An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives
|
|
- Gavin Hoover
- 5 years ago
- Views:
Transcription
1 Wreless Sensor Network, 2009, 1, do: /wsn Publshed Onlne November 2009 ( An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton wth Multple Obectves Abstract Lqang ZHAO, Le GUO, L CONG, Haln ZHANG State Key Laboratory of Integrated Servces Networks, Xdan Unversty, X an, Chna Emal: lqzhao@mal.xdan.edu.cn Receved March 23, 2009; revsed June 2, 2009; accepted June 10, 2009 In s, energy conservaton s the prmary goal, whle throughput and delay are less mportant. Ths results n a tradeoff between performance (e.g., throughput, delay, tter, and packet-loss-rate) and energy consumpton. In ths paper, the problem of energy-effcent MAC protocols n s s modeled as a game-theoretc constrant optmzaton wth multple obectves. After ntroducng ncompletely cooperatve game theory, based on the estmated game state (e.g., the number of competng nodes), each node ndependently mplements the optmal equlbrum strategy under the gven constrants (e.g., the used energy and QoS requrements). Moreover, a smplfed game-theoretc constrant optmzaton scheme () s presented n ths paper, whch s easy to be mplemented n current s. Smulaton results show that can ncrease system performance whle stll mantanng reasonable energy consumpton. Keywords: Wreless Sensor Network, MAC, Energy Effcency, Game Theory, Constrant Optmzaton 1. Introducton As an emergng technology, Wreless Sensor Networks (s) have a wde range of potental applcatons ncludng envronment montorng, smart spaces, medcal systems and robotc exploraton. Performance analyss and optmzaton of s, especally ts Medum Access Control (MAC) protocols, have attracted much research nterests. Tradtonal MAC protocols for wreless ad hoc networks are desgned to mze throughput and mnmze delay. As sensor nodes are generally battery-operated, to desgn a good MAC protocol for s, the frst attrbute that has to be consdered s energy consumpton [1]. Other mportant attrbutes (such as throughput and delay) are generally the prmary concerns n tradtonal wreless ad hoc networks, but n s they are secondary. IEEE Dstrbuted Coordnaton Functon (DCF), the basc MAC protocol n Wreless LANs (WLANs), s based on Carrer Sense Multple Access wth Collson Avodance (), one of typcal contenton-based MAC protocols. uses an acknowledgment (ACK) mechansm for verfyng successful transmssons and optonally, an RTS/CTS handshakng mechansm for decreasng collsons overhead. In both cases an exponental backoff mechansm s used. Before transmttng, a node generates a random slotted backoff nterval, and the number of the backoff slots s unformly chosen n the range [0, CW-1]. At the frst transmsson attempt, the contenton wndow, CW, s set equal to a value CW mn called the mnmum contenton wndow. After each unsuccessful transmsson, CW s doubled up to the mum value CW. Once CW reaches CW, t wll reman at the value untl the packet s transmtted successfully or the retransmsson tme reaches retry lmt. Whle the lmt s reached, retransmsson attempts wll cease and the packet wll be dscarded. Currently, has been the de facto MAC standard for wreless ad hoc networks, wdely used n almost all of the testbeds. Moreover, low-power, low-rate Wreless PANs (WPANs) such as IEEE utlzes too. However, the energy consumpton usng s very hgh when nodes are n an dle mode. It s manly called problem of dle lstenng. -based s explctly desgned for s to solve ths problem [2]. The basc dea of s that used energy s traded for throughput and delay by ntroducng an actve/sleep duty perod. Some researchers are attemptng to mprove the performance of [3 6]. To handle load varatons n tme and locaton, ntroduces an adaptve duty cycle by dynamcally endng ts actve part. Ths reduces Copyrght 2009 ScRes.
2 L. Q. ZHAO ET AL. 359 the amount of energy wasted on dle lstenng, n whch nodes wat for potentally ncomng messages, whle stll mantanng a reasonable throughput [7]. Recently, game theory [8] becomes a very good tool to analyze and mprove the performance of contenton-based protocols. Game-theoretc approaches were proposed to solve the problem of securty, query routng, and power control respectvely n dstrbuted sensor networks [9 12]. When usng game theory n s rather than mathematcs or economcs, much attenton should be pad to the context of s. For example, explct cooperaton among nodes s clearly mpractcal n s as t causes addtonal energy and bandwdth consumpton. We presented a novel concept of ncompletely cooperatve game theory to mprove the performance of MAC protocols n s wthout any explct cooperaton among nodes [13 14]. In ths paper, the prelmnary results presented n [13 14] wll be substantally extended. The problem of energy-effcent MAC protocols for s s modeled as game-theoretc constrant optmzaton wth multple obectves, e.g., energy consumpton and QoS metrcs. 2. Game-Theoretc Constrant Optmzaton A node starts a game process when a new packet arrves at the node s transmsson buffer and ends t when the packet s moved out of the buffer (.e., transmtted successfully or dscarded). Each game process ncludes many tme slots and each tme slot corresponds to one game state. In each tme slot, each player (.e., node) estmates the current game state based on ts hstory. After estmatng the game state, the player adusts ts own equlbrum strategy by tunng ts local contenton parameters. Then all the nodes take actons smultaneously,.e., transmttng, lstenng, or sleepng. Although the player does not know whch acton the other nodes (.e., ts opponents) are takng now, t can predct ts opponents actons accordng to ts hstory. In the game, each player takes a dstrbuted approach of detectng and estmatng the current game state, and tunng ts local contenton parameters to the estmated game state. In economcs, normally, the optmal target of the player s to mum ts own profts. However, n s, the target of each player s to mum the system performance under certan lmts, e.g., energy consumpton and QoS requrements. In the game for s, the utlty functon of the player (.e., node ) s represented by μ μ s, s. The parameters of the vector, μ, correspond to ts energy consumpton and QoS requrements, e.g., bandwdth, delay, tter, and packet-loss-rate. Obvously, there are some lmts on ts utlty functon, called μ, e.g., the mum energy consumpton, the tolerant mnmum bandwdth, mum delay, tter, or packet-loss-rate. If we do not consder ts opponents, the strategy of the player, s, ncludes three possble actons: transmttng, lstenng or sleepng. The strategy profle of ts opponents (.e., all the other n neghbors) s defned as s s1, s2,..., s 1, s 1,..., sn. Smlarly, we can get the utlty functon of ts opponents that μ s, s. Also, there are some lmts on the above utlty functon, called μ. In many game-theoretc models, a player s a node contendng for the channel. As there may be many nodes n a and each node may contend for the channel repeatedly, a very complcated method s needed to determne the strategy. Hence, n the game, a player s not always a node. If we analyze the equlbrum strategy of node, Player 1 s node, and Player 2 (.e., ts opponents) s all the other n-1 nodes. In fact, t s possble for Player 1 to estmate Player 2 s state, and dffcult for Player 1 to estmate the states of each node n Player 2. In a formal descrpton, we are lookng for s s,, arg mn μ μ s,,, arg mn μ μ s, Obvously, Player 1 adusts ts strategy s not to obtan ts own optmal utlty ( ), but to help Player 2 get the μ optmal utlty ( μ ); vce verse. Hence, t ndcates that all the nodes play the cooperatve game based on the estmated game states. On the other hand, the two players help each other get the optmal utlty under ther own lmts respectvely. It ndcates that all the nodes play the constraned game. As Player 2 ncludes all the other n-1 competng nodes except Player 1, collsons may happen among the n-1 competng nodes even not consderng Player 1. So Player 2 ncludes four possble actons: successful transmsson, faled transmsson, lstenng or sleepng, even f we do not consder Player 1. Table 1 s the strategy table wth 2 players (.e., n nodes). Wth regard to the payoff of Play 1 n a gven tme slot, there are four possbltes when consderng the two players. Frstly, Player 1 sleeps wth the probablty of w, whose payoff s c w,, where corresponds to the -th parameter of the utlty functon. Secondly, Player 1 lstens to the channel wth the probablty of 1w1, whose payoff s c. Here, s the condtonal transmsson probablty of Player 1. Thrdly, Player 1 fals to transmt ts packets due to the collson between the two players wth the probablty of (1) Copyrght 2009 ScRes.
3 360 L. Q. ZHAO ET AL. Table 1. Strategy model wth n+1 nodes. Player 1 (node ) Transmttng Lstenng Sleepng Successful Transmsson c, c, c s c, Player 2/Opponent (all the other n nodes) Faled Lstenng Transmsson f c f c f c s, c c, c c, c, w c f w c Sleepng c f, c w c, c w c, c w w 1w 1w w, whose payoff s c. Here w f, and are the sleepng probablty and the condtonal transmsson probablty of Player 2 respectvely. Fnally, Player 1 transmts successfully wth the probablty of 1w 1w1, whose payoff s c. s, Wth regard to the payoff of Player 2 n a gven tme slot, there are four possbltes too after consderng the two players. Frstly, Player 2 sleeps wth the probablty of w, whose payoff s c. Secondly, Player 2 lstens to w, the channel wth the probablty of 1w1, whose payoff s c. Thrdly, Player 2 fals to transmt ts pack-, ets due to the collsons between the two players or among the n-1 nodes wthn Player 2 wth the probablty of 1w 1w p1w1w, whose payoff s c. Fnally, Player 2 transmts successfully f, wth the probablty of 1 w 1 p1w1, whose payoff s c. Here, s, p s the condtonal collson probablty of Player 2, whch s the functon of the probablty [14]. Hence, the optmal strateges of the two players under the gven constrants are expressed as w c p w c w p w w c wc s s, s, f, w, arg mn 1 μ μ w,, 1w 1w 1 c 1 c 1w w c wc s,, f, w, arg mn 1 μ μ w,, (2) In general, the contenton-based MAC protocol n s s modelled as a game-theoretc constrant optmzaton wth multple obectves. Based on the estmated game state, each node acheves the global optma by adustng ts transmsson and sleepng probablty smultaneously. 3. A Smplfed Game-Theoretc Constrant Optmzaton Scheme for s Unfortunately, the above problem has been proven to be NP-hard [15], so we cannot hope an algorthm that can fnd the theoretcal optmum and runs n polynomal tme. Hence, we present a smplfed game-theoretc constrant optmzaton scheme () n ths secton. In, we optmze the performance (e.g., the system throughput, delay, tter, and packet-loss-rate) under the lmted energy consumpton. In, tme s dvded nto super-frames and every super-frame has two parts: an actve part and a sleepng part. Durng the actve part, each node contends for the channel n the ncompletely cooperatve game. Durng the sleepng part, each node turns off ts rado to preserve energy. The tme length of the actve and sleepng part s adusted accordng to the estmated game state too. In the game, frstly, a node estmates the current state of the game, e.g., the number of ts opponents n-1. When the node s transmttng ts frame, f any other node transmts at the same tme slot, the frame wll be collded. So the frame collson probablty of the node p s obtaned as follows: n 1 p 1 1 (3) where τ s the frame transmsson probablty of the node. If solvng the above equaton wth respect to n, we obtan: log 1 p n 1 log 1 (4) Copyrght 2009 ScRes.
4 Secondly, the node adusts ts e qulbrum strategy, e.g., the mnmum contenton wndow (CW mn), to the est- number of ts opponents ( ˆn ), as follows mated [14]: CW ˆ mn n rand 7,8 where rand (x, y) returns a rando m value between x and y, and [z] returns the floor functon of z. However, Vercauteren et al [16] showed that (4) s accurate only under saturated condtons (.e., each node always has a packet watng for transmsson), and far from beng accurate under unsaturated condtons f not CW L. Q. ZHAO ET AL. 361 (5) fltered, e.g., for burst traffc. Banch and Tnnrello [17] presented two run-tme estmaton mechansms,.e., auto regressve movng average (ARMA) and Kalman Flters. The two mechansms are very accurate even n unsaturated condtons. However, they are too complex to mplement n sensor nodes. We provded an auto degressve backoff mechansm to mplement the game n current WLANs [14], whch can be mplemented easly n sensor nodes. In the actve part, after transmttng or dscardng a packet,.e., at the end of each game process, to mantan the current contenton level, the player adusts CW mn as CWmn, CW / 2 The prevous packet s transmtted successfully mn CW The prevous packet s dscarded (6) The parameter CW mn, CW, and CW at the rght of (6) are the values of the nomnal CW mn, CW and the fnal contenton wndow used n the prevous game process respectvely. The parameter CW mn at the left of (6) s used n the current game process to transmt a new packet. In, a node starts a contenton process always wth the nomnal CW mn, e.g., n IEEE b CW mn =32. So has one man drawback: n a hgh load network the ncrease of the value of CW s obtaned at the cost of contnuous collson. In, after transmttng a packet, no matter t s transmtted successfully or not, the player does not start the next game process wth the nomnal CW mn, as shown n Fgure 1. Gven that the prevous packet s transmtted successfully, the fnal value of CW s the optmal one. The best strategy for the player s to set CW mn =CW/2, to make use of the channel effectvely. On the contrary, gven that the prevous packet s dscarded, the best strategy for the player s to set CW mn =CW, to decrease collsons. Fgure 1. Auto degressve backoff mechansm. Copyrght 2009 ScRes.
5 362 L. Q. ZHAO ET AL. Obvously, compared wth the game, the most attrac- ergy consumpton. tve feature of s that t s smple to mplement. Moreover, at the end of the actve part, the node Frstly, no estmaton mechansm s needed. Secondly, t changes the length of the actve part (T actve ) and the next s not needed to compute the optmal value of CW mn. perod (T next ), accordng to the estmated game state, as That s to say, would not cause any more en- follows: next current current current current Tactve Tactve, Tactve, Tnext 0. 5 T nˆ n, Tactve / T 0.5 next current current current current T mn, ˆ actve Tactve Tactve,mn Tnext 2 T nn, Tactve / T 0.1 next current next current Tactve Tactve Tsleep Tsleep else (7) where (x, y) and mn(x, y) return the larger value and the smaller value between x and y respectvely. The pa- that n the last current rameters T actve and T current are the tme length of the actve part and the perod n the current perod. T actve, and T actve, mn, are the m axmum and mnmum length of the actve part. T next actve and T next are used n the next perod. α s a predetermned nteger, n s the last estmated number of competng n odes, and ˆn s the current estmated number of competng nodes. At the end of the current actve part, f the estmated number of competng nodes s larger than actve part, t ndcates many nodes stll have packets to send. So the tme length of the next actve part equals to that of the current actve part plus α but not longer than the mum actve part sze. The tme length of the next perod s half that of the current perod; thereby the nodes can wake up more frequently to reduce the delay of communcaton. On the other hand, f the estmated number of competng nodes s smaller than that n the last perod, the tme length of the next actve part equals to that of the current actve part mnus α but not shorter than the mnmum actve part sze. The tme length of the next perod s twce that of the current perod, so the nodes need not wake up frequently. 4. Smulaton Results To evaluate the proposed protocol, the fol- smulatons are made n an deal channel. The lowng values of the parameters used to obtan numercal results for smulatons are specfed n IEEE b protocol, as shown n Table 2. Table 2. Smulaton parameters. channel rate aslot Tme retry lmt MAC header PHY header 1Mb/s 20μs 7 144μs 192μs ACK SIFS DIFS 112μs 10μs 50μs T ransmt Recevng Lsten Power Sleepng Power Power CW mn Power 27.45mW 13.5mW 13.5mW 0.015mW CW The packets wll be dscarded only due to the retransmsson tme reaches the retry lmt, and do not consder the delay lmt. We set a st ar topology wth one coordnator and 50 devces, where each devce generates n ew fxed sze packets under a Posson process and transmt them to the coordnator. The packet arrval rate s ntally set to be lower than the saturaton case, and t s subsequently ncreased so that, at the end of the smulaton tme, all nodes are almost n saturaton condtons [18]. s consdered as the worst case: t has no energy savng features at all. The rado of each node does not go nto the sleep mode. It s ether n the lstenng/recevng mode or transmttng mode. s consdered as the basc contenton-based MAC protocol n s. It ncludes the perodc actve and sleepng tme to acheve energy savngs. For smplcty, the length of the actve and sleepng part are fxed at 500ms n the followng smulatons. Compared wth, can adapt to the load varatons n tme and locaton, and can end the actve part accordng to the traffc loads. Fgure 2 shows that the four protocols have almost the same system throughput under lght traffc loads, and under heavy traffc loads, the system throughput of s a lttle hgher than that of, whch s about 2 tmes that of and a lttle hgher than. put System through Smulaton tme(sec) Fgure 2. System throughput. Copyrght 2009 ScRes.
6 L. Q. ZHAO ET AL. 363 Fgure 3 shows that delay n, and are much lower than that n. Under lght traffc loads, delay n s a lttle larger than that n, whch s due to the perodc actve/ sleepng perod n. Under heavy traffc loads, delay n s lower than that n and, whch s due to the game n. Fgure 4 shows that tter n s much hgher than that n the other 3 protocols. Fgure 5 shows that packet-loss-rate n almost keeps zero, whch s much lower than that n S- MAC and. Meanwhle, packet-loss-rate n G- ConOpt s a lttle lower than that n, whch s due to the game n. Fgure 6 shows that the energy consumpton n s near to one half that n, whch s due to the perodc actve/sleepng scheme. Energy consumpton n s a lttle lower than that n under lght traffc loads, for nodes n sleep longer than that n. However, energy consumpton n s larger than that n under heavy traffc loads, snce nodes n sleep shorter than that n. The energy consumpton n s the lowest one n the four protocols, whch s due to the dynamc duty cycle strategy and the game n. As an energy-effcent MAC protocol, consders not only energy consumpton but also energy effcency (.e., the rato of the successfully transmtted bt rate to energy consumpton). Fgure 7 shows that energy effcency n s much hgher than that n and and. As an energy-aware MAC protocol, has hgher energy effcency than under lght traffc loads. However, the advantage of over decreases wth the ncreasng of traffc loads. Under heavy traffc loads, energy effcency n s almost equal to that n. Energy effcency n s always larger than that n and Delay(sec) ec) Jtter(s Smulaton tme(sec) Fgure 3. Delay. 0 Smulaton tme(sec) Fgure 4. Jtter. Packet-loss-rate Energ y co nsumpton(m) Smulaton tme(sec) Fgure 5. Packet-loss-rate. 0 Smulaton tme(sec) Fgure 6. Energy consumpton. Copyrght 2009 ScRes.
7 364 L. Q. ZHAO ET AL. Energy effcency(kb/s/m) Conclusons Smulaton tme(sec) Fgure 7. Energy effcency. In ths paper, frstly, the ncompletely cooperatve game s used to model the MAC protocol of s. Secondly, after consderng the context of s, e.g., the requrements on energy consumpton, the problem of the MAC protocols of s s modeled as a game-theoretc constrant optmzaton problem. Moreover, one smple for- each nodes can acheve ndependently the optmal per- mulaton s presented for the problem. Fnally, a smplfed protocol, s proposed, whch can be easly mplemented n current s. Based on, formance under lmted energy consumpton. The smu- laton results show that s an approprate tool to mprove the performance of s under certan con- strants. In ths paper we only provde a smplfed method to address the sleepng probablty. We are developng an analytcal model to obtan the optmal equlbrum of the sleepng probablty. Acknowledgement: Ths work s supported by the 111 Proect (B08038), State Key Laboratory of Integrated Servces Networks (ISN090105), Program for New Century Excellent Talents n Unversty (NCET ), Natonal Natural Scence Foundaton of Chna (No ), and UK-Chna Scence Brdges: R&D on 4G Wreless Moble Communcatons. 6. References [1] I. F. Akyldz, W. Su, Y. Sankarasubramanam, et al., Wreless sensor networks: a survey, Computer Networks, Vol. 38, No. 4, pp , March [2] W. Ye, J. Hedemann, and D. Estrn, An energy-effcent MAC protocol for wreless sensor networks, INFOCOM, New York, Vol. 3, pp , June [3] T. Dam and K. Langendoen, An adaptve energy- effcent MAC protocol for wreless sensor networks, ACM SenSys, Los Angeles CA, November [4] J. Polastre, J. Hll, and D. Celler, Versatle low power meda access for wreless sensor networks, ACM SenSys, USA, pp , November [5] A. El-Hoyd and J. D. Decotgne, WseMAC: An ultra low power MAC protocol for the downlnk of nfrastructure wreless sensor networks, ISCC, Egypt. pp , June [6] P. Ln, C. Qao, and X. Wang, Medum access control wth dynamc duty cycle for sensor networks, WCNC, Atlanta, Georga, March [7] T. van Dam, K. Langendoen, A adaptve energy-effcent MAC protocol for wreless sensor networks, ACM SenSys, USA, pp , November [8] P. D. Straffn, Game theory and strategy, The Mathematcal Assocaton of Amerca, [9] A. Agah, S. K. Das, and K. A. Basu, Game theory based approach for securty n wreless sensor networks, IPCCC, USA, pp , Aprl [10] R. Kannan, S. Sarang, and S. S. Lyengar, Sensor-centrc energy-constraned relable query routng for wreless sensor networks, Journal of Parallel and Dstrbuted Computng, Vol. 64, No. 7, pp , July [11] S. Sengupta and M. Chatteree, Dstrbuted power control n sensor networks: A game theoretc approach, IWDC, Inda, pp , December [12] X. Zhang, Y. Ca, and H. Zhang, A game-theoretc dynamc power management polcy on wreless sensor network, ICCT, Chna, pp. 1 4, November [ 13] L. Zhao, L. Guo, K. Yang, and H. Zhang, An Energyeffcent MAC Protocol for s: Game-theoretc constrant optmzaton, IEEE Internatonal Conference on Communcaton Systems, Chna, pp , November [14] L. Zhao, L. Guo, J. Zhang, and H. Zhang, A Gametheoretc MAC protocol for wreless sensor network, Journal of IET Communcatons, Vol. 3, No. 8, pp , August [15] M. S. Garey and D. S. Johnson, Computers and Intractablty: Gude to the theory of NP-completeness, W. H. Freeman, New York, [16] T. Vercauteren, A. L. Toledo, and X. Wang, Batch and sequental bayesan estmators of the number of actve termnals n an IEEE network, IEEE Trans. on Sgnal Processng, Vol. 55, No. 2, pp , January [17] G. Banch and I. Tnnrello, Kalman flter estmaton of the number of competng termnals n an IEEE network, IEEE INFOCOM, Vol. 2, San Francsco, pp , March [18] G. Banch, Performance Analyss of the IEEE dstrbuted coordnaton functon, IEEE JSAC, Vol. 18, No. 3, pp , March Copyrght 2009 ScRes.
Simulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationVoice capacity of IEEE b WLANs
Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationInterclass Collision Protection for IEEE e Wireless LANs
Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based
More informationA Game Theory based Contention Window Adjustment for IEEE under Heavy Load
93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationPerformance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks
RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationTHE IEEE standard for wireless local area networks
IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationA Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks
11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationIEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS
ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationQoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs
Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs
More informationA Fair MAC Algorithm with Dynamic Priority for e WLANs
29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationAnalysis of QoS in WLAN
Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE
More informationDynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationWITH rapid improvements of wireless technologies,
JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More information136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE
136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationAn Analytical Model for IEEE Point-to-Point Link
An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted
More informationUSER CLASS BASED QoS DIFFERENTIATION IN e WLAN
USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationAggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks
Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong
More informationEfficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks
Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationUBICC Publishers 2008 Ubiquitous Computing and Communication Journal
UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman
More informationAdaptive Network Resource Management in IEEE Wireless Random Access MAC
Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationAPPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET
APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty
More informationExtension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North
More informationTHere are increasing interests and use of mobile ad hoc
1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease
More informationDECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks
da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process
More informationWIRELESS communication technology has gained widespread
616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor
More informationAdaptive Power-Aware Prefetch in Wireless Networks
Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do
More informationPerformance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student
erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student
More informationAPPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET
APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationPerformance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect
Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationPerformance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling
Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationQuantifying Performance Models
Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from
More informationContention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks*
Wreless Sensor Network, 2010, 2, 528-537 do:10.4236/wsn.2010.27065 Publshed Onlne July 2010 (http://www.scrp.org/journal/wsn) Contenton-Based Beaconless Real-Tme Routng Protocol for Wreless Sensor Networks*
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu
More informationTechnical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks
www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul
More informationResearch Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features
Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationRe-routing Instability in IEEE Multi-hop Ad-hoc Networks *
Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP
More informationCost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network
Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal
More informationA Free-Collision MAC Proposal for Networks
12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal
More informationPricing Network Resources for Adaptive Applications in a Differentiated Services Network
IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationSome Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.
Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,
More informationEFT: a high throughput routing metric for IEEE s wireless mesh networks
Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationA Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks
A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More informationAn Optimal Bandwidth Allocation and Data Droppage Scheme for Differentiated Services in a Wireless Network
Purdue Unversty Purdue e-pubs ECE Techncal Reports Electrcal and Computer Engneerng 3--7 An Optmal Bandwdth Allocaton and Data Droppage Scheme for Dfferentated Servces n a Wreless Network Waseem Shekh
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationImpact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes
UBICOMM 21 : The Fourth Internatonal Conference on Moble Ubqutous Computng, Systems, Servces and Technologes Impact of the Parameterzaton of IEEE 82.15.4 Medum Access Layer on the Consumpton of ZgBee Sensor
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationPERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1
PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty
More informationwith `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract
HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the
More informationTransmit Power Control Algorithms in IEEE h Based Networks
Transmt Power Control Algorthms n IEEE 82.h Based Networks Andreas J. Könsgen, Zakr Hossan, Carmelta Görg Department of Communcaton Networks Center for Informaton and Communcaton Technology (IKOM) Unversty
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationIJCTA Nov-Dec 2016 Available
Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationLong Lifetime Routing in Unreliable Wireless Sensor Networks
211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar
More informationIP mobility support is becoming very important as the
706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More information