An Analytical Model for IEEE Point-to-Point Link

Size: px
Start display at page:

Download "An Analytical Model for IEEE Point-to-Point Link"

Transcription

1 An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, Abstract - Wreless mesh networks have attracted extensve research nterests n recent years. Wth the maturty and pervasve deployment of IEEE 82.a/b/g technology, 82. DF protocol s consdered as a promsng canddate for constructng the backbone of wreless mesh networks. In a multchannel mult-nterface wreless mesh network, pont-to-pont 82. wreless lnk can provde the hghest throughput; hence t s crtcal to understand the 82. throughput performance n a pont-to-pont confguraton. Ths paper presents a smple yet precse Markov model for the analyss of pont-to-pont 82. lnk performance n terms of saturaton throughput. Dfferent from prevously proposed analytcal models, our model does not assume a constant and ndependent collson probablty. Our analytcal model s valdated by computer smulatons for both 82.b and 82.g confguratons. I. Introducton Wreless mesh networks (WMNs) are ganng sgnfcant progress n both academa research and commercal deployment n recent years [6, 7]. It has been shown that the aggregated system throughput can be sgnfcantly mproved by explotng mult-channel and mult-nterface technque [8, 9,, ]. A typcal wreless mesh network s shown n Fg., whose backbone conssts of a set of wreless mesh routers. Wreless statons (.e., end users) can access the Internet by assocatng wth a nearby wreless mesh router. Wth a sutable channel assgnment scheme and the help of drectonal antenna, t s possble that two nearby wreless mesh routers are connected by dedcated pont-to-pont wreless channel. Ths can greatly ncrease the capacty of wreless mesh backbone because each channel s shared by only two wreless mesh routers. IEEE 82. s almost pervasvely deployed by wreless LANs nowadays. The supported data rate of 82. has also been ncreased from Mbps (82.b) and 54Mbps (82.a/g) to 3Mbps or even 6Mbps (82.n) [, 2, 3]. It s therefore very promsng to use IEEE 82. protocol n wreless mesh networks. Due to the lmted number of wreless channels, t s very crtcal to mprove the utlzaton of the scarce wreless spectrum. Our paper ams to analyze the saturaton throughput of IEEE 82. pont-to-pont lnk, and also to fnd a sutable system parameter whch can lead to the mum saturaton throughput. The performance of IEEE 82. has been actvely studed n the last years. Most of them focus on the scalablty of 82. DF,.e., how to handle a large number of wreless statons. al et al. [4] derves an analytcal model for 82. DF usng a p-persstent backoff scheme to approxmate the orgnal bnary exponental backoff scheme. Banch [5] proposes a Markov chan model to derve the saturaton throughput by assug a constant and ndependent collson probablty of a packet transmtted by each staton. Ths assumpton s accurate only when the number of statons n the wreless LAN s farly large, however. Our paper ams to develop a precse analytcal model to calculate the saturaton throughput of an 82. pont-to-pont lnk. The man dfference between our model and exstng models s that, our model does not make the assumpton that the collson probablty s constant and ndependent. Instead, our model makes a smple assumpton that W = 2W. Ths assumpton s reasonable for a pont-to-pont wreless lnk, as we wll show by computer smulatons that the saturaton throughput s almost a constant value for all ntegers of m where W = 2 m W. Our model acheves better accuracy as compared wth the well known Banch s model [5]. Internet Gateway Wreless Mesh Router Wreless tatons Fgure : A mult-channel mult-nterface wreless mesh network The rest of the paper s organzed as follows. ecton II brefly revews the 82. Dstrbuted oordnaton Functon (DF) protocol. ecton III presents a Markov model used to calculate the saturaton throughput for a pont-to-pont 82. DF lnk. In ecton IV, we valdate our model by comparng wth smulaton results, for both 82.b and 82.g confguratons. Fnally, ecton V concludes the paper. II. Dstrbuted oordnaton Functon (DF) The IEEE 82. standard s workng on both the physcal (PHY) and medum access control (MA) layers of the network. Other than consderng about the physcal detals, we wll concentrate on the MA layer protocol tself /8/$ IEEE 2536

2 The basc access method n the 82. MA protocol s DF (Dstrbuted oordnaton Functon) known as carrer sense multple access wth collson avodance (MA/A) []. DF employs a dstrbuted MA/A algorthm and an optonal vrtual carrer sense usng RT and T control frames. When usng the DF, before ntatng a transmsson, a staton senses the channel to detere whether another staton s transmttng. If the medum s found to be dle for an nterval that exceeds the Dstrbuted InterFrame pace (DIF), the staton proceeds wth ts transmsson. However f the medum s busy, the transmsson s deferred untl the ongong transmsson terates. A random nterval, henceforth referred to as the backoff nterval, s then selected; and used to ntalze the backoff tmer. The backoff tmer s decreased as long as the channel s sensed dle, stopped when a transmsson s detected on the channel, and reactvated when the channel s sensed dle agan for more than a DIF. The staton transmts when the backoff tmer reaches zero. MA/A s a strategy that ntends to avod collsons, but t can not elate collsons. When more than one node are countng down ther backoff tmers, there s a probablty that some of them have ther tmers reach zero at the same tme slot, and start transmttng at the begnnng of next tme slot smultaneously, whch causes a collson. The collson probablty ncreases wth the number of actve senders n the network. DF requres each sender to wat for a random backoff perod after the channel s dle for DIF, t adopts a slotted bnary exponental backoff scheme. The backoff tme s calculated as BackoffTme = Random() alottme where Random() ndcates a unformly dstrbuted random nteger between [, W ] and W represents the value of contenton wndow, whch starts from W, doubled each tme a retransmsson occurs, untl reachng the mum value W. III. Analytcal Model of DF We consder a smple ad hoc wreless network that conssts of two nodes, that s, a pont-to-pont network. The preassumptons of our model are: () only two nodes are n the network; (2) each node always has packets to send to the other one; (3) the probablty densty functon of both nodes backoff tmers are unformly dstrbuted n the same range, whch means that both nodes are competng for the channel equally. In our model, we set the W as twce of W, whch ndcates a 2-level exponental backoff scheme. Although the IEEE 82.g standard defnes a mult-level exponental backoff scheme where W = 2 m W, we wll show that there s neglgble dfference between 2-level and mult-level schemes for a pont-to-pont wreless lnk. A. The Markov ystem Model We use a Markov chan to model the network wth two nodes. Each node has a backoff tmer. Our model focuses on the dfference between two backoff tmers. Let each state n levels: the states from to the Markov chan be the current absolute dfference, n unt of tme slots, between the two backoff tmers. For nstance, state represents that currently the backoff tmer of one sender s tme slots longer than another sender s backoff tmer. Apparently, collson wll happen at state, because the two senders have the same backoff tmers and they wll transmt ther packets smultaneously. On the other hand, every nonzero state mples a successful transmsson. Fg. 2 shows the Markov chan model, n whch all states are dvded nto two W belong to the Low-Level, whle the states from W to W belong to the Hgh-Level. Let P { } denote the transton probablty from state to state. Then the transton probabltes are: P{ } = / W, =, = () P{ } = 2( W )/ W,, [, W ] (2) 2 P{ } = / W, [, W ], = (3) P{ } = 2/ W, [, W ], [,( W /2) ] (4) P{ } = / W, [,( W /2) ], [ +, W ] (5) P{ } = / W, [ W /2, W ], [ W, ] (6) P{ } = / W, [ W, W ], [ W +, ] (7) At the Low-Level, snce state represents collsons, Eqs. () and (2) account for the process followng a collson. In partcular, P { } s the probablty that system encounters two consecutve collsons. Eq. (3) represents the process that a successful transmsson s followed by a collson. Eq. (4) accounts for the process of backward transton, whch means a new random backoff tmer makes a new dfference that s smaller than the prevous dfference. In contrast, Eqs. (5) and (6) accounts for the forward transton. Once the state s at W or hgher, the system s at the Hgh-Level. A non-zero state always mples a successful transmsson ahead, whch wll be followed by a selecton of random number between and W. Therefore, all states n the Hgh-Level can only have backward transtons to ther prevous W states, whch s represented by Eq. (7). To llustrate the Markov model, the transton probablty matrx for W = 6 and W =32 s shown n Fg. 3. In ths matrx, I represents the value of /W, X represents the 2 value of 2/W, and Z represents the value of /W. There are W equatons and W unknown parameters n ths matrx. If we denote each entry n ths matrx as m [, ], and the soluton to ths matrx s q [], these equatons can be wrtten by: W q[ ] = q[] m[, ], [, W ]. (8) 2537

3 W W W / 2 W W W W + k + W + k W + k W Fgure 2: The Markov model (to save space, W and W are expressed as W and W, respectvely) Accordng to the property of Markov chan, ths matrx can be solved by numercal method. The soluton q[] denotes the probablty that the dfference between the two backoff tmers s tme slots. B. Dstrbuton of ystem Idle tme We denote X and Y as the random varable of both random backoff tmers. At the Low-Level, both nodes have ther unform dstrbuton of random backoff tmers: f x (X ) = f y (Y ) = / W, where X and Y range from to W. By solvng the Markov matrx, we can get the probablty dstrbuton of the dfference of backoff tmers n two levels; and we denote the soluton q [] as f ( X ' Y ' ). Wth the above soluton, we are now ready to calculate the system throughput. In terms of throughput analyss, what really matters s the system dle tme cost by the random backoff perod, and ths dle tme always equals the shorter backoff tmer at each transmsson round. In other words, we are about to use the soluton f ( X ' Y ' ) to fnd the probablty p, whch s the probablty that system s dle for tme slots n one transmsson round, and t can be calculated as followng: p = q[]/ W + ( q[]) / W = / W, = (9) W p = q[]/ W + q[ ]( W )/ W + q[ ](/ W + 2( W )/ W ), 2 2 [, W ] () 2 2 p = q[](/ W + 2( W ) / W ), [ W, W ] (). alculaton of ystem Throughput In order to calculate the throughput, we frst lst our notatons for the mportant parameters n Table : Table : Notatons of parameters T tme cost by successfully transmtted payloads, excludng backoff tme T T tme cost by successfully transmtted packets, ncludng backoff tme tme cost by collsons, ncludng backoff tme N number of successfully transmtted packets Payload Payload n bts, ncludng UDP IP LL headers, excludng MA header. Fgure 3: Transton Probablty Matrx LnkRate t The lnk rate n bps Basc tme cost of a collson,excludng backoff tme 2538

4 t UPay MacP AK Basc tme cost of a successful transmtted packet, excludng backoff tme UDP payload, the real data, excludng any headers, mum s 4728 n ths research. Mac frame length n a PDU, ncludng Payload plus F and/or all other tals on the MA layer. Ack frame length on the MA layer N number of symbols needed to encode a MA layer data, bl only for 82.g Rate ymbol encodng rate, only for 82.g. In ths paper, we defne the throughput as n equaton (2), T N Payload / LnkRate Throughput = =, (2) T + T T + T where N Payload, T and T can be calculated by: N = TotalRound ( q ), (3) Payload = ( LL + IP + UDP) Header + UPay, (4) W = + T TotalRound q p ( lottme t ), (5) W = + T TotalRound ( q ) p ( lottme t ), (6) For the calculaton of t and t, the 82.b and 82.g protocol should be treated respectvely: For 82.b, t and t can be expressed as: t = T + MacP / LnkRate + DIF + PROP, (7) PLP t = t + IF + T + AK / AckRate + PROP, (8) PLP MacP = Header ( MA + LL + IP + UDP ) + UPay + F, (9) TPLP = PLPpreamble/ PreambleRate + PLPheader / HeaderRate, (2) For 82.g, every 26 bts are encoded nto one symbol when the Lnk rate s 54Mbps, t and t can be expressed as: t = PLP / PlcpRate + N Rate + DIF + PROP (2) sbl t = t + IF + PLP / PlcpRate + AK / AckRate + PROP (22) MA = Header( MA + LL + IP + UDP) + UPay + F + ervce + Tal, (23) N bl = MA / ymbolze, (24) where Rate s 4µs/symbol and ymbolze s 26 bts n the 82.g standard, and N bl accounts for the number of symbols needed to encode a MA layer data unt. The system throughput can then be calculated by equatons (2)-(24). IV. Model Valdaton To valdate our analytcal model, we conduct smulaton studes on 82. pont-to-pont lnk. Two wreless statons are confgured n ad hoc mode and both of them generate saturated UDP traffc. We report the results of 82.b and 82.g WLANs n whch the RT/T scheme s dsabled. Table 2 lsts the of the PHY and MA parameters used n 82.b and 82.g standard. A. Throughput Analyss of 82.b In ths paper, our parameters n smulaton and analytcal model are all set accordng to the 82. standard. Fg. 4 plots the throughput of 82.b pont-to-pont lnk wth dfferent payload szes. We can observe that our analytcal model results are exactly the same as smulaton results. We also compare our model to Banch s model [5] n terms of throughput, under the set of PHY and MA parameters n Table 2. It s obvous that Banch s model devate from the smulaton results a lttle bt. Ths s because Banch s model assumes a constant and ndependent collson probablty, whch s only accurate when there are a large number of statons n the network. Meanwhle, n Fg. 4 we also present the throughput when W s set to 24. The throughput of W = 24 s slghtly lower than the throughput of W = 64, though the dfference s neglgble. In another word, our model can approxmate the system of W = 24 much better than Banch s model, though we assume W = 2W. B. Throughput Analyss of 82.g Fg. 5 shows the throughput results of 82.g. mlar to 82.b, our model s precse, whle Banch s model devates from the smulaton results a lot. A specal phenomenon n ths fgure s that the curve has a sawtooth shape, manly due to the feature of symbol encodng n 82.g. When sendng a packet, 82.g encodes every 26 bts nto one symbol; f the payload s not a multple of 26 bts, 82.g adds paddng bts. The paddng bts are consdered as overhead and not counted n our calculaton of throughput. Another observaton s that, the throughput of W = 24 s slghtly lower than the throughput of W = 32. Ths s because there are only two statons competng for the wreless channel. Table 2 IEEE 82.b and 82.g parameters [] [2] 82.b 82.g lottme 2 µs 2µs (n ad hoc mode) 2539

5 IFTme µs µs DIF 28 µs 28 µs aw 32 6 aw PLP Preamble 72 bts N.A. PreambleRate Mbps N.A. PLP Header 48 bts 2 bts HeaderRate 2 Mbps N.A. ervce + Tal N.A. 6 bts + 6 bts MA_Header 92 bts 92 bts LnkRate Mbps 54 Mbps Normalzed Throughput Banch's Model(W=32) Our Model(W=32) mulaton(w=32) Banch's Model(W=24) mulaton(w=24) AckRate 2 Mbps 24 Mbps ymbol Rate N.A. 4 µs/symbol.42 ymbolze N.A. 26 bts Normalzed Throughput Banch's Model(W=64) Our Model(W=64) mulaton(w=64) Banch's Model(W=24) mulaton(w=24) 2 3 UDP Payload (Bytes) Fgure 4: Normalzed Throughput of 82.b V. onclusons In ths paper, we proposed a precse Markov model to analyze lnk performance n IEEE 82. Pont-to-Pont networks. Ths model focuses on the analyss of system dle tme caused by the random backoff perod. We demonstrate that our model s precse for the case of W =2 W, and t also approxmates W = 2 m W for other values of m much better than Banch s model. Acknowledgement Ths work s supported by Hong Kong RG under grants HKBU 246, Hong Kong RG entral Allocaton grant HKBU /5, and Hong Kong Baptst Unversty under grant FRG/6-7/II UDP Payload (Bytes) Fgure 5: Normalzed Throughput of 82.g REFERENE 472 [] ANI/IEEE tandard 82., 999 Edton, Part : Wreless LAN Medum Access ontrol (MA) and Physcal Layer (PHY) pecfcatons. [2] IEEE 82. part : Wreless LAN medum access control (MA) and physcal layer (PHY) specfcatons, Amendment 4: Further hgher data rate extenson n the 2.4GHz Band, June 23. [3] Yang Xao, IEEE 82.n: enhancements for hgher throughput n wreless LANs, IEEE Wreless ommuncatons, December 25. [4] F.alì, M. ont, E. Gregor, IEEE 82. wreless LAN: capacty analyss and protocol enhancement, n Proc. of IEEE Infocom 98, pages 42-49, March 29 - Aprl 2, 998. [5] Guseppe Banch, Performance analyss of the IEEE 82. dstrbuted coordnaton functon, IEEE Journal on elected Areas n ommuncatons, Vol. 8, NO. 3, pages , March 2. [6] R. Karrer, A. abharwal, and E. Knghtly, Enablng large-scale wreless broadband: the case for TAPs, n Proc. of HotNets, ambrdge, MA, 23. [7] I. F. Akyldz, X. Wang, and W. Wang, Wreless mesh networks: a survey, omputer Networks Journal (Elsever), vol. 47, no. 4, pp , March 25. [8] A. Ranwala and T. cker hueh, Archtecture and algorthms for an IEEE 82.-based mult-channel wreless mesh network, n Proc. of IEEE Infocom 5, 25. [9] P. Kyasanur and N. Vadya, apacty of mult-channel wreless networks: Impact of number of channels and nterfaces, n Proc. of Eleventh AM Mobom 5, 25. [] P. Kyasanur, J. o,. heredd, and N. Vadya, Mult-hannel mesh networks: challenges and protocols, n IEEE Wreless ommuncatons, Aprl 26. [] J. h, T. alonds, and E. Knghtly, tarvaton mtgaton through Multhannel coordnaton n MA multhop wreless networks, n Proc. of AM MobHoc 6,

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Analysis of QoS in WLAN

Analysis of QoS in WLAN Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE 136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

Buffer-aided link selection with network coding in multihop networks

Buffer-aided link selection with network coding in multihop networks Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Sub-Critical Deficit Round-Robin Scheduler

A Sub-Critical Deficit Round-Robin Scheduler A Sub-Crtcal Defct ound-obn Scheduler Anton Kos, Sašo Tomažč Unversty of Ljubljana, Faculty of Electrcal Engneerng, Ljubljana, Slovena E-mal: anton.kos@fe.un-lj.s Abstract - A scheduler s an essental element

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Simulation and Exploration of RCP in the networks

Simulation and Exploration of RCP in the networks EE384Y Smulaton and Exploraton of P n the networks Sprng, 003 Smulaton and Exploraton of P n the networks hanghua He changhua@stanford.edu June 06, 003 Abstract P (ate ontrol Protocol) s a rate-based congeston

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Inter-protocol fairness between

Inter-protocol fairness between Inter-protocol farness between TCP New Reno and TCP Westwood+ Nels Möller, Chad Barakat, Konstantn Avrachenkov, and Etan Altman KTH, School of Electrcal Engneerng SE- 44, Sweden Emal: nels@ee.kth.se INRIA

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

TCP-Illinois: A Loss and Delay-Based Congestion Control Algorithm for High-Speed Networks

TCP-Illinois: A Loss and Delay-Based Congestion Control Algorithm for High-Speed Networks TCP-Illnos: A Loss and Delay-Based Congeston Control Algorthm for Hgh-Speed etworks Shao Lu, Tamer Başar and R. Srkant Abstract We ntroduce a new congeston control algorthm for hgh speed networks, called

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A Free-Collision MAC Proposal for Networks

A Free-Collision MAC Proposal for Networks 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

QoS-aware composite scheduling using fuzzy proactive and reactive controllers

QoS-aware composite scheduling using fuzzy proactive and reactive controllers Khan et al. EURASIP Journal on Wreless Communcatons and Networkng 2014, 2014:138 http://jwcn.euraspjournals.com/content/2014/1/138 RESEARCH Open Access QoS-aware composte schedulng usng fuzzy proactve

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information