays i Network Maagemet System Usig Network Codig, Iteratioal Joural of Computer Networks & Commuicatios (IJCNC),vol.5, 6 (Nov. 2013), : DOI: /ijcc [3] Nasim Abbas; Fegqi Yu, Performace aalysis of ed-to-ed delay ad reliability for liear wireless multimedia sesor etworks, IEEE 3rd Iformatio Techology ad Mechatroics Egieerig Coferece (ITOEC), 3-5 Oct [4] R. A. Berry ad R. Gallager, Commuicatio over fadig chaels with delay costraits, IEEE Tras. Iform. Theory, vol. 48, May 2002, pp [5] El..Ar-Reyouchi, K. Ghoumid, K.Ameziae, O. El Mrabet, Performace Aalysis of Roud Trip Time i Narrowbad RF Networks For Remote Wireless Commuicatios, Iteratioal Joural of Computer Sciece & Iformatio Techology (IJCSIT),vol.5, 5,October 2013,pp DOI: /ijcsit [6] L.Zhao ; W. Su ; Y. Shi ; J. Liu, Optimal Placemet of Cloudlets for Access Delay Miimizatio i SDN-Based Iteret of Thigs Networks, IEEE Iteret of Thigs Joural,vol.5,..2(2018), DOI: /JIOT [7] El.Ar-reyouchi,M.Hammouti,I. Maslouhi, K.Ghoumid The iteret of thigs: Network delay improvemet usig etwork codig, ACM,ICC,Proceedigs of the Secod Iteratioal Coferece o Iteret of thigs, Data ad Cloud Computig, Cambridge, Uited Kigdom,,March 22-23, DOI: / [8] Y. Che, N. Philip, R. Istepaia, ad I. Darwazeh, Ed-to-ed delay distributios i wireless tele-ultrasoography medical systems, i Global Telecommuicatios Coferece (GLOBECOM 2013), 2013 IEEE, [9] El. Miloud Ar Reyouchi, K.Ghoumid, K. Ameziae, O. El Mrabet, S.Mekaoui, Performace Aalysis of Roud Trip Delay Time i Practical Wireless Network for Telemaagemet, World Academy of Sciece, Egieerig ad Techology Iteratioal Joural of Electroics ad Commuicatio Egieerig,vol7,.11( 2013) scholar.waset.org/1999.5/ [10] E.G. Davis, A. Calveras ad I. Demirkol, "Improvig packet delivery performace of publish/subscribe protocols i wireless sesor etworks, Sesors, 2013,vol. 13, o. 1, pp [11] Maslouhi I., Ghoumid K., Zaidoui J., Bezekri W., Ar-reyouchi E.M., Lichioui A. (2016), Network Higher Security of Itelliget Networks Platforms i Telecommuicatios Areas,. I: Proceedigs of the Mediterraea Coferece o Iformatio & Commuicatio Techologies Lecture Notes i Electrical Egieerig, vol 380. Spriger. [12] O. Osterbo, Models for calculatig ed-to-ed delay i packet etworks, ITC-18, Berli, Germay, August 31-September 5, 2003, pp [13] Qiag Ye,; Weihua Zhuag, Xu Li, Jaya Rao, Ed-to-Ed Delay Modelig for Embedded VNF Chais i 5G Core Networks, IEEE Iteret of Thigs Joural,2018,DOI: /JIOT [14] A.Asesio,A. Marco, R. Blasco ad R. Casas, "Protocol ad Architecture to Brig Thigs ito Iteret of Thigs, Iteratioal Joural of Distributed Sesor Networks, [15] A. Al-Fuqaha, M. Guizai, M. Mohammadi, M. Aledhari, ad M. Ayyash, Iteret of thigs: A survey o eablig techologies, protocols, ad applicatios, IEEE Commuicatios Surveys Tutorials, vol. 17, o. 4, pp , [16] El Miloud Ar Reyouchi, Optimisatio des performaces des réseaux de commuicatios sas fil : Performaces des réseaux de commuicatios sas fil pour la télégestio des statios de la Télédiffusio TV/FM, Paf,,2017, ISBN [17] R. Stewart, Ed-to-ed Delay aalysis for Small/Medium Scale IP etworks, PhD Thesis, Uiversity of Lodo [18] M. Xi ad M. Haeggi, Towards a ed-to-ed delay aalysis of wireless multihop etworks, Ad Hoc Netw., vol. 7, o. 5, pp , Jul [19] M.Shorfuzzama, M.Masud ad Md. M. Rahma,"Characterizig Edto-Ed Delay Performace of Radomized TCP Usig a Aalytical Model, Iteratioal Joural of Advaced Computer Sciece ad Applicatios(IJACSA), Vol.7,.3, [20] D. Bertsekas ad R. Gallager, Data Networks. Pretice-Hall, [21] Y.Chatei,M.Hammouti,.E.M. Ar Reyouchi, ad K. Ghoumid, Dowlik ad Uplik Message Size Impact o Roud Trip Time Metric i Multi-Hop Wireless Mesh Networks, vol.8, 2017/03/01- DOi /IJACSA [22] G. Hasegawa, T. Tomioka, K. Tada, ad M. Murata, Simulatio studies o router buffer sizig for short-lived ad pacig TCP flows,, Computer Commuicatios, vol. 31, o. 16, pp , P a g e

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Enhancing Cloud Computing Scheduling based on Queuing Models

Enhancing Cloud Computing Scheduling based on Queuing Models Ehacig Cloud Computig Schedulig based o Queuig Models Mohamed Eisa Computer Sciece Departmet, Port Said Uiversity, 42526 Port Said, Egypt E. I. Esedimy Computer Sciece Departmet, Masoura Uiversity, Masoura,

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

An Estimation of Distribution Algorithm for solving the Knapsack problem

An Estimation of Distribution Algorithm for solving the Knapsack problem Vol.4,No.5, 214 Published olie: May 25, 214 DOI: 1.7321/jscse.v4.5.1 A Estimatio of Distributio Algorithm for solvig the Kapsack problem 1 Ricardo Pérez, 2 S. Jös, 3 Arturo Herádez, 4 Carlos A. Ochoa *1,

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Range Free Localization Schemes For Wireless Sensor Networks

Range Free Localization Schemes For Wireless Sensor Networks Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

OPC Server ECL Comfort 210/310 OPC Server

OPC Server ECL Comfort 210/310 OPC Server OPC Server Descriptio j l j o j l k j l j Modbus-RS485 k Etheret or Iteret l Modbus-TCP ECL Cofort cotroller Heat eter o SCADA server The Dafoss is a OPC-copliat server that serves data to OPC cliets.

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

A QoS balancing model for Mobile Ad hoc Networks

A QoS balancing model for Mobile Ad hoc Networks A QoS balacig model for Mobile Ad hoc Networks HENG LUO, DAVID. I. LAURENSON, AI-HUANG GUO, JIANPING CHEN, PEIDE YANG, HUA JIANG Suzhou key laboratory of mobile etworkig ad applied techologies SuZhou Uiversity

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

ANALYSIS OF RATIONAL FUNCTION DEPENDENCY TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES

ANALYSIS OF RATIONAL FUNCTION DEPENDENCY TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES ANALSIS OF RATIONAL FUNCTION DEPENDENC TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES M. Hosseii, Departmet of Geomatics Egieerig, Faculty of

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

TELETERM M2 Series Programmable RTU s

TELETERM M2 Series Programmable RTU s Model C6xC ad C6xC Teleterm MR Radio RTU s DATASHEET Cofigurable Iputs ad Outputs 868MHz or 900MHz radio port 0/00 Etheret port o C6Cx ISaGRAF 6 Programmable microsd Card Loggig Low power operatio Two

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Fully Parallel Window Decoder Architecture for Spatially-Coupled LDPC Codes

Fully Parallel Window Decoder Architecture for Spatially-Coupled LDPC Codes Fully Parallel Widow Decoder Architecture for Spatially-Coupled LDPC Codes Najeeb Ul Hassa, Marti Schlüter, ad Gerhard P. Fettweis Vodafoe Chair Mobile Commuicatios Systems, Dresde Uiversity of Techology

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information