On the Throughput-Delay Trade-off in Georouting Networks

Size: px
Start display at page:

Download "On the Throughput-Delay Trade-off in Georouting Networks"

Transcription

1 22 Proceedigs IEEE INFOCOM O the Throughput-Delay Trade-off i Georoutig Networks Philippe Jacquet Alcatel Lucet Bell Labs Villarceaux, Frace philippe.jacquet@alcatel-lucet.com Salma Malik INRIA Rocquecourt, Frace salma.malik@iria.fr Berard Mas Macquarie Uiversity Sydey, Australia berard.mas@mq.edu.au Aloso Silva UC Berkeley Berkeley, CA, USA asilva@eecs.berkeley.edu Abstract We study the scalig properties of a georoutig scheme i a wireless multi-hop etwork of mobile odes. Our aim is to icrease the etwork capacity quasi liearly with while keepig the average delay bouded. I our model, mobile odes move accordig to a i.i.d. radom walk with velocity v ad trasmit packets to radomly chose destiatios. The average packet delivery delay of our scheme is of order /v ad it achieves the etwork capacity of order. This logloglog shows a practical throughput-delay trade-off, i particular whe compared with the semial result of Gupta ad Kumar which shows etwork capacity of order /log ad egligible delay ad the groudbreakig result of Grossglauser ad Tse which achieves etwork capacity of order but with a average delay of order /v. The foudatio of our improved capacity ad delay trade-off relies o the fact that we use a mobility model that cotais free space motio, a model that we cosider more realistic tha classic browia motios. We cofirm the geerality of our aalytical results usig simulatios uder various iterferece models. I. INTRODUCTION Gupta ad Kumar [7] studied the capacity of wireless etworks cosistig of radomly located odes which are immobile. They showed that if each source ode has a radomly chose destiatio ode, the useful etwork capacity is of order C /log where is the umber of odes ad C is the omial capacity of each ode. However, if the odes are mobile ad follow i.i.d. ergodic motios i a square area, Grossglauser ad Tse [6] showed that the etwork capacity ca rise to O(C by usig the mobility of the odes. Note that i this case, a source ode relays its packet to a radom mobile relay ode which trasmits this packet to its destiatio ode oly whe they come close together, i.e., at a distace of order /. Therefore, the time it takes to deliver a packet to its destiatio would be of order L/v where v is the average speed of the odes ad L is the legth of the fixed square area where odes are deployed. I cotrast, i Gupta ad Kumar s result [7], the packet delivery delay teds to be egligible, although the etwork capacity drops by a factor of log. I this article, we aim to maximize the capacity of mobile etworks while keepig the mea packet delivery delay We recall the followig otatio: (i f( = O(g( meas that there exists a costat c ad a iteger N such that f( cg( for > N. (ii f( = Θ(g( meas that there exists two costats c ad c 2 ad a iteger N such that c g( f( c 2 g( for > N. Gupta & Kumar [7] Network Capacity ( O log Delivery Delay egligible Grossglauser & Tse O( ( O v [6] Our work ( O logloglog O ( v TABLE I: Network Capacity vs. Delivery Delay Trade-off. bouded with icreasig umber of odes. For relayig packets towards their destiatios, mobile odes use our proposed georoutig strategy, called the Costraied Relative Bearig (CRB scheme. We show that, i a radom walk mobility model, this strategy achieves a etwork capacity of order logloglog C with a time to delivery of order L/v. Our mai cotributio is summarized i Table I. Note that i radom walk mobility models, odes have free space motio ad move i straight lies with costat speed. This mobility model is a subclass of the free space motio mobility model. Therefore, we ca also exted our result to mobility models where the average free space distace l is o zero. Cosider a example of a urba area etwork i a fixed square area of legth L with umber of odes = 6, omial badwidth C = kbps ad delay per store-adforward operatio of ms. The average packet delivery delay for Gupta ad Kumar s case would be aroud oe secod but with a etwork capacity of Mbps. I the case of Grossglauser ad Tse, the etwork capacity would icrease to about Gbps but if the straight lie crossig time L/v is about oe hour (e.g., with cars as mobile odes, the time to delivery would be aroud oe moth. However, our model of usig mobility of odes alog with the proposed CRB scheme, to relay packets to their destiatios, would lead to a etwork capacity of Gbps with time to delivery of about oe hour. This article is orgaized as follows. We first summarize some importat related works ad results i Sectio II. We discuss the models of our etwork ad CRB scheme i Sectios III ad IV respectively. The aalysis of capacity ad delay ca be foud i Sectio V ad we cofirm this /2/$3. 22 IEEE 765

2 aalysis usig simulatios i Sectio VI. We also discuss a few extesios of our work i Sectio VII ad cocludig remarks ca be foud i Sectio VIII. II. RELATED WORKS The mai differece betwee the proposed models i the works of Gupta ad Kumar [7] ad Grossglauser ad Tse [6] is that i the former case, odes are static ad packets are trasmitted betwee odes like hot potatoes, while i the latter case, odes are mobile ad relays are allowed to carry buffered packets while they move. Both strategies are based o the followig model: if p is the trasmissio rate of each ode, i.e., the proportio of time each ode is active ad trasmittig, the radius of efficiet trasmissio is give by r L κ p whe approaches ifiity for some costat κ > which depeds o the protocol, iterferece model, etc. I the cotext of [7], the umber of relays a packet has to traverse to reach its destiatio is h = O(/r. Cosequetly, p C must be divided by h to get the useful capacity: p C/h = O(C p. I order to esure coectivity i the etwork, so that every source is able to commuicate with its radomly chose destiatio, p must satisfy the limit p O(/log. This leads to Gupta ad Kumar s maximum capacity of O(C /log with hot potatoes routig. I cotrast, i the cotext of [6], the etwork does ot eed to be coected sice the packets are mostly carried i the buffer of a mobile relay. Therefore there is o limit o p other tha the requiremet that it must be smaller tha some ε < that depeds o the protocol ad some other physical parameters. Thus r is O(/. I Grossglauser ad Tse s model, the source trasmits the packet to the closest mobile relay or keeps it util it fids oe. This mobile relay delivers the packet to the destiatio whe it comes withi rage of the destiatio ode. Such a packet delivery requires a trasmissio phase which also icludes retries ad ackowledgemets so that the packet delivery ca be evetually guarateed. The proposed model of [6] requires a GPS-like positioig system ad the kowledge of the effective rage r. The estimate of r could be achieved via a periodic beacoig from every ode, where each beaco cotais the positio coordiates of the ode, so that a ode kows the typical distace for a successful receptio. However, the relay caot rely o beacoig i order to detect whe it is i the receptio rage of the destiatio. The reaso is that a ode stays i the receptio rage of aother ode for a short time period of order r /v = / ad this caot be detected via a periodic beacoig with bouded frequecy sice p = O( (the frequecy of periodic beacoig should be of O(. We may also assume that the destiatio ode is fixed ad its cartesia coordiates are kow by the mobile relay. Otherwise, if the destiatio ode is mobile, there would be a requiremet for this ode to track its ew coordiates ad dissemiate this iformatio i the wireless etwork as i [4], [9]. It is also iterestig to ote that Diggavi, Grossglauser, ad Tse [3] showed that a costat throughput per sourcedestiatio pair is feasible eve with a more restricted mobility model. Fraceschetti et al. [4] proved that there is o gap betwee the capacity of radomly located ad arbitrarily located odes. Throughput ad delay trade-offs have appeared i [5], [8] where delay of multi-hop routig is reduced by icreasig the coverage radius of each trasmissio, at the expese of reducig the umber of simultaeous trasmissios the etwork ca support. We will show that, i our work, we have a delay of O(/v ad throughput per source-destiatio pair of O( logloglog. If we take the otatio of a( i [5], [8] to measure the average distace traveled toward the destiatio betwee two cosecutive emissios of the same packet, the we will show that our scheme yields a( = Θ(/log. If we compare with the result of [5], [8], we should have a throughput of Θ( log but our scheme log delivers a higher throughput by a factor greater tha. I fact, if l is the average free space distace of the radom walk, the our scheme yields ( a( = Θ. The apparet l cotradictio comes from the fact that the +log authors i [5], [8] cosider a mobility model based o browia motio. This correspods to havig l = ad, i this case, our scheme would be equivalet to the hot potatoes routig of [7] with a( = Θ(r. Let us poit out that the browia motio mobility is a importat yet worst case model ad it is ot realistic for real world situatios such as urba area mobile etworks. I the sectio devoted to geeralizatios, we exted our result to fit a more geeral mobility model where mobile odes follow fractal trajectories with l = l = Θ(/log ad the throughput of our scheme remais of Θ( logloglog. O the practical side, may protocols have bee proposed for wireless multi-hop etworks. These protocols may be classified i topology-based ad positio-based protocols. Topology-based protocols [2], [8], [7] eed to maitai iformatio o routes potetially or curretly i use, so they do ot work effectively i eviromets with high frequecy of topology chages. For this reaso, there has bee a icreasig iterest i positio-based routig protocols. I these protocols, a ode eeds to kow its ow positio, the oe-hop eighbors positios, ad the destiatio ode s positio. These protocols do ot eed cotrol packets to maitai lik states or to update routig tables. Examples of such protocols ca be foud i [], [9], [] [3], [5], [6], [2]. I cotrast to our work, they do ot aalyze the trade-off betwee the capacity ad the delay of the etwork uder these protocols ad their scalig properties. III. NETWORK AND MOBILITY SETTINGS We cosider a etwork of mobile odes with their iitial positios uiformly distributed over the etwork area. Each mobile ode trasmits packets to a radomly chose fixed ode, called its destiatio ode, which is also radomly located i the etwork area. We assume that mobile odes are aware of their ow cartesia coordiates, e.g., by usig GPS or from the iitial positio, a mobile ode could use the kowledge of its motio vector to compute its cartesia coordiates at ay give time. 766

3 Iitially we cosider that oly mobile odes participate i the relay process to deliver packet to its destiatio ode. The case where the fixed odes may also participate i the relay process is discussed i Sectio VII. A mobile ode should be aware of the cartesia coordiates of the destiatio ode of a packet it carries. Ideed it ca be assumed that this iformatio is icluded i all packets or is relayed with the packets. Hece our model oly requires that a source or relay ode is aware of the cartesia coordiates of the destiatio ode which is assumed fixed. Note that if the destiatio ode is mobile, a mechaism to dissemiate its updated cartesia coordiates i the etwork ca be used, e.g., [4], [9]. However, this is outside the scope of this paper as we particularly focus o the throughput-delay tradeoff. With the available iformatio, a mobile relay ca determie: - its headig vector, which is the motio vector whe its speed is o zero, - its bearig vector, which is the vector betwee its positio ad the positio of a packet s destiatio; ad, - the relative bearig agle, i.e., the absolute agle betwee its headig ad bearig vectors. I the example of Fig., ode A is carryig a packet for ode D. This figure also shows the headig vector of mobile ode A ad its bearig vector ad relative bearig agle for destiatio ode D. Note that a mobile relay may carry packets for multiple destiatios but ca easily determie the bearig vector ad relative bearig agle for each destiatio ode. IV. MODEL OF CRB SCHEME I this sectio, we will preset the parameters ad specificatios of the model of our georoutig scheme. A. Parameters We defie the parameters θ c, called the carry agle, ad θ e, called the emissio agle. Each mobile ode carries a packet to its destiatio ode as log as its relative bearig agle, θ, is smaller tha θ c which is strictly smaller tha π/2. Whe this coditio is ot satisfied, the packet is trasmitted to the ext relay. B. Model Specificatio With Radio Rage Awareess I the followig descriptio, we iitially assume that each ode is aware of the effective rage of trasmissio r. This meas that there is a periodic beacoig that allows this estimate to be made. I Sectio IV-C, we will ivestigate how to specify our model without a estimate of the effective rage r. Assume that ode A is carryig a packet for ode D. The velocity of ode A is deoted by v(a. - If ode A is withi rage of ode D, it trasmits the packet to D; otherwise, - if the relative bearig agle is smaller tha θ c, ode A cotiues to carry the packet; otherwise, - ode A trasmits the packet to a radom eighbor mobile ode iside the coe of agle θ e, with bearig vector as the axis, ad the forgets the packet. Mobile ode A Headig vector θ (relative bearig agle θ e Bearig vector Destiatio ode D Fig. : Figurative represetatio of our model. Ufilled circles represet the potetial mobile relays for packet trasmitted by ode A for ode D. I order to better uderstad the model of our georoutig scheme, cosider the example i Fig.. Assume that ode A is out of rage of ode D ad, because of that, it caot deliver the packet directly. Now, if θ < θ c, ode A will cotiue to carry the packet for ode D. Otherwise, it trasmits the packet to oe of the radom mobile relays, represeted by ufilled circles i the figure. Trasmissio procedure: To trasmit the packet towards aother mobile ode, ode A shall proceed as follows: - it first trasmits a Call-to-Receive packet cotaiig the positios of odes A ad D; - a radom mobile odeb which receives this Call-to-Receive packet ca compute the agle (AB,AD. If this agle is smaller tha θ e, it replies with a Accept-to-Receive packet cotaiig a idetifier of ode B; - ode A seds the packet to the first mobile ode which replied with a Accept-to-Receive packet. The first ode which seds its Accept-to-Receive packet otifies the other receivers of the Call-to-Receive packet, to cacel their trasmissios of Accept-to-Receive packets. There may be more tha oe (but fiite trasmissios of Accept-to- Receive packets i case two or more receivers are at distace greater tha r from each other. Note that this procedure does ot eed ay beacoig or periodic trasmissio of hello packets. The back-off time of odes, trasmittig their Accept-to-Receive packet, ca also be tued i order to favor the distace or displacemet towards D, depedig o ay additioal optioal specificatios. C. Model Specificatio Without Radio Rage Awareess The estimatio of r would require that the odes employ a periodic beacoig mechaism. If such a mechaism is ot available or desirable, the CRB scheme relies o the sigal to iterferece plus oise ratio (SINR for trasmittig packets to their destiatios or radom mobile relays. I other words, a mobile ode ca relay a packet to its destiatio ode or aother mobile ode oly if the SINR at the receiver is above a give threshold. Note that i this case, the specificatio of the trasmissio procedure is also modified so that it termiates whe the fial 767

4 destiatio receives the packet. To trasmit the packet towards its destiatio ode or aother mobile ode, ode A shall proceed as follows: - it first trasmits a Call-to-Receive packet cotaiig the positios of odes A ad D; - if ode D receives this packet, it respods immediately with a Accept-to-Receive packet with highest priority. Node A, o receivig this packet, relays the packet to ode D; otherwise, - the procedure of selectig a radom mobile ode, as the ext relay, is similar to the procedure described i Sectio IV-B. A radom mobile ode B, which receives the Callto-Receive packet, computes the agle (AB, AD. If this agle is smaller tha θ e, it respods with a Accept-to- Receive packet; - ode A relays the packet to the first mobile ode which set its Accept-to-Receive packet successfully. The first ode which trasmits its Accept-to-Receive packet also makes the other receivers to cacel their trasmissios of Accept-to- Receive packets. V. PERFORMANCE ANALYSIS I our georoutig scheme, the average trasmissio rate of each mobile ode is p = O(/loglog. We will also show that the umber of trasmissios per packet is of O(log ad this would lead to a useful etwork capacity of logloglog O(C. Note that our scheme could lead to packet loss because of trasmissio failure but we show that the probability of this packet loss is iverse power of log ad it teds to zero as approaches ifiity. We assume that the etwork area is a square area ad without loss of geerality we assume that it is a square uit area. The mobile odes move accordig to i.i.d. radom walk: from a uiformly distributed iitial positio, the odes move i a straight lie with a certai speed ad radomly chage directio. The speed is radomly distributed i a iterval [v mi,v max ] with v mi >. To simplify the aalysis, we assume that v mi = v max = v. We also assume that each ode chages its directio with a Poisso poit process of rate τ. Whe a mobile ode hits the border of the etwork, it simply bouces like a billiard ball. This leads to the isotropic property (Jacquet et al. []: at ay give time the mobile odes are uiform distributed i the square ad move i uiformly selected directio idepedetly of their positio. The radius of efficiet trasmissio r is derived from the value of p ad is give by r =, for some β >. Therefore, the average umber of eighbors of a arbitrary ode at a arbitrary time is βloglog. I order to keep the average cumulated load fiite, the odes have a β loglog π average trasmissio rate of p = βloglog. Therefore, the actual desity of simultaeous trasmitters is A. Methodology The parameters of iterest are the followig: βloglog. - The delay D (r of deliverig a packet to the destiatio whe the packet is geerated i a mobile ode at distace r from its destiatio ode. - The average umber of timesf (r the packet chages relay before reachig its destiatio whe it has bee geerated i a mobile ode at distace r from its destiatio ode. I order to exhibit the actual performace of our proposed CRB scheme, we aim to derive a upper-boud o the parameters D (r ad F (r. I the ext two sub-sectios, we assume w.l.o.g. that there is always a relay ode, to receive the packet, i the emissio coe (as the ode desity ad agle, θ e, are sufficietly large whe a relay chage must occur. B. Delivery Delay We igore the queueig delays which ca become apparet whe several packets could be i competitio i the same relay to be trasmitted at the same time. Theorem : r D (r vcos(θ c + F ( (r t f v r, ( v cos(θ c where t f is the store ad forward delay quatity. Proof: We ca write D (r as D (r F (rt f + r F (rr vcos(θ c where F (rt f is the average total delay of store ad forward operatios ad r F(rr vcos(θ c is a upper boud of the delay whe mobile relays carry a packet at costat speed v with a relative bearig agle always smaller tha θ c. Rearragig this equatio leads to (. Remark : If r is greater tha t f v, secod factor i ( becomes egative which gives the upper boud of r D (r vcos(θ. However, if r c is less tha t f v, D (r will also iclude a O(log factor because of F (r. C. Number of Relay Chages There are two evets that trigger relay chages. Relay chage due to tur, i.e., the mobile ode, carryig the packet, chages its headig vector such that the relative bearig agle becomes greater tha θ c. 2 Relay chage due to pass over, i.e., the mobile ode keeps its trajectory ad the relative bearig agle becomes greater tha θ c. Cosider a packet geerated at distace r from its destiatio. Let F(r t be the average umber of relay chages due to tur. Equivaletly, let F(r p be the average umber of relay chages due to pass over. Therefore, we have F (r = F(r t + F(r p ad we expect that the mai cotributio of O(log i F (r will come from F(r. p Number of Relay Chages Due to Tur: We prove the followig theorem: Theorem 2: We have the boud Proof: F t (r π θ c θ c τ vcos(θ c r., 768

5 Mobile ode A at positio 2 Mobile ode A at positio θ < θ c θ > θ c r Destiatio ode D Fig. 2: Figurative descriptio of relay chage due to tur. At positio, θ < θ c ad ode A carries the packet for ode D. At positio 2, ode A chages its headig vector ad must trasmit the packet. We cosider the case i Fig. 2 ad assume that a mobile ode is carryig a packet to its destiatio located at distace r. The ode chages its directio with Poisso rate τ. Whe the ode chages its directio, it may keep a directio that stays withi agle θ c with the bearig vector ad this will ot trigger a relay chage. This occurs with probability θc π. Otherwise, the packet must chage relay. But the ew relay may have relative bearig agle greater tha θ c which would result i a immediate ew relay chage. Therefore, at each directio chage, there is a average of π θc θ c relays. Multiplied by D (r this gives our upper-boud of F(r. t Note that we have ot cosidered the tur due to bouces o the borders of square map. But it is easy to see via straightforward geometric cosideratios that they caot actually geerate a relay chage. 2 Number of Relay Chages Due to Pass Over: We prove the followig theorem: Theorem 3: We have the boud F(r p πta(θ ( c r θc 2 log. r Proof: Here we cosider the case of Fig. 3. We assume that a mobile ode at distace r, from its destiatio, has a relative bearig agle equal to θ. If it keeps its trajectory (i.e., does ot tur, it will eed to trasmit to a ew relay whe it passes over the destiatio, i.e., whe it arrives at a distace of ρ(θ,r = si(θ si(θ c r from the destiatio. The fuctio of θ ρ(θ,r is bijective from [,θ c ] to [,r]. For x [,r] let ρ (x,r be its iverse. Assume that r is the distace to the destiatio whe the relay receives the packet or just after a tur. Thus the agleθ is uiformly distributed o[,θ c ], i.e., with a costat probability desity θ c. The probability desity of the pass over evet at x < r (assumig o directio chage is therefore θ c x ρ (x,r = si(θ c θ c cos(ρ (x,rr = ta(ρ (x,r θ c x. Sice ρ (x,r θ c, the poit process where the packet would eed a relay chage due to pass over is upper bouded by a Poisso poit process o the iterval [r,r] ad of itesity equal to ta(θc θ c x for x [r,r]. Mobile ode A at positio Mobile ode A at positio 2 θ < θ c θ = θ c r ρ(θ, r Destiatio ode D Fig. 3: Figurative descriptio of relay chage due to pass over. At positio, θ < θ c ad ode A carries the packet for ode D. At positio 2, ode A has the same headig vector but θ = θ c ad it must trasmit the packet. A relay chage due to pass over correspods to a average of π θ c relays which is higher tha the average umber of relays i case of relay chage due to tur. The reaso of this higher umber is the fact that i case of relay chage due to tur, a mobile relay may still move i a directio that stays withi the carry agle θ c ad cotiue to carry the packet. Neglectig the decremet of distace durig each trasmissio phase r F(r p πta(θ c dx = r θc 2 x = πta(θ ( c r θc 2 log. r We have thus F (r π θ c θ c τ cos(θ c v r + πta(θ ( c r θc 2 log r Therefore we have a mai cotributio of O(log relay chages that comes from log(/r. The result holds because we assume that there is always a receiver i each relay chage. I the ext sub-sectio we remove this coditio to establish a result with high probability. D. Number of Relay Chages With High Probability of Success I the previous subsectio we assumed that there is always a receivig relay i the emissio coe at each relay chage ad we said that the relay chage is always successful. The case with failed relay chage would itroduce additioal complicatios. For example oe could use the fixed relays if the packet caot be delivered to a mobile relay. Ayhow, to simplify the preset cotributio, we will show that with high probability, i.e., with probability approachig oe whe approaches ifiity, every relay chage succeeds. Theorem 4: With high probability o arbitrary packets, all relay chages succeed for this packet ad are i average umber F (r ad the delay is D (r. Proof: We use a modified stochastic system to cope with failed relay chages. The modificatio is the followig: whe there is o relay i the emissio coe durig a relay chage a decoy mobile relay is created i the emissio coe that will receive the packet. Each decoy relay is used oly for oe packet ad disappear after use. Notice that the modified system is ot a practical scheme i a practical etwork. The aalysis i the previous sectio still holds ad i particular F (r is ow the average ucoditioal umber of relay chages (icludig. 769

6 those via decoy relays for ay packet startig at distace r from destiatio. Let P (r be the probability that a packet startig at distace r has a failed relay chage. The probability that a relay chage fails is equal to ( θ e r 2 e θ2 e r2 = (log β θe π. Therefore the average umber of failed relay chagese (r F (r(log β θe π which teds to zero whe β θe π >, sicef (r = O(log. The fial result comes sice P (r E (r. VI. SIMULATIONS We performed simulatios with CRB georoutig scheme uder two cotexts: a simplified cotext where the etwork is modeled uder uit disk model; 2 a realistic cotext where the etwork operates uder slotted ALOHA ad a realistic SINR iterferece model is cosidered. The simulatios of CRB scheme are stressed to the poit that the motio timigs are ot so large compared to slot times. A. Uder Disk Graph Model I this sectio, we cosider a etwork of mobile odes. We assume that all odes have the same radio rage give by β loglog r =. π Each mobile ode moves accordig to a i.i.d. radom walk mobility model, i.e., it starts from a uiformly distributed iitial positio, moves i straight lie with costat speed ad uiformly selected directio ad reflects o the borders of the square area (like billiard balls. I the ext sectio (Sectio VI-B, we will further explore the effect of iterferece o the simulatios, but for the momet we oly cosider a source mobile ode ad its radomly located destiatio ode which is fixed. We adopt the disk graph model of iterferece, i.e., two odes are coected or they ca exchage iformatio if the distace betwee them is smaller tha a certai threshold (called radio rage, otherwise, they are discoected. A mobile ode relays the packet oly if the relative bearig agle, i.e., the absolute agle made by the headig vector ad the bearig vector, becomes greater tha θ c. Otherwise, it cotiues to carry the packet. Simulatio parameters ad assumptios: The purpose of our simulatios is to verify the scalig behavior of average delay ad umber of hops per packet with icreasig umber of odes i the etwork. Therefore, the umber of mobile odes,, i the etwork is varied from to two millio odes. The values of other parameters, which remai costat, ad do ot impact the scalig behavior are listed as follows. (i Parameters of CRB scheme, θ c ad θ e, are take to be π/6. (ii The speed of all mobile odes is costat, i.e.,.5 uit distace per slot. (iii All mobile odes chage their directio accordig to a Poisso poit process with mea equal to slots. (iv The value of costat factor β is assumed to be equal to 4. Average delay per packet (slots Average umber of hops per packet e+5.e+6.5e+6 2.e+6 Number of mobile odes Fig. 4: Average delay per packet. 5.e+5.e+6.5e+6 2.e+6 Number of mobile odes Fig. 5: Average umber of hops per packet. 2 Results: We have evaluated the followig parameters. (i Average delay per packet. (ii Average umber of hops per packet. We cosidered the Mote Carlo Method with simulatios. The delay of a packet is computed from the time whe its processig started at its source mobile ode util it reaches its destiatio ode. Figure 4 shows the average delay per packet with a icreasig umber of odes. We otice that as icreases, the average delay per packet appears to approach a costat upper boud which ca be computed from (. Figure 5 shows the average umber of hops per packet with icreasig values of. B. With slotted ALOHA uder SINR iterferece model I this sectio, we will preset the simulatios of CRB georoutig scheme with a trasmissio model which does ot rely o the estimate ofr ad is based o the required miimal SINR threshold. Trasmissio model: Our trasmissio model is as follows. Let P i be the trasmit power of ode i ad γ ij be the chael gai from ode i to ode j such that the received power at ode j is P i γ ij. The trasmissio from ode i to ode j is successful oly if the followig coditio is satisfied P i γ ij N + k i P kγ kj > K, where K is the desired miimum SINR threshold for successfully receivig the packet at the destiatio ad N is the backgroud oise power. For ow, we igore multi-path fadig or shadowig effects ad assume that the chael gai from 77

7 ode i to ode j is give by γ ij = z i z j α, where α > 2 is the atteuatio coefficiet ad z i is the locatio of ode i. 2 Simulatios uder SINR iterferece model: For the theoretical aalysis i Sectio V, we have assumed that the effective rage of successful trasmissio is r = β loglog, π which requires that the mobile odes have a average trasmissio rate ofp = β/loglog. I other words, if the mobile odes emit packets at the give average rate, the average distace of successful trasmissio uder SINR iterferece model is of O(r ad the results from theoretical aalysis are applicable as well. We assume that time is slotted ad mobile odes determie their relative bearig agles at the begiig of a slot. We also assume that all odes are sychroized ad simultaeous trasmitters i each slot emit a Call-to-Receive packet at the begiig of the slot. Moreover, we also assume that fixed odes do ot emit ay packet except, maybe, a Accept-to- Receive packet i respose to a trasmissio by a mobile ode. I our simulatio eviromet, mobile odes start from a uiformly distributed iitial positio ad move idepedetly i straight lies ad i radomly selected directios. They also chage their directio radomly at a rate which is a Poisso poit process. Each mobile ode seds packets towards a uique destiatio (fixed ode, ad all destiatios odes are also uiformly distributed i the etwork area. I order to keep load i the etwork fiite, the packet geeratio rate at a ode, ρ, should be of O(p /X where X is the expected umber of trasmissios per packet. From the theoretical aalysis, we kow that X = O(log( β 2 +c, where c is a costat if θ c is o-varyig. I our simulatios uder SINR iterferece model, we assume that the kowledge of r is ot available ad mobile odes use miimal SINR threshold for successfully receivig a packet. We also assume that each mobile ode geerate packets, destied for its uique fixed destiatio ode, at a uiform rate give by ρ = β log( β 2 loglog, (2 for some β > ad β 2 >. We igored the value of costat c ad have observed that the simulatio results are asymptotically correct because, with icreasig, value of c should be isigificat as compared to the O(log(/β 2 factor. 3 Simulatio parameters ad assumptios: The purpose of our simulatios is to verify the scalig properties of etwork capacity, delay ad umber of trasmissios per packet with icreasig umber of odes i the etwork. The umber of mobile odes,, i the etwork is varied from 25 odes to, odes. All odes use uiform uit omial trasmit power ad the backgroud oise power N is assumed to be egligible. The values of other parameters are listed as follows. (i Parameters of CRB scheme, θ c ad θ e, are take to be π/6. (ii The speed of all mobile odes is costat, i.e.,. uit distace per slot. (iii All mobile odes chage their directio idepedetly ad radomly accordig to a Poisso poit process with mea equal to slots. (iv The values of costat factors β ad β 2 are assumed equal to 5 ad respectively. (v SINR threshold, K, is assumed equal to. (vi Atteuatio coefficiet, α, is assumed equal to 2.5. I our simulatios, we make the followig assumptios. (i Each mobile ode geerates a ifiite umber of packets, at rate ρ, for its respective destiatio ode. (ii A mobile ode may carry, i its buffer, its ow packets as well as the packets relayed from other mobile odes. Therefore, it may have more tha oe packet i its buffer which it must trasmit because their respective relative bearig agles are greater tha θ c. I such a case, it first trasmits the packet which is furthest from its destiatio. 4 Results: We have examied the followig parameters. (i Throughput capacity per ode, λ. (ii Average umber of hops, h, ad trasmissio attempts, t, per packet. (iii Average delay per packet. The throughput capacity per ode, λ, is the average umber of packets arrivig at their destiatios per slot per mobile ode. With icreasig, throughput capacity per ode should follow the followig relatio λ = η β log( β 2 loglog, (3 for some < η < which depeds o K, α ad protocol parameters. Note that the values of these costats do ot affect the asymptotic behavior of λ which is also observed i our simulatio results. I order to verify the asymptotic character of simulated packet geeratio rate ad throughput capacity, we have aalyzed the parameters m ρ ad m λ which are give by ( m ρ = ρ (β log β ( 2 m λ = λ (β log β 2 log log( log log( From the defiitio of ρ i (2, the value of m ρ should be costat at whereas, with icreasig, value of m λ should coverge to the costat η. From Fig. 6, value of η is foud to be approximately equal to.45. Figure 7 shows the simulated ad theoretical packet geeratio rate, ρ, ad throughput capacity, λ, i the etwork. The theoretical values of ρ ad λ are computed from (2 ad (3. Figure 8 shows the average umber of hops, h, ad trasmissio attempts, t, per packet. The value of t is slightly higher tha the value of h because of the possibility that a successful receiver may ot be foud i each trasmissio phase, i.e., i the coe of trasmissio formed with θ e. With icreasig, h ad t are expected to grow i O(log(/β 2. To verify this character i simulatio results, we examie the., 77

8 2.5.5 m λ m ρ Average delay per packet (slots Number of mobile odes Fig. 6: Verificatio of etwork throughput capacity with plots of m λ ad m ρ. Average umber of packets per slot Number of mobile odes λ ρ Fig. 7: Simulated (solid lies ad theoretical (dotted lies etwork throughput capacity, λ, ad etwork packet geeratio rate, ρ. Average per packet Number of mobile odes Fig. 8: Average umber of hops, h, ad trasmissio attempts, t, per packet h Number of mobile odes Fig. 9: Verificatio of umber of hops ad trasmissio attempts with plots of m h ad m t. parameters m h ad m t give by m h = h log( β 2, m t = t log( β 2. t m h m t Number of mobile odes Fig. : Average delay per packet. If the values of h ad t are i O(log(/β 2, the values of m h ad m t should approach a costat value which is the case i Fig. 9. The delay of a packet is computed from the time whe its processig started at its source mobile ode util the time it arrives at its destiatio ode. Figure shows the average delay per packet. As the umber of mobile odes icrease, the average delay appears to approach a costat value. It ca be observed that whe is small, the average umber of hops per packet is almost of O( which also meas that the average delay per packet is of O( ad the etwork throughput capacity is of O(η: although, i simulatio results, it is bouded by the etwork packet geeratio rate logloglog which is of O(. This ca be observed i Fig. 7, 8 ad. The reaso is that whe is small, the umber of simultaeous trasmissios i the etwork is also small ad packets ca be delivered by the mobile odes, directly to their destiatio odes, i O( hops. As icreases, umber of simultaeous trasmitters icrease ad cosequetly the effective trasmissio rage of each trasmitter shriks. Therefore, the domiat factor i the umber of trasmissios per packet comes from the fact that a mobile relay has to be close to the destiatio, to deliver a packet. Accordig to theoretical aalysis, h ad t grow i O(log which is also observed i the simulatio results. Simulatios also show that, asymptotically, etwork throughput capacity is of O( logloglog ad average delay per packet is of O(/v which complies with our theoretical aalysis. VII. EXTENSIONS AND GENERAL MOBILITY MODELS I our discussio, we primarily focussed o the capacitydelay tradeoff ad thus for the iitial sake of clarity assumed that the fixed odes ca oly receive packets destied for them. We could also cosider a slight variatio i the specificatio of the model of CRB scheme such that the fixed odes also participate i the routig of packets to their destiatio odes. For example, durig a trasmissio phase, if a packet caot be trasmitted to its destiatio ode or relayed to a radom mobile eighbor i the coe of trasmissio, it ca be relayed to a fixed ode. This fixed ode must emit this packet immediately to its destiatio ode or to ay mobile relay i the eighborhood. Note that this will also help icrease the coectivity of the etwork. 772

9 T distace T 2 T T 2 T 3 T 4T5 T 6 T 3 T 7 T 4,...,T 7 Fig. : Illustratio of self-similar trajectories i urba areas. The coditio about i.i.d. radom walks ca be relaxed ad the result about the expected umber of relay chages will still be valid. I other words, the i.i.d. radom walk model ca be see as a worst case compared to realistic mobility models. If the mobile relays move like cars i a urba area, the we ca expect that their mobility model will sigificatly depart from the radom walk. Ideed cars move toward physical destiatios ad i their jourey o the streets toward their destiatio, their headig after each tur is positively correlated with the headig before the tur. This implies that the probability that a relay chage is eeded after a tur is smaller tha it would be uder a radom walk model, where headigs before ad after tur are ot correlated. Furthermore o a street, the headigs are positively correlated (cosider Mahatta oe-way streets ad i this case a relay chage due to a pass over will have more chaces to arrive o a relay with good headig (oe half istead of θ c /π. Agai this would lead to less relay chages due to pass over. The result still holds if we assume that the tur rate τ depeds o ad τ = τ = O(log. I this case, the mobility model would fit eve better for the realistic mobility of a urba area. Ideed the trajectories of cars should be fractal or self-similar, showig more frequet turs whe cars are close to their physical destiatio (differet tha packet destiatio or whe leavig their parkig lot. I this case, the overall tur rate teds to be i O(log with a coefficiet depedig o the Hurst parameter of the trajectory. This would lead to the same estimate of O(log relay chage per packet. Figure illustrates a self-similar trajectory i a urba area. It shows a two-dimesioal trajectory (upper half ad its traveled distace (lower half. The successive turs are idicated by T,...,T 7. The trajectory after ay tur T i looks like a reduced copy of the origial trajectory. The CRB scheme may eed some adaptatio to cope with some uusual street cofiguratios, e.g., to replace the cartesia distace with the Mahatta distace i the street map. VIII. CONCLUSIONS We have examied asymptotic capacity ad delay i mobile etworks with a georoutig scheme, called CRB, for commuicatio betwee source ad destiatio odes. Our results show that CRB allows to achieve the etwork capacity of O( logloglog with packet delivery delay of O( ad trasmissios per packet of O(log. It is oticeable that this scheme does ot eed ay sophisticated overhead for implemetatio. However, i this case, the mobile odes must be aware of their positio via a GPS system, for example. We have show the asymptotic performace via aalytical aalysis uder a uit disk graph model with radom i.i.d. walks. The aalytical results have bee cofirmed by simulatios ad i particular uder ALOHA with SINR iterferece model. We have see that the performace of CRB ca be maitaied eve with o i.i.d. radom walks, the latter beig a worst case sceario. However, this latter result would require that the mobile odes stay withi same headig for O(/log time. A ext step would be to aalyze the performace of this scheme o real traffic traces i urba areas. REFERENCES [] S. Basagi, I. Chlamtac, V. R. Syrotiuk, ad B. A. Woodward. A distace routig effect algorithm for mobility (DREAM. I MOBICOM, pages 76 84, 998. [2] T. Clause ad P. Jacquet. Optimized lik state routig protocol (OLSR, IETF-RFC I RFC 3626, Uited States, 23. [3] S. Diggavi, M. Grossglauser, ad D. Tse. Eve oe-dimesioal mobility icreases ad hoc wireless capacity. I IEEE Iteratioal Symposium o Iformatio Theory, page 352, 22. [4] M. Fraceschetti, O. Dousse, D. N. C. Tse, ad P. Thira. Closig the gap i the capacity of wireless etworks via percolatio theory. IEEE Trasactios o Iformatio Theory, 53(3:9 8, 27. [5] A. E. Gamal, J. P. Mamme, B. Prabhakar, ad D. Shah. Throughputdelay trade-off i wireless etworks. I INFOCOM, volume, pages 4 (xxxv+2866, 24. [6] M. Grossglauser ad D. N. C. Tse. Mobility icreases the capacity of ad hoc wireless etworks. IEEE/ACM Trasactios o Networkig, (4: , 22. [7] P. Gupta ad P. R. Kumar. The capacity of wireless etworks. IEEE Trasactios o Iformatio Theory, 46(2:388 44, 2. [8] Z. J. Haas, M. R. Pearlma, ad P. Samar. The zoe routig protocol (ZRP for ad hoc etworks. IETF Iteret Draft, July 22. [9] T.-C. Hou ad V. Li. Trasmissio rage cotrol i multihop packet radio etworks. Commuicatios, IEEE Trasactios o, 34(:38 44, 986. [] P. Jacquet, B. Mas, ad G. Rodolakis. Iformatio propagatio speed i mobile ad delay tolerat etworks. IEEE Trasactios o Iformatio Theory, 56(:5 55, 2. [] B. Karp ad H. T. Kug. GPSR: greedy perimeter stateless routig for wireless etworks. I MOBICOM, pages , 2. [2] Y.-B. Ko ad N. H. Vaidya. Locatio-aided routig (LAR i mobile ad hoc etworks. I MOBICOM, pages 66 75, 998. [3] E. Kraakis, H. Sigh, ad J. Urrutia. Compass routig o geometric etworks. I Caadia Coferece O Computatioal Geometry, pages 5 54, 999. [4] J. Li, J. Jaotti, D. S. J. De Couto, D. R. Karger, ad R. Morris. A scalable locatio service for geographic ad hoc routig. I MOBICOM, pages 2 3, 2. [5] J. C. Navas ad T. Imieliski. GeoCast - geographic addressig ad routig. I MOBICOM, pages 66 76, 997. [6] R. Nelso ad L. Kleirock. The spatial capacity of a slotted aloha multihop packet radio etwork with capture. Commuicatios, IEEE Trasactios o, 32(6: , 984. [7] C. E. Perkis ad E. M. Beldig-Royer. Ad-hoc o-demad distace vector (AODV routig. I WMCSA, pages 9, 999. [8] G. Sharma, R. Mazumdar, ad B. Shroff. Delay ad capacity tradeoffs i mobile ad hoc etworks: A global perspective. IEEE/ACM Trasactios o Networkig, 5(5:98 992, Oct. 27. [9] I. Stojmeovic. Home aget based locatio update ad destiatio search schemes i ad hoc wireless etworks, 999. [2] H. Takagi ad L. Kleirock. Optimal trasmissio rages for radomly distributed packet radio termials. Commuicatios, IEEE Trasactios o, 32(3: ,

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding Throughput-Delay Tradeoffs i Large-Scale MANETs with Network Codig Chi Zhag ad Yuguag Fag Departmet of Electrical ad Computer Egieerig Uiversity of Florida, Gaiesville, FL 326 Email: {zhagchi@, fag@ece.}ufl.edu

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Look-ahead Geographic Routing for Sensor Networks

Look-ahead Geographic Routing for Sensor Networks 1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

COMP 558 lecture 6 Sept. 27, 2010

COMP 558 lecture 6 Sept. 27, 2010 Radiometry We have discussed how light travels i straight lies through space. We would like to be able to talk about how bright differet light rays are. Imagie a thi cylidrical tube ad cosider the amout

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Thompson s Group F (p + 1) is not Minimally Almost Convex

Thompson s Group F (p + 1) is not Minimally Almost Convex Thompso s Group F (p + ) is ot Miimally Almost Covex Claire Wladis Thompso s Group F (p + ). A Descriptio of F (p + ) Thompso s group F (p + ) ca be defied as the group of piecewiseliear orietatio-preservig

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic

Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic Optimal Geographic Routig for Wireless Networks with Near-Arbitrary Holes ad Traffic Sudar Subramaia ad Sajay Shakkottai Departmet of ECE The Uiversity of Texas at Austi Email: {ssubrama, shakkott}@ece.utexas.edu

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

Assignment 5; Due Friday, February 10

Assignment 5; Due Friday, February 10 Assigmet 5; Due Friday, February 10 17.9b The set X is just two circles joied at a poit, ad the set X is a grid i the plae, without the iteriors of the small squares. The picture below shows that the iteriors

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Visualization of Gauss-Bonnet Theorem

Visualization of Gauss-Bonnet Theorem Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Oblivious Routing with Mobile Fusion Centers over a Sensor Network

Oblivious Routing with Mobile Fusion Centers over a Sensor Network Oblivious Routig with Mobile Fusio Ceters over a Sesor Network Devavrat Shah Departmet of Electrical Eg. ad Computer Sciece Massachusetts Istitute of Techology devavrat@mit.edu Sajay Shakkottai ECE Departmet

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

The Cost Advantage of Network Coding in Uniform Combinatorial Networks

The Cost Advantage of Network Coding in Uniform Combinatorial Networks The Cost Advatage of Networ Codig i Uiform Combiatorial Networs Adrew Smith, Bryce Evas, Zogpeg Li, Baochu Li Departmet of Computer Sciece, Uiversity of Calgary Departmet of Electrical ad Computer Egieerig,

More information

Algorithm. Counting Sort Analysis of Algorithms

Algorithm. Counting Sort Analysis of Algorithms Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

c-dominating Sets for Families of Graphs

c-dominating Sets for Families of Graphs c-domiatig Sets for Families of Graphs Kelsie Syder Mathematics Uiversity of Mary Washigto April 6, 011 1 Abstract The topic of domiatio i graphs has a rich history, begiig with chess ethusiasts i the

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Algorithms Chapter 3 Growth of Functions

Algorithms Chapter 3 Growth of Functions Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

Routing with Guaranteed Delivery in ad hoc Wireless Networks*

Routing with Guaranteed Delivery in ad hoc Wireless Networks* Routig with Guarateed Delivery i ad hoc Wireless Networks* Prosejit Bose School of Computer Sciece Carleto Uiversity jit@scs.carleto.ca Pat Mori School of Computer Sciece Carleto Uiversity mori@scs.carleto.ca

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Coherent effects of flow- and pressure hull of a generic submarine on target scattering in an active sonar performance model

Coherent effects of flow- and pressure hull of a generic submarine on target scattering in an active sonar performance model Coheret effects of flow- ad pressure hull of a geeric submarie o target scatterig i a active soar performace model P. Schippers TNO-D&V-Uderwater Techology, Oude Waalsdorperweg 63, Post Box 96864, 2509

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information