Maintaining communication and discovering new nodes using a dual transmitter approach implementing the Random Full or Half Speed, Random Speed, and

Size: px
Start display at page:

Download "Maintaining communication and discovering new nodes using a dual transmitter approach implementing the Random Full or Half Speed, Random Speed, and"

Transcription

1 Maintaining communication and discovering new nodes using a dual transmitter approach implementing the Random Full or Half Speed, Random Speed, and Random Direction channel hopping algorithms Institution:Carleton University Course: COMP 4905 Author: Michael Martino Supervisor: Dr. Michel Barbeau Date: November 22, 2013

2 Abstract The disparities between the usage of the regulated and unregulated bands are well noted. Work has been done to remedy the under usage of the regulated band. This project focuses on enhancing the work done by Barbeau et al. on three channel hopping algorithms known as Full or Half Speed, Random Speed, and Random Direction[1]. The idea for this project was to add an additional transmitter with the intention of using it to maintain communications with nodes discovered during a channel hopping search. The simulations are closely related to those performed in [1], allowing for direct comparisons to be made between the two. The simulation results illustrate that even with the added overhead of an additional transmitter, dual transmitter nodes implementing one of the three previously mentioned algorithms along with the Maintain Channel algorithm (developed for this project) outperform single transmitter nodes in every instance. Dual transmitter nodes discover their neighbours between 2 and 4 times as fast as their single transmitter counterparts.

3 Acknowledgements I would like to thank Dr. Barbeau for his guidance during this project and for allowing me to use his and his colleagues recent research on channel hopping algorithms as a basis for my research project. I would also like to thank Troy Hildebrandt for his unexpected contribution to the success of my project.

4 Contents 1 Introduction 1 2 Previous Work by Barbeau et al Full or Half Speed Algorithm Random Speed Algorithm Random Direction Algorithm Maintain Channel Algorithm 3 4 Simulation Model State Frame Model Consequences of a Successful Search Disadvantages of the Simulation Model Simulation Results 9 6 Conclusions 16

5 List of Figures 1 High level view of the state comparison model State comparison model of Full or Half Speed Algorithm[1] Example update after successful search Full or Half Speed Channel Hopping Algorithm (Dual Transmitter) Random Speed Channel Hopping Algorithm (10 nodes) Random Speed Channel Hopping Algorithm (20 nodes) Random Direction Channel Hopping Algorithm (10 nodes) Random Direction Channel Hopping Algorithm (20 nodes).. 15

6 1 Introduction The over usage of the unregulated radio spectrum and the under usage of the regulated radio spectrum have been examined and identified as challenges in a future where there are an increasing number of mobile and wireless technologies being developed. There is a significant amount of time where channels within the regulated band are unoccupied by primary users, being those users who have principal access to the band. These temporarily unoccupied channels could be used by secondary users. However, secondary users cannot depend on any single particular channel to be available at all times in these situations. This research project focuses on this problem; more specifically, it looks to add to the work done by Barbeau et al. in [1]. The authors propose a solution using channel hopping algorithms to allow for these secondary users to communicate on sets of commonly known channels. The three algorithms proposed are Random Full or Half Speed, Random Speed, and Random Direction. In [1], the time complexity of these algorithms is compared to other related algorithms such as the Jump-Stay Algorithm[2, 3] and the Random Channel Algorithm[4]. The authors also note their use of simulations to test the performance of these algorithms. There are a number of parameters to be accounted for, such as the number of secondary users in the network, the number of channels available to each user, and the number of commonly known channels between users. Barbeau et al. compare these algorithms via sets of simulations and conclude that in general, making abstraction of the guaranteed rendezvous property 1, random algorithms perform best.[1] The goal of this research project is to increase the speed with which secondary users are able to locate each other in the regulated spectrum. However, this project focuses on scenarios where there are more than two secondary users actively searching. Users, or more accurately nodes, in the previously mentioned algorithms only use one transmitter. In this project, nodes are created with two transmitters: a search transmitter and a maintain transmitter. The search transmitter executes one of Barbeau et al. s channel hopping algorithms. The maintain transmitter maintains previously established communications with any nodes discovered by the search transmitter. Nodes maintaining communication on the same channel are referred to as a neighbourhood throughout this paper. When two nodes discover each other, they determine the channel on which to maintain communications by exe- 1 An algorithm with a finite maximum Time to Rendezvous (TTR) is said to be guaranteed to rendezvous.[1] 1

7 cuting the Maintain Channel algorithm (Algorithm 1). In these instances, a migration occurs where smaller neighbourhoods relocate, or more specifically switch channels to that of the larger neighbourhoods. Overall, by doubling the number of transmitters per node, we are also doubling the cost. Therefore, this project looks to determine if there is a higher cost-benefit ratio to using two transmitters versus one. Previous work relating to this project is described in Section 2. In Section 3, the details of the Maintain Channel algorithm used to determine the channel on which two nodes will maintain communications is discussed in detail. Section 4 and Section 5 present a simulation model, referred to as a State Frame Model, used in this project followed by an analysis of single and dual transmitter nodes executing the algorithms described in [1]. In Section 6, conclusions are drawn and potential improvements and future work in this area are proposed. 2 Previous Work by Barbeau et al. This project relies on work by Barbeau, Cervera, Garcia-Alfaro, and Kranakis described in the paper Common Channel Selection in a Multipoint Cognitive Radio Network[1]. In this paper, the authors discuss the importance of dynamic channel hopping algorithms for communication in the regulated band. Specifically, they analyze previous work on the subject [2, 3, 4] and develop another set of improved algorithms to solve this problem. These algorithms are Full or Half Speed, Random Speed, and Random Direction. Each of these algorithms chooses a random channel on which to begin searching at the start of each round. 2.1 Full or Half Speed Algorithm In this algorithm, a node selects a speed with which to hop from channel to channel. It hops in a clockwise 2 direction. The speed selected is either full or half speed. When a node has selected full speed, it broadcasts on a channel for 1 time unit. If it has selected half speed, it broadcasts on a 2 Each node has an array of available channels. Channels are sorted in either ascending or descending order. Clockwise traversal refers to stepping through the array from index 0 to n 1 where n is the number of channels. Counterclockwise would be the inverse direction. 2

8 channel for 2 time units. This speed is reselected every round 3. When nodes discover each other, it is referred to as a rendezvous. Upon rendezvous, the round terminates. 2.2 Random Speed Algorithm This algorithm is a generalization of the Full or Half Speed algorithm. A speed is chosen between 1 and 1 where k 2. When a node is hopping at a k rate of 1, that node broadcasts on a channel for k time units. k 2.3 Random Direction Algorithm Instead of the traversal speed, this algorithm varies the direction traveled being either clockwise or counterclockwise. This model requires that a dummy channel be added to the set of available channels when there are an odd number of channels available. This is done to ensure that rendezvous can occur. At the beginning of each round, a node selects a new direction of channel traversal until rendezvous occurs. 3 Maintain Channel Algorithm The central feature added by this project to work of Barbeau et al.[1] is the use of a secondary transmitter for maintaining communications as well as an algorithm to facilitate the selection of that channel. The secondary transmitter is only useful in situations where a node searches for multiple other nodes. The maintain transmitter remains inactive until a node s first discovery using the search transmitter. There are no benefits to using the algorithm proposed by this project in a two user scenario. In previous works [2, 3], a single transmitter method is used to allow nodes who have discovered each other to maintain communications thereafter. It is noted in [1] that in these multiple-users, multiple-hops scenarios, rendezvous is repeatedly applied between pairs which ensures a global rendezvous between multiple users. A set of parameters are exchanged between nodes. The largest set is adopted by both, allowing them to hop the same way. As previously stated, an algorithm determining the channel on which to maintain communications is implemented for the dual transmitter node in 3 Each round is based on the number of channels available to a node. The round begins by searching on the first channel, cycling through each channel until the last channel has been inspected. 3

9 this project. This algorithm is executed when two nodes discover each other. During this discovery, nodes exchange information regarding the channel on which they are currently maintaining communications and the size of the associated neighbourhood. Therefore, both nodes have access to the current search transmitter s channel (sch), each other s maintain transmitter s channel (mcha, mchb), and their respective number of neighbours (na, nb). These are used as parameters to the Maintain Channel Algorithm (Algorithm 1) to determine the channel on which to maintain communications. Algorithm 1 Maintain Channel 1: Given sch, mcha, mchb, na, nb. 2: 3: if (mcha and mchb are uninitialized) then 4: return sch 5: else if (mcha or mchb is uninitialized) then 6: return the initialized one of {mcha, mchb} 7: else if (mcha = mchb) then 8: return mcha 9: else if (na > nb) then 10: return mcha 11: else if (na < nb) then 12: return mchb 13: else 14: return (((mcha + mchb) mod 2) = 0)? mcha : mchb 15: end if The outcome of this algorithm generally causes smaller neighbourhoods to migrate towards larger neighbourhoods. However, there are several other possible scenarios. For example, as seen in line 3 of Algorithm 1, there is a situation where both nodes are finding their first neighbour. This means that their maintain transmitter is currently inactive (hence the uninitialized maintain channel). Therefore, both nodes switch their maintain transmitter to the current search channel, and their search channel is reselected as described by [1]. There is also a situation where nodes have the same number of neighbours (line 13 of Algorithm 1). In this case, one of the two maintain transmitter s channels are arbitrary chosen using the given information. In every situation, the two nodes generate the same output from the initial exchange of information. 4

10 4 Simulation Model 4.1 State Frame Model The state comparison simulation model addresses the issue of nodes independently interacting with each other as well as accounting for random clock drift 4. This model is implemented using a single process. The main method of that process initializes a population of nodes, each selecting their own speed, direction, and other attributes based on the channel hopping algorithm[1] being implemented. Each node then generates an entire round of state frames which are sequentially added to a queue. These channel hopping algorithms can assign a new speed, start channel and direction at the end of each round. With this in mind, the simulation allows nodes to generate enough state frames to represent one round of searching. These state frames are the foundation of this model. The main process pops the head off of each node s queue and inspects each of these state frames. These frames represent one instant in time, and therefore, by comparing these frames, the process is able to determine if two nodes discover each other during this instant. If two nodes discover each other, there is a series of updates that are made; these are described in the next section. To illustrate this state model, Figure 1 depicts the queued state frames of four nodes. From a high level view of this model, each state frame is represented as a colored rectangle. Each color represents a node s search transmitter s channel. Each state frame represents its node s state during some fraction of a time unit (in Figure 1, a state frame covers 0.1 of a time unit). A state frame contains a reference to the node who created it and all of that node s relevant attributes at that given time unit. This includes the direction and speed it was traveling, it s search and maintain transmitter s channels, the total time that nodes has spent searching, and all of it s neighbouring node s IDs. For simplicity sake, Figure 1 only highlights a portion of each frame s attributes. When the simulation is initialized, each node chooses a random channel from some set of channels on which to begin its search. It also chooses its speed and direction as specified by a channel hopping algorithm in [1]. At this point, the main process discards a random number of state frames to offset the start times of each node. If a node has k frames discarded representing t time unit(s), then it means that this node has already occupied the regulated spectrum for t time units when the main process begins comparing state frames. Figure 1 illustrates four nodes who 4 Random clock drift refers to the phenomena that clocks do not run at exactly the same time as each other and over time drift farther apart. 5

11 Figure 1: High level view of the state comparison model have all chosen the same speed, traveling at 1 time unit per channel. When we closely examine the state frames of nodes 2 and 3, we can see that they discover each other after searching for 3 and 2.3 time units respectively. At this moment, both nodes have no neighbours which means that Algorithm 1 will return the current search channel as the channel that should be used by each node s maintain transmitter. While Figure 1 represent a generic representation of the node state model, Figure 2 illustrates an example of a state model generated using the Full or Half Speed algorithm[1]. In this example, we can see that nodes 2 and 3 are traveling at full speed as they produce five state frames per channel. In comparison, nodes 1 and 4 are traveling at half speed as they produce ten state frames per channel. 6

12 Figure 2: State comparison model of Full or Half Speed Algorithm[1] 4.2 Consequences of a Successful Search Once two nodes discover each other and determine a channel on which to maintain communications, the main process makes a series of updates to the simulation model. First, the remaining state frames of the two nodes who have discovered each other must be deleted. Each node resets it s total search time with that of the current frame being examined. As described in [1], a new round of searching is executed immediately after discovery. This means that a new speed, direction, and starting search channel are selected. Since a successful search occurred for each node during frames with time t and s respectively, these nodes need to generate new state frames representing new states after these specified times. In general, nodes never make direct contact with each other in the simulation; it is the main process that informs a node of the contact with another node. Therefore, when these independent timelines are compared, and they intersect (with respect to the channel), the remaining state frames are made obsolete. After executing Algorithm 1, nodes generate a round of output independently of nodes external to it s newly discovered neighbourhood. However, this discovery affects the other nodes in a neighbourhood (being those who are not under scrutiny by the main process) differently. Neighbourhoods that needs to migrate are informed by the node initially making contact. This migration does not affect the neighbouring node s current search execution state. Neighbours only need to update the size of their neighbourhood and the channel on which that neighbourhood is maintaining communications. As illustrated by Figure 3, state frames of these neighbours only need to have their maintenance related information updated; they do not need to generate another set of state 7

13 frames. In this example, nodes 1 and 2 find each other using their search transmitters. Node 2 is already part of a neighbourhood which includes node 4. Therefore, when the main process updates the model, both nodes 1 and 2 generate a new round of state frames and node 4 updates it s maintenance information. This state frame generation and comparison repeats until all nodes are communicating. Once global rendezvous occurs, the total search time of the last node to begin its search is used as the total execution time of that simulation. Figure 3: Example update after successful search 4.3 Disadvantages of the Simulation Model The state frame simulation model is relatively easy to implement, monitor, and understand, but while it is generally straight forward, it has several 8

14 disadvantages. For instance, when two nodes discover each other, their interactions are instantaneous. This model does not account for any handshaking time 5. This model does not require any message exchange and therefore avoids having additional time loss associated with message creation, the acknowledgement of messages between two parties, retransmission of lost messages, etc. These factors can also lead to situations where nodes occupying the same channel are not guaranteed to make contact with each other. However, in the state frame model, two nodes occupying the same channel are guaranteed to make contact. Another disadvantage of this model is the arbitrary partitioning of time represented by each state frame. When this model executes a simulation using the Full or Half Speed Algorithm[1] for example, nodes will hop channels at a rate of either full or half speed. When nodes hop at full speed, they produce 5 state frames per channel, and when nodes hop at half speed, they produce 10 state frames per channel. While the concept of partitioning time into smaller pieces appeared to be logical, the appropriate size of a partition (of 5 and 10 in this case) was not as evident. It is clear that a finer partition results in greater accuracy, but the specifics of a reasonable partition size was an unclear. Therefore, the choice to produce 5 and 10 states frames for the Full or Half Speed Algorithm[1] simulation was made arbitrarily. This question of accuracy was also an issue with regards to a reasonably sized k in the Random Speed Algorithm[1]. In this algorithm, nodes hop channels at a speed of 1. Again, in an arbitrary fashion, a random value of k where k 1 k < 10 was chosen. Therefore, nodes traveling at a speed of, 1, and produce 10, 4, and 2 state frames per channel. 5 Simulation Results In order to generate comparable simulations to those appearing in [1], a similar set of parameters is used to run sets of tests. Each test measures the Time To Rendezvous(TTR) in population sizes of 10 and 20 nodes, each hopping over 10 to 100 different channels. The nodes share a percentage of common channels ranging between 10% and 100%. Each of these combinations is evaluated by taking the average execution time over 500 rounds. These values and methods are the same as those used in [1]. For the single and dual transmitter models to be equivalent, the dual model must discover 5 This is the time required to exchange parameters between the two nodes, setting up before the intended communication occurs. 9

15 nodes twice as fast as its single transmitter counterpart as it bears approximately twice the cost with a second transmitter. Figure 4 illustrates the global Time To Rendezvous (TTR) of two population sizes of 10 and 20 nodes implementing the Full or Half Speed Algorithm. It has no equivalent simulation in [1], so no comparisons can be drawn between the two bodies of work. However, comparisons can be drawn between simulations executing the generalized version of this algorithm as depicted by Figure 5 and 6. In these figures, there are noticeable differences between simulations executing the Random Speed Algorithm on single and dual transmitter nodes. Figure 5 depicts simulations on a population size of 10. In this scenario, dual transmitter nodes increasingly outperform their single transmitter counterparts. However, to recount, dual transmitter nodes cost twice as much. With access to 10 channels, the cost-benefit ratio between the two types of nodes is nearly equivalent. As nodes gain access to more channels, the dual transmitter models have higher cost-benefit ratios compared to their counterparts; however, the difference is marginal. Looking at Figure 6 representing a population size of 20 nodes, the cost-benefit ratio is significantly better as nodes gain access to more channels. If we compare the simulations of nodes accessing 100 channels where 50% to 100% of those channels are the same, dual transmitter nodes achieve a global rendezvous approximately 4 times faster than their counterparts. Stated another way, dual transmitter nodes are twice as efficient as single transmitter nodes in a population of 20 nodes. Similar results are depicted by Figures 7 and 8 when we compare the single and dual transmitter models executing the Random Direction Algorithm in population sizes of both 10 and 20 nodes. Some results are inconceivable. For example, when the Random Direction Algorithm is implemented (with either 10 or 20 nodes) with 10 of the same channels, each node is able to detect all its neighbours in 1 time unit. This fact is easily explained by the following. At first, nodes occupy 10 channels (only the search transmitter is active). There is almost certainly a single discovery during this initial moment. If only two nodes detect each other, these two nodes will activate their maintain transmitters and all nodes will occupy a total of 11 channels (10 searching + 1 maintaining). As nodes continue to discover each other, they activate their maintain transmitters and they occupy two channels. A maintain transmitter s channel must be occupied by at least two nodes, but it may be occupied by all ten nodes as well. So, while there are a variety of situations that may occur, it is guaranteed that at least one discovery is being made during each round of 10

16 Figure 4: Full or Half Speed Channel Hopping Algorithm (Dual Transmitter) (a) 10 Nodes (b) 20 Nodes inspections on a set of state frames. In general, the dual transmitter graphs have a steadily increasing trend for set of tests which appears similar in shape to the graphs of the single transmitter data. This correlation is satisfying as it appears that our simulations follow a similar trend to that of [1] s simulation data. 11

17 Figure 5: Random Speed Channel Hopping Algorithm (10 nodes) (a) Dual Transmitter (b) Single Transmitter (Reproduced with permission of the copyright owner from [1]) 12

18 Figure 6: Random Speed Channel Hopping Algorithm (20 nodes) (a) Dual Transmitter (b) Single Transmitter (Reproduced with permission of the copyright owner from [1]) 13

19 Figure 7: Random Direction Channel Hopping Algorithm (10 nodes) (a) Dual Transmitter (b) Single Transmitter (Reproduced with permission of the copyright owner from [1]) 14

20 Figure 8: Random Direction Channel Hopping Algorithm (20 nodes) (a) Dual Transmitter (b) Single Transmitter (Reproduced with permission of the copyright owner from [1]) 15

21 6 Conclusions With these positive results in mind, there are a few areas of this topic that could be examined by future work on this subject. For example, dual transmitter nodes could have both transmitters implementing a channel hopping algorithm (instead of restricting one transmitter to serve as a means of maintaining communications as suggested by this project). Another interesting idea would be to create nodes with n transmitters and determine the number of transmitters a node should activate given a certain environment (number of channels available, number of nodes required to terminate search, etc.) to optimize the speed/power ratio for a node to discover k nodes. One could potentially tune a node to activate and deactivate transmitters dynamically with respect to that node s surrounding environment in order to ensure optimal functionality. There are also aspects of this project that could be modified to attain better results. As noted earlier, a node currently does not use it s maintain transmitter until it has discovered another node. This transmitter could initially be used to execute a one of the channel hopping algorithms until the first discovery is made at which point it would be used to maintain communications. One could also partition more state frames per channel to increase the accuracy of this simulation model. While this may not increase the speed with which a group of nodes discover each other, it will certainly be a more accurate representation of reality. However, I would suggest that if state frames begin to represent more specific moments in time, the total number of frames produced in one function call should also represent a smaller period of time. In conclusion, dual transmitter nodes outperform single transmitter nodes when implementing either the Full or Half Speed, Random Speed, or Random Direction[1] algorithms alongside the Maintain Channel algorithm (Algorithm 1) proposed earlier. The results of these simulations suggest that as single and dual transmitter nodes are equally assigned greater numbers of channels as well as being assigned to larger neighbourhoods, dual transmitter nodes increasingly outperform single transmitter nodes. In general, the results suggest that dual transmitter nodes discover their neighbours 2 to 4 times as fast as their single transmitter counterparts. 16

22 References [1] M. Barbeau, G. Cervera, J. Garcia-Alfaro, and E. Kranakis. Common Channel Selection in a Multipoint Cognitive Radio Network. June [2] Z. Lin, H. Liu, X. Chu, and Y.-W. Leung. Jump-stay based channelhopping algorithm with guaranteed rendezvous for cognitive radio networks. In Proceedings of IEEE INFOCOM, pages , April [3] H. Liu, Z. Lin, X. Chu, and Y.-W. Leung. Jump-stay rendezvous algorithm for cognitive radio networks. IEEE Transactions on Parallel and Distributed Systems, 23(10): , [4] N. Theis, R. Thomas, and L. DaSilva. Rendezvous for cognitive radios. Mobile Computing, IEEE Transactions on, 10(2): ,

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Unit 1 Algebraic Functions and Graphs

Unit 1 Algebraic Functions and Graphs Algebra 2 Unit 1 Algebraic Functions and Graphs Name: Unit 1 Day 1: Function Notation Today we are: Using Function Notation We are successful when: We can Use function notation to evaluate a function This

More information

Theory of 3-4 Heap. Examining Committee Prof. Tadao Takaoka Supervisor

Theory of 3-4 Heap. Examining Committee Prof. Tadao Takaoka Supervisor Theory of 3-4 Heap A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Science in the University of Canterbury by Tobias Bethlehem Examining Committee Prof. Tadao Takaoka

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 623 Multicast Capacity of Packet-Switched Ring WDM Networks Michael Scheutzow, Martin Reisslein, Senior Member, IEEE, Martin Maier,

More information

On the Structure and Sizes of Infinitely Large Sets of Numbers

On the Structure and Sizes of Infinitely Large Sets of Numbers 1 On the Structure and Sizes of Infinitely Large Sets of Numbers Introduction: This paper introduces The Axiom for the existence of finite integers. The Axiom shows that sets of integers having only finite

More information

Organizing and Summarizing Data

Organizing and Summarizing Data 1 Organizing and Summarizing Data Key Definitions Frequency Distribution: This lists each category of data and how often they occur. : The percent of observations within the one of the categories. This

More information

10 THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter

10 THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter Introduction The digital multimeter (DMM) is the most commonly used instrument on an engineer s bench. We use it almost every day.

More information

Addresses in the source program are generally symbolic. A compiler will typically bind these symbolic addresses to re-locatable addresses.

Addresses in the source program are generally symbolic. A compiler will typically bind these symbolic addresses to re-locatable addresses. 1 Memory Management Address Binding The normal procedures is to select one of the processes in the input queue and to load that process into memory. As the process executed, it accesses instructions and

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,

More information

Chapter 5. Track Geometry Data Analysis

Chapter 5. Track Geometry Data Analysis Chapter Track Geometry Data Analysis This chapter explains how and why the data collected for the track geometry was manipulated. The results of these studies in the time and frequency domain are addressed.

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Analytical-Physical Modeling and Interoperability Propels BIM Advancements

Analytical-Physical Modeling and Interoperability Propels BIM Advancements Analytical-Physical Modeling and Interoperability Propels BIM Advancements A Bentley White Paper Raoul Karp, S.E. Vice President, Product Development Bentley Systems, Incorporated Josh Taylor, P.E. Senior

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Matthijs Gielen University of Twente P.O.Box 217, 7500AE Enschede The Netherlands m.w.gielen@student.utwente.nl ABSTRACT

More information

Data Link Layer (part 2)

Data Link Layer (part 2) Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

MEMORY MANAGEMENT/1 CS 409, FALL 2013

MEMORY MANAGEMENT/1 CS 409, FALL 2013 MEMORY MANAGEMENT Requirements: Relocation (to different memory areas) Protection (run time, usually implemented together with relocation) Sharing (and also protection) Logical organization Physical organization

More information

Downloaded from

Downloaded from UNIT 2 WHAT IS STATISTICS? Researchers deal with a large amount of data and have to draw dependable conclusions on the basis of data collected for the purpose. Statistics help the researchers in making

More information

COMPUTER SCIENCE 4500 OPERATING SYSTEMS

COMPUTER SCIENCE 4500 OPERATING SYSTEMS Last update: 3/28/2017 COMPUTER SCIENCE 4500 OPERATING SYSTEMS 2017 Stanley Wileman Module 9: Memory Management Part 1 In This Module 2! Memory management functions! Types of memory and typical uses! Simple

More information

Aston Hall s A-Z of mathematical terms

Aston Hall s A-Z of mathematical terms Aston Hall s A-Z of mathematical terms The following guide is a glossary of mathematical terms, covering the concepts children are taught in FS2, KS1 and KS2. This may be useful to clear up any homework

More information

Automated Cognitive Walkthrough for the Web (AutoCWW)

Automated Cognitive Walkthrough for the Web (AutoCWW) CHI 2002 Workshop: Automatically Evaluating the Usability of Web Sites Workshop Date: April 21-22, 2002 Automated Cognitive Walkthrough for the Web (AutoCWW) Position Paper by Marilyn Hughes Blackmon Marilyn

More information

General Objective:To understand the basic memory management of operating system. Specific Objectives: At the end of the unit you should be able to:

General Objective:To understand the basic memory management of operating system. Specific Objectives: At the end of the unit you should be able to: F2007/Unit6/1 UNIT 6 OBJECTIVES General Objective:To understand the basic memory management of operating system Specific Objectives: At the end of the unit you should be able to: define the memory management

More information

Synthetic Benchmark Generator for the MOLEN Processor

Synthetic Benchmark Generator for the MOLEN Processor Synthetic Benchmark Generator for the MOLEN Processor Stephan Wong, Guanzhou Luo, and Sorin Cotofana Computer Engineering Laboratory, Electrical Engineering Department, Delft University of Technology,

More information

WiFi Advisor Wireless LAN Analyzer Quick Start Guide. October 2015 Revision OCT-2015 Technical Assistance: GO VIAVI /

WiFi Advisor Wireless LAN Analyzer Quick Start Guide. October 2015 Revision OCT-2015 Technical Assistance: GO VIAVI / WiFi Advisor Wireless LAN Analyzer Quick Start Guide October 2015 OCT-2015 Technical Assistance: 1.844.GO VIAVI / 1.844.468.4284 1 Contents 1. WiFi Advisor Wireless LAN Analyzer Overview... 4 2. The WFED-300AC

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Memory. Objectives. Introduction. 6.2 Types of Memory

Memory. Objectives. Introduction. 6.2 Types of Memory Memory Objectives Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured. Master the concepts

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Process size is independent of the main memory present in the system.

Process size is independent of the main memory present in the system. Hardware control structure Two characteristics are key to paging and segmentation: 1. All memory references are logical addresses within a process which are dynamically converted into physical at run time.

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Jason P. Jue, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract Wavelength-division multiplexing

More information

Thus, it is reasonable to compare binary search trees and binary heaps as is shown in Table 1.

Thus, it is reasonable to compare binary search trees and binary heaps as is shown in Table 1. 7.2 Binary Min-Heaps A heap is a tree-based structure, but it doesn t use the binary-search differentiation between the left and right sub-trees to create a linear ordering. Instead, a binary heap only

More information

CARRIER OPTIMAL ROUTING

CARRIER OPTIMAL ROUTING CARRIER OPTIMAL ROUTING WebCOR Database Preparation Users Manual 2 Table of Contents Chapter 1...7 Getting Started in WebCOR...7 WebCOR Roles and Data Access...7 Data Access Privileges...8 Understanding

More information

File System Interface and Implementation

File System Interface and Implementation Unit 8 Structure 8.1 Introduction Objectives 8.2 Concept of a File Attributes of a File Operations on Files Types of Files Structure of File 8.3 File Access Methods Sequential Access Direct Access Indexed

More information

School of Computer and Information Science

School of Computer and Information Science School of Computer and Information Science CIS Research Placement Report Multiple threads in floating-point sort operations Name: Quang Do Date: 8/6/2012 Supervisor: Grant Wigley Abstract Despite the vast

More information

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Hashing. Hashing Procedures

Hashing. Hashing Procedures Hashing Hashing Procedures Let us denote the set of all possible key values (i.e., the universe of keys) used in a dictionary application by U. Suppose an application requires a dictionary in which elements

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Assessing Mathematics

Assessing Mathematics Assessing Mathematics Assessment materials Introduction The resources provided are: 1. Defining, and. 2. Defining 1, 2, 1, 2, 1 and 2. 3. Assessment grids. The Assessment grids are designed to provide

More information

Mathematics Mathematics Applied mathematics Mathematics

Mathematics Mathematics Applied mathematics Mathematics Mathematics Mathematics is the mother of science. It applies the principles of physics and natural sciences for analysis, design, manufacturing and maintenance of systems. Mathematicians seek out patterns

More information

Points covered an odd number of times by translates

Points covered an odd number of times by translates Points covered an odd number of times by translates Rom Pinchasi August 5, 0 Abstract Let T be a fixed triangle and consider an odd number of translated copies of T in the plane. We show that the set of

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

10 Reasons your WAN is Broken

10 Reasons your WAN is Broken Lack of Visibility Most WAN performance problems are driven by underperforming connections or applications. It isn t uncommon to be paying for a 20 Mbps WAN link that performs at 10 Mbps. The root cause

More information

Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks

Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 1, JANUARY 2015 71 Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks Ting-Yu Lin, Member, IEEE, Kun-Ru Wu,

More information

Programming 2. Topic 8: Linked Lists, Basic Searching and Sorting

Programming 2. Topic 8: Linked Lists, Basic Searching and Sorting RMIT School of Computer Science and Information Technology Programming 2 Topic 8: Linked Lists, Basic Searching and Sorting Lecture Slides COPYRIGHT 2008 RMIT University. Original content by: Peter Tilmanis,

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Please be sure to save a copy of this activity to your computer!

Please be sure to save a copy of this activity to your computer! Thank you for your purchase Please be sure to save a copy of this activity to your computer! This activity is copyrighted by AIMS Education Foundation. All rights reserved. No part of this work may be

More information

Decimals should be spoken digit by digit eg 0.34 is Zero (or nought) point three four (NOT thirty four).

Decimals should be spoken digit by digit eg 0.34 is Zero (or nought) point three four (NOT thirty four). Numeracy Essentials Section 1 Number Skills Reading and writing numbers All numbers should be written correctly. Most pupils are able to read, write and say numbers up to a thousand, but often have difficulty

More information

Traffic Simulator. Revised Software Requirements Specification. Khalid AlHokail Luke Bay James Grady Michael Murphy

Traffic Simulator. Revised Software Requirements Specification. Khalid AlHokail Luke Bay James Grady Michael Murphy Traffic Simulator Revised Software Requirements Specification Khalid AlHokail Luke Bay James Grady Michael Murphy Version 2.0 03/07/2007 Table of Contents 1. Map Model...2 1.1. Graph...2 1.2. Rules for

More information

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of

More information

Single Pass Connected Components Analysis

Single Pass Connected Components Analysis D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected

More information

CS Operating Systems

CS Operating Systems CS 4500 - Operating Systems Module 9: Memory Management - Part 1 Stanley Wileman Department of Computer Science University of Nebraska at Omaha Omaha, NE 68182-0500, USA June 9, 2017 In This Module...

More information

CS Operating Systems

CS Operating Systems CS 4500 - Operating Systems Module 9: Memory Management - Part 1 Stanley Wileman Department of Computer Science University of Nebraska at Omaha Omaha, NE 68182-0500, USA June 9, 2017 In This Module...

More information

AUTOMATED METHODOLOGY FOR MODELING CRACK EXTENSION IN FINITE ELEMENT MODELS

AUTOMATED METHODOLOGY FOR MODELING CRACK EXTENSION IN FINITE ELEMENT MODELS AUTOMATED METHODOLOGY FOR MODELING CRACK THEME Structural Analysis - Durability, Fatigue & Fracture. James J. Kosloski Senior Engineering Manager - CAE Associates Dr. Michael Bak Senior Engineering Manager

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

THE BRAID INDEX OF ALTERNATING LINKS

THE BRAID INDEX OF ALTERNATING LINKS THE BRAID INDEX OF ALTERNATING LINKS YUANAN DIAO, GÁBOR HETYEI AND PENGYU LIU Abstract. It is well known that the minimum crossing number of an alternating link equals the number of crossings in any reduced

More information

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach O. El Badawy, M. S. Kamel Pattern Analysis and Machine Intelligence Laboratory, Department of Systems Design Engineering,

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1.1 Introduction Given that digital logic and memory devices are based on two electrical states (on and off), it is natural to use a number

More information

17/05/2018. Outline. Outline. Divide and Conquer. Control Abstraction for Divide &Conquer. Outline. Module 2: Divide and Conquer

17/05/2018. Outline. Outline. Divide and Conquer. Control Abstraction for Divide &Conquer. Outline. Module 2: Divide and Conquer Module 2: Divide and Conquer Divide and Conquer Control Abstraction for Divide &Conquer 1 Recurrence equation for Divide and Conquer: If the size of problem p is n and the sizes of the k sub problems are

More information

SOLVING the MYSTERY of the TEOTIHUACAN GRIDS ANGLE [15.5], {first posted Hidden Mission Forum [Not Only 19.5] thread Feb 2008.}

SOLVING the MYSTERY of the TEOTIHUACAN GRIDS ANGLE [15.5], {first posted Hidden Mission Forum [Not Only 19.5] thread Feb 2008.} SOLVING the MYSTERY of the TEOTIHUACAN GRIDS ANGLE [15.5], {first posted Hidden Mission Forum [Not Only 19.5] thread Feb 2008.} The city of Teotihuacan is intricately laid out in distinct grid patterns,

More information

Alternate Animal Movement Routes v. 2.1

Alternate Animal Movement Routes v. 2.1 Alternate Animal Movement Routes v. 2.1 Aka: altroutes.avx Last modified: April 12, 2005 TOPICS: ArcView 3.x, Animal Movement, Alternate, Route, Path, Proportion, Distance, Bearing, Azimuth, Angle, Point,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

DASHBOARDPRO & DASHBOARD

DASHBOARDPRO & DASHBOARD DASHBOARDPRO & DASHBOARD In a world where text rules the flow of knowledge, how do you expand the content and present it in such a way that the viewer appreciates your hard work and effort to a greater

More information

Managing Exchange Migration with Enterprise Vault

Managing Exchange Migration with Enterprise Vault WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 23 Hierarchical Memory Organization (Contd.) Hello

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks

A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks Kaigui Bian, Jung-Min Jerry Park, and Ruiliang Chen Department of Electrical and Computer Engineering Virginia

More information

Mathematics Curriculum

Mathematics Curriculum 6 G R A D E Mathematics Curriculum GRADE 6 5 Table of Contents 1... 1 Topic A: Area of Triangles, Quadrilaterals, and Polygons (6.G.A.1)... 11 Lesson 1: The Area of Parallelograms Through Rectangle Facts...

More information

TABLES AND HASHING. Chapter 13

TABLES AND HASHING. Chapter 13 Data Structures Dr Ahmed Rafat Abas Computer Science Dept, Faculty of Computer and Information, Zagazig University arabas@zu.edu.eg http://www.arsaliem.faculty.zu.edu.eg/ TABLES AND HASHING Chapter 13

More information

Copyright 2015 Integrated Environmental Solutions Limited. All rights reserved.

Copyright 2015 Integrated Environmental Solutions Limited. All rights reserved. Tabular Room Data User Guide IES Virtual Environment Copyright 2015 Integrated Environmental Solutions Limited. All rights reserved. No part of the manual is to be copied or reproduced in any form without

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

outline Sensor Network Navigation without Locations 11/5/2009 Introduction

outline Sensor Network Navigation without Locations 11/5/2009 Introduction Sensor Network Navigation without Locations Mo Li, Yunhao Liu, Jiliang Wang, and Zheng Yang Department of Computer Science and Engineering Hong Kong University of Science and Technology, outline Introduction

More information

Administration Tools User Guide. Release April 2015

Administration Tools User Guide. Release April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Part Number: E62969_05 Oracle Financial Services Software, Inc. 1900 Oracle Way Reston,

More information

Policy-Based Spectrum Management

Policy-Based Spectrum Management Policy-Based Spectrum Management Prepared by : Sarah Dumoulin, Communications Research Centre, 3701 Carling Ave., Ottawa, K2H 8S2 Prepared for: Tricia Willink, Contract Technical Authority DRDC - Ottawa

More information

Combinatorial Maps. University of Ljubljana and University of Primorska and Worcester Polytechnic Institute. Maps. Home Page. Title Page.

Combinatorial Maps. University of Ljubljana and University of Primorska and Worcester Polytechnic Institute. Maps. Home Page. Title Page. Combinatorial Maps Tomaz Pisanski Brigitte Servatius University of Ljubljana and University of Primorska and Worcester Polytechnic Institute Page 1 of 30 1. Maps Page 2 of 30 1.1. Flags. Given a connected

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

TV White Space as a Rule Based Expert System. : Eric Samikwa (Malawi)

TV White Space as a Rule Based Expert System. : Eric Samikwa (Malawi) TV White Space as a Rule Based Expert System Researcher Supervisor : Eric Samikwa (Malawi) : Dr Chomora Mikeka (Malawi) Background Protection of incumbent users from interference within their service area

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Internetworking Wireless Nodes to A Control Area Network

Internetworking Wireless Nodes to A Control Area Network Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and

More information

Definition: A data structure is a way of organizing data in a computer so that it can be used efficiently.

Definition: A data structure is a way of organizing data in a computer so that it can be used efficiently. The Science of Computing I Lesson 4: Introduction to Data Structures Living with Cyber Pillar: Data Structures The need for data structures The algorithms we design to solve problems rarely do so without

More information

Server Memory Allocation White Paper VERSION 7.1. Copyright 2016 Jade Software Corporation Limited. All rights reserved.

Server Memory Allocation White Paper VERSION 7.1. Copyright 2016 Jade Software Corporation Limited. All rights reserved. VERSION 7.1 Copyright 2016 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your

More information

CAPE. Community Behavioral Health Data. How to Create CAPE. Community Assessment and Education to Promote Behavioral Health Planning and Evaluation

CAPE. Community Behavioral Health Data. How to Create CAPE. Community Assessment and Education to Promote Behavioral Health Planning and Evaluation CAPE Community Behavioral Health Data How to Create CAPE Community Assessment and Education to Promote Behavioral Health Planning and Evaluation i How to Create County Community Behavioral Health Profiles

More information

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET Er. Ravneet Singh Sahota 1, Er. Madan lal 2 1 M.Tech Student, Department of Computer engineering, Punjabi University Patiala,India

More information

Efficient Self-Reconfigurable Implementations Using On-Chip Memory

Efficient Self-Reconfigurable Implementations Using On-Chip Memory 10th International Conference on Field Programmable Logic and Applications, August 2000. Efficient Self-Reconfigurable Implementations Using On-Chip Memory Sameer Wadhwa and Andreas Dandalis University

More information