Admission control issues in sensor clusters

Size: px
Start display at page:

Download "Admission control issues in sensor clusters"

Transcription

1 Admissio cotrol issues i sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear here Cotets I. Itroductio: admissio cotrol i wireless sesor ad ad hoc etworks 1 II. Operatio of the MAC layer 2 III. Performace uder asymmetric packet arrival rates 3 IV. Calculatig the admissio coditio 4 V. Performace of admissio cotrol 6 VI. Coclusio 7 Refereces 8 I. INTRODUCTION: ADMISSION CONTROL IN WIRELESS SENSOR AND AD HOC NETWORKS Wireless sesor etworks are expected to provide reliable evet sesig at the etwork sik for the logest possible time. These requiremets are somewhat coflictig, esp. i the case of etworks that use medium access protocols based o the ubiquitous CSMA-CA mechaism, where collisios may substatially affect trasmissio efficiecy ad thus impair etwork lifetime. This is the case with beaco eabled IEEE etwork clusters [2], despite the fact that the low rate WPAN (LR-WPAN) stadard is cosidered as a importat eablig techology for widespread, stadardized deploymet of sesor etworks [1]. I clusters, eergy is wasted i packet collisios ad active measures must be take to couter this effect. A geeral solutio to the above problem may be foud i the mechaism of admissio cotrol [12], i which a cetral authority most likely, a etwork coordiator or cluster head admits or rejects requests by idividual odes to joi the etwork or cluster. Most commo form of admissio cotrol is a cotetio-based mechaism which strives to maitai high utilizatio i the etwork uder cosideratio, whilst simultaeously miimizig cotetio. This goal Electroic address: jmisic@cs.umaitoba.ca; This research is partly supported the NSERC Discovery Grat. Electroic address: vmisic@cs.umaitoba.ca may be achieved through simple meas such as limitig the umber of odes or devices i the cluster, but more complicated schemes that use a combiatio of traffic characteristics ad Quality-of-Service (QoS) idicators, such as delay ad throughput, have bee proposed as well. The fact that fairess is aother desirable goal further complicates the desig of suitable admissio cotrol techiques. It is worth otig that admissio cotrol techiques have log bee studied as a promisig approach to solvig the geeric problem of improvig badwidth utilizatio whilst maitaiig the desired QoS idicators withi prescribed limits. The problem was first idetified i cellular etworks (i.e., mobile telephoy), where traffic is predomiatly composed of voice calls with well kow ad stadardized traffic characteristics, ad issues related to admissio cotrol ca be treated i isolatio from issues related to PHY ad other layers. As a result, a umber of proposals for admissio cotrol i this eviromet have bee described. More recetly, ad hoc ad sesor etwork applicatios have received much less attetio o accout of their higher complexity caused by users mobility ad eergy cosideratios. Moreover, admissio cotrol i wireless ad hoc ad sesor etworks is usually treated together with other aspects of the Medium Access Cotrol (MAC) layer fuctioality, ofte uder the geeric label of resource allocatio or resource maagemet. Time-Divisio Multiple Access (TDMA) techiques, bearig strog resemblace to cellular etworks, probably offer the simplest way i which admissio cotrol ca be eforced. The mai challege, i this case, is to calculate the impact of the traffic geerated by a ode which requests admissio, while actual badwidth allocatio is coducted by the cetral cotroller which allocates a certai umber of time uits to idividual odes. For example, this approach ca be used i Bluetooth picoets, where all commuicatios are sychroized to, ad cotrolled by, the picoet master [3]. I other types of etworks sychroizatio may be much more difficult to achieve, which meas that TDMA-based approach may ot be a viable optio for implemetig admissio cotrol. Admissio cotrol is much more complex i CSMAbased ad hoc etworks where all odes, oce admitted, have to coted for medium access. Effective admissio cotrol ecessitates the availability of a suitable traffic moitorig ad shapig (policig) mechaism, which is used i two ways. First, the ode which requests admis-

2 2 sio must advertise its traffic parameters, hece the eed for moitorig. Secod, the ode which gets admitted to the etwork must be able to maitai its traffic rate withi the allocated portio of the total available badwidth; hece the eed for traffic shapig. This is a commo theme i most, if ot all, related proposals: the Admissio Cotrol ad Dyamic Badwidth Maagemet scheme [11], the Cotetio-Aware Admissio Cotrol (CACP) [12], both of which are described i the cotext of IEEE etworks, as well as i the schemes for peer to peer etworks [9, 10]. Sesor etworks pose a slightly differet set of challeges. I most cases, sesor odes are ot mobile; but o the other had, sesor odes are ofte required to operate o battery power for prologed periods of time. What this meas is, that the etwork topology is agai ostatioary ot because of mobility, but because of the fact that sesor odes will evetually exhaust their power source ad cease fuctioig. Eergy efficiecy becomes oe of the mai factors that affect the desig of the etwork ad dictate the choice of commuicatio techology ad operatig regime, if ot the mai such factor. It is worth otig that eergy efficiecy is importat both for idividual odes ad for the etwork as a whole. I this case, badwidth utilizatio may simply be regulated through a sleepig mechaism that is applied to the large umber of odes preset i the cluster after beig admitted by the cluster coordiator. I this case, each ode is free to udertake the trasmissio of its packets (provided there are some) wheever it wakes up from sleep; this sleep may be coordiated i a cetralized maer (i.e., through explicit commads set by the cluster coordiator) or i a distributed fashio, where each ode goes to sleep of its ow volitio, based o some aggregate iformatio broadcast by the cluster coordiator. A example of the latter solutio was origially proposed i [6]. It is also possible to combie the two approaches described above ito a sigle scheme. I this cases, odes go to sleep, but are ot automatically allowed to trasmit whe they wake up. Istead, they first check with the cluster coordiator whether they are permitted to trasmit; if ot, they go to sleep agai. The cluster coordiator, o the other had, will oly admit (ad allow trasmissio by) the umber of odes that allows the etwork to perform the sesig task without excessive collisios. A suitable admissio scheme ca be developed based o the activity maagemet model from [6]. However, this model is rather complex ad requires umerical solutio of a large umber of o-liear equatios. While this solutio is acceptable for off-lie performace aalysis, it is virtually itractable whe admissio decisios have to be made i real time. I order to fid a viable solutio for the sesor etwork eviromet, we have developed a simplified cluster model that ca be repeatedly solved usig limited computatioal resources available to the cluster coordiator. The model uses umber of odes, average packet arrival rate, ad packet legth as idepedet variables; from these, it calculates packet service time, which is the used as the major admissio coditio. This simplified cluster model is developed usig the results of simulatio experimets coducted o clusters with a variable umber of odes, assumig that the packet arrival rates are ot symmetric but follow a uiform distributio istead, with small to moderate deviatios from the average value. The remaiig part of the chapter is orgaized as follows. I Sectio II we briefly discuss the operatio of MAC layer. I Sectio III, we discuss the performace of the cluster ad idetify the mai performace idicators that ca be used for admissio cotrol. The admissio cotrol scheme is derived i Sectio IV; it is computatioally lightweight ad thus suitable to be applied i resource-costraied sesor cluster. The performace of the admissio cotrol scheme is evaluated i Sectio V. Sectio VI cocludes the chapter. II. OPERATION OF THE MAC LAYER I beaco-eabled etworks, the chael time is divided ito superframes delimited by the trasmissio of etwork beacos by the etwork (or PAN) coordiator. The superframe cosists of a active portio, durig which the coordiator iteracts with the odes, ad a optioal iactive portio, durig which all devices may eter a low power mode to reduce power cosumptio. The active portio of each superframe is divided ito equally sized slots. Each slot cosists of 3 2 SO backoff periods which gives the shortest active superframe duratio abasesuperframeduratio of 48 backoff periods. Whe the cluster operates i the ISM bad at 2.4GHz, the duratio of the backoff period is 10 bytes, the duratio of oe slot is bytes, ad the maximum data rate is 0kbps. The active portio of the superframe is divided ito a Cotetio Access Period (CAP) ad a optioal Cotetio-Free Period (CFP), as show i Fig. 1. The access mode i the CAP period is slotted CSMA-CA, similar to I this case, the trasmissio of a packet begis with a backoff coutdow, with the iitial cout chose at radom to avoid cotetio. If the active portio of the superframe eds while the coutdow is i progress, the coutdow will be froze durig the iactive portio of the superframe ad will resume immediately after the beaco i the ext superframe. After the coutdow, the device listes to the chael to make sure it is idle; this is referred to as the Clear Chael Assessmet (CCA). The stadard prescribes two CCAs, both of which must successfully pass for the trasmissio to begi. A successful trasmissio is optioally ackowledged withi a predefied time period. The absece of ackowledgmet (ACK) idicates that the trasmissio has failed (which may be due to a collisio with aother trasmissio, or packet blockig because of buffer overflow) ad

3 3 Beaco cotetio-access period (CAP) cotetio-free period (CFP) guarateed time slot (GTS) GTS superframe duratio (SD) beaco iterval (BI) iactive Beaco FIG. 1: The compositio of the superframe i a cluster (adapted from [2]). must be repeated. If the remaiig time after the coutdow does ot suffice for the two CCAs, the packet trasmissio, ad subsequet ackowledgmet, all of those activities are deferred to the ext superframe. (A more detailed discussio of the operatio of the MAC layer i the slotted CSMA-CA mode ad its performace limitatios ca be foud i [5].) I this work, we assume that the cluster operates i beaco eabled, slotted CSMA-CA mode uder the cotrol of a cluster (PAN) coordiator. We assume that all trasmissios are set from the sesor odes to the cluster coordiator, i.e., there is uplik traffic oly, which is commo i simple sesor etworks. We also assume that all trasmissios are ackowledged. III. PERFORMANCE UNDER ASYMMETRIC PACKET ARRIVAL RATES I order to develop the admissio cotrol algorithm, we have simulated a IEEE cluster usig the object-orieted Petri et simulatio egie Artifex by RSoft desig, Ic. [8]. The goal of this aalysis is to ivestigate the impact of differet parameter values o cluster performace, i particular the effect of the asymmetry of the load origiatig from idividual sesors, ad to idetify parameters that might be suitable cadidates for the implemetatio of a admissio cotrol scheme. For these simulatios, we assumed that the etwork operates i the ISM bad at 2.4 GHz, with the maximum data rate of 0kbps. The cluster had the coordiator ad = 5, 15, ad ordiary sesor odes, respectively. Packet arrival rates at each of the ordiary odes were uiformly distributed i the rage of (1 δ)λ to (1+δ)λ, where the variatio spa δ took values from 0.1 to 0.8, ad λ was the arrival rate averaged over all odes. (For example, the load variatio of δ = 0.5 correspods to uiformly distributed arrival rates i the rage betwee 0.5λ, ad 1.5λ.) We assume the packet size is fixed at 90 bytes, which icludes all PHY ad MAC layer headers. Ordiary odes had buffers that ca hold L = 3 packets. All other parameters were set to default values prescribed i the stadard [2]. I this setup, we have measured the throughput ad the service time. The correspodig values are show i top ad middle rows of Fig. 2 as fuctios of the average packet arrival rate for the etire cluster λ ad the load variatio spa δ. Note that the mea packet service time does iclude the effect of packet retrasmissios: amely, if the sedig ode does ot receive a ackowledgmet from the cluster coordiator, it will assume that the packet is lost due to a collisio. The sedig ode will the repeat the trasmissio util the proper ackowledgmet is received. From these diagrams, two importat observatios ca be made. First, cluster performace is predomiatly depedet o the total traffic load i the cluster, but virtually idepedet of the load asymmetry, i.e., the load variatio amog idividual cluster odes. This observatio holds for both throughput ad mea packet service time, uder a rather wide rage of idividual ode traffic. Note that a variatio of δ = 0.8 meas that the values of traffic load for idividual odes is uiformly distributed i the rage from λ i to 1.8λ i, where λ i is the mea packet arrival rate per ode. The secod observatio is that the cluster effectively goes ito saturatio beyod a certai traffic load. Saturatio is caused by the CSMA-CA algorithm which allows collisio of packets set by differet odes. As log as the umber of odes is small ( = 5, 15), the overall rage of traffic loads i the diagrams is small ad the cluster does ot saturate. However, i the cluster with = odes, the probability of collisios is much higher. Whe the traffic load exceeds a certai level, the collisios become prevalet. Whe this happes, the majority of the badwidth is take up by retrasmissios ad the overall cluster efficiecy decreases. At the same time, the sesor odes are forced to reject or drop ewly arrived packets, sice the iput buffers are occupied by the packets awaitig retrasmissio. The cumulative effect of those pheomea is that the throughput experieces a sharp decrease, Fig. 2(c), while the packet service time shows a large icrease due to packet retrasmissio, Fig. 2(f). Note that collisios, effectively, waste badwidth; the presece of a large umber of collisios meas that the odes are usig up their eergy resources without actually maagig to sed useful data. Therefore, the umber of collisios must be kept as low as possible i order to coserve eergy. A detailed aalysis of eergy cosumptio is beyod the scope of this chapter; a suitable activity maagemet algorithm for etworks ca be foud i [7]. I order to verify that the aforemetioed effects are ideed caused by overwhelmig umber of collisios, we have also measured the probability of successful trasmissio γ, which is show i the bottom row of Fig. 2. As ca be see, the success probability is over 0.9 i the cluster with five odes (ote that seemigly large variatios are due to the reduced vertical rage for γ), ad drops to about 0.55 i the cluster with 15 odes. However, whe saturatio occurs i the cluster with odes, the success probability virtually drops to zero, as show

4 Th lambda delta (a)throughput with = 5 odes Th lambda delta (b)throughput with = 15 odes Th lambda delta (c)throughput with = odes lambda delta (d)mea packet service time with = 5 odes delta 150 lambda (e)mea packet service time with = 15 odes lambda delta (f)mea packet service time with = odes gamma lambda delta (g)success probability with = 5 odes gamma gamma lambda delta lambda delta (h)success probability with = 15 odes. (i)success probability with = odes. FIG. 2: Cluster performace uder asymmetric traffic: cluster throughput (top row), mea packet service time (middle row), ad probability of successful trasmissio (bottom row). i Fig. 2(i), which cofirms our aalysis. IV. CALCULATING THE ADMISSION CONDITION The aalysis preseted above ca be summarized as follows. First, the mai factor affectig performace is the total cluster load, rather tha the degree of asymmetry amog the odes i the cluster. Cosequetly, the aalysis results, ad admissio schemes derived thereof, for the case of symmetric cluster traffic ca safely be utilized for clusters with asymmetric traffic. Iterestigly eough, similar coclusio were made i the cotext of Bluetooth picoets [3]; however, the uderlyig mechaism that leads to this idepedece is quite differet sice Bluetooth uses TDMA. Secod, the mai objective of the admissio cotrol i a cluster is to prevet the oset of the saturatio coditio. I view of this, the actual admissio algorithm is quite simple. The cluster coordiator moitors the operatio of the cluster, i particular the traffic load. Whe the ew ode requests admissio, the cluster coordiator calculates whether the added traffic will cause the cluster to move ito saturatio. If the aswer is egative, the ew ode is admitted to the cluster. The ext step is to fid a suitable idicator variable, ad to devise the actual algorithm for the ecessary calculatio. I a earlier work, the performace of the etwork uder symmetric load was cosidered [4], ad it was foud that the forthcomig saturatio regime is reliably

5 5 predicted by ay of the followig coditios: packet service times which are loger tha a certai value (approx. 50 backoff periods); trasmissio success probability lower tha about 70%; fially, access probability at the ode larger tha a certai value (aroud 0.005). While ay of these descriptors ca be used for the purpose of admissio cotrol, the packet service time appears to be the most accurate idicator of the overall cluster load. Therefore, we will focus o calculatig or approximatig the packet service time as the mai idicator of the cluster operatig regime. A promisig startig poit is the aalytical model for a cluster with uplik traffic described i [6]. But before we proceed, let us first itroduce the ecessary otatio. Let the PGF of the data packet legth be G p (z) = 12 p k z k, where p k deotes the probability of the packet k=2 size beig equal to k backoff periods or 10 k bytes. The, the mea data packet size is G p(1) backoff periods. Let the PGF of the time iterval betwee packet trasmissio ad subsequet ackowledgemet (ACK) be t ack (z) = z 2 ; actually its value is betwee aturaroud- Time ad aturaroudtime + auitbackoffperiod [2], but we roud the expoet to the ext higher iteger for simplicity. Also, let G a (z) = z stad for the PGF of the ACK packet duratio. We ote that the timig prescribed by the stadard precludes the possibility that a ACK will collide with the trasmissio of a packet from aother device. The, the PGF for the total trasmissio time of the data packet will be deoted with D d (z) = z 2 G p (z)t ack (z)g a (z), while its mea value is D d = 2 + G p(1) + t ack (1) + G a(z). Let us deote the probabilities that the medium is idle o first ad secod CCA with α ad β, respectively, ad the probability that the trasmissio is successful with γ. Note that the first CCA may fail because of a packet trasmissio i progress (origiatig from aother device), ad this particular backoff period may be at ay positio with respect to that packet. The secod CCA, however, fails oly if some other device has just started its trasmissio i.e., this must be the first backoff period of that packet. Sice the correspodig probabilities differ, we eed two differet variables. The simplified probability that the medium is busy at the first CCA is 1 α = (1 (1 τ) 1 (G p(1) + G a(1))) D d (1) where τ deotes the access probability i.e., the probability that the packet will be trasmitted. (γ deotes the probability that the trasmissio will be successful.) If the cluster operates i o-saturated regime, we are able to igore the potetial cogestio effects at the begiig of superframe due to delayed trasmissios from previous superframe, as described i Sectio II. I this case, the access probability τ is uiform throughout the superframe ad the above expressio holds. The probability that the medium is idle o the secod CCA for a give ode is, i fact, equal to the probability that either oe of the remaiig 1 odes has started a trasmissio i that backoff period. The the probability of success of secod CCA becomes: β = (1 τ) 1 (2). By the same toke, the probability of success of the whole trasmissio attempt becomes: γ = β D d (3) The PGF of the time eeded to coduct oe trasmissio attempt (potetially usuccessful) is where A(z) = m i=0 j=0 i (B j (z)r ud ) z 2(i+1) (αβt d (z)) m i=0 j=0 i R ud αβ (4) T d (z) = G p (z)t ack (z)g a (z) represets the trasmissio ad ACK time without the backoff procedure; R ud = 1 αβ is the probability that oe CCA will ot be successful; B j (z) = W j 1 k=0 1 z k = zwi 1 W j W j (z 1) represets the PGF for the duratio of j-th trasmissio attempt; ad 0.. W i 1 represets the backoff couter value i i-th trasmissio attempt. If the battery savig mode is ot tured o the W 0 = 7, W 1 = 15, W 2 = W 3 = W 4 = 31. If we assume that trasmissio will evetually succeed i five attempts, which is reasoable uder light to moderate load, the probability distributio of the packet service time follows the geometric distributio ad its PGF is T (z) = (A(z)(1 γ)) k A(z)γ = k=0 γa(z) 1 A(z) + γa(z) (5)

6 6 I this case, mea packet service time ca simply be writte as T = T (1) = A (1) γ (6) The period betwee two cosecutive packet service times also depeds o the state of the iput buffer of the device i questio. If the buffer is ot empty after packet departure (whe positive ackowledgemet is received), the the ext service time will start immediately; if the buffer is foud to be empty after a successful packet trasmissio, the ext service period starts whe the ext packet arrives. If the probability that the buffer is empty after a packet trasmissio is deoted with π 0, the mea time period betwee two packet departures is P = T + π 0, ad the period betwee two trasmissio λ i attempts by the same device is p = A + π 0γ λ i (7) I a previous work [6], the probability distributio of the legth of device queue were derived usig the M/G/1/K queueig model coupled with the Markov chai model of the MAC algorithm. Due to the large computatioal complexity of the model, the probability π 0 could be obtaied oly through elaborate umerical calculatios. While this approach is appropriate for offlie performace evaluatio, it is defiitely usuitable for real-time admissio cotrol. The limited computatioal resources of sesor odes ecessitates a much simpler solutio. I order to arrive at a suitable algorithm, we have made two simplifyig approximatios. First, the expressio for the mea time for a trasmissio attempt was simplified by retaiig just the first two members of the Taylor series expasio aroud poit τ = 0. The accuracy of the approximate solutio was foud to be quite sufficiet. Secod, we have assumed that the product π 0 γ is approximately costat ad equal to. The, the approximate period betwee trasmissio attempts is p = Ã + λ i (8) I this case the access probability for ode becomes: τ =. (9) 1 p lambda (a)packet service time lambda (b)success probability. FIG. 3: Approximatio of performace idicators. 50 ad we ca solve equatio 9 algebrically for τ usig, λ i ad D d as parameters. Thus, we ca obtai approximate values for Ã, γ, ad as fuctios of, λ i ad D d. The latter two are show i Fig. 3, for D d = 9. V. PERFORMANCE OF ADMISSION CONTROL I order to verify the performace of the admissio cotrol, we have augmeted the simulator with the calculatio of approximate expressios τ, γ, ad. The cluster was set with variable umber of odes, startig with =15 odes ad addig oe ode at a time. The packet arrival rate of each ode is featured both i symmetric ad i asymmetric approach. I symmetric approach, we assumed the packet arrival rate λ = 2 packets per secod for each ad every ode. I asymmetric case, each of the odes featured a variable packet arrival rate λ i for i=1.. where the load variatio spa δ took value of 0.5 ad the average packet arrival rate λ = 2 packets per secod. I both cases, the packet size was set to ie backoff periods. After every 120 secods, a ew ode applied for admissio. The cluster coordiator the performed the approximate calculatios outlied above to obtai the approximate packet service time. The ode is admitted based o a desirable admissio coditio. The admissio coditio is set as the smallest duratio of a superframe 48 backoff periods i terms of packet service

7 7 50 Measured ad calculated service times Measured ad calculated service times (a)symmetric traffic (b)asymmetric traffic. FIG. 4: Measured ad calculated service times of idividual odes. time. The mea packet service time is below 48 backoff periods meas most of the packets will be processed withi a sigle superframe, which is certaily desirable from the stadpoit of eergy coservatio. The algorithm that the coordiator executes to admit a ew ode is as follows: Data: umber of existig odes ; packet arrival rates λ i ; ew ode packet arrival rate λ Result: admissio decisio calculate the ew umber of odes = + 1 ; if traffic load is asymmetric the calculate the ew average arrival rate λ avg = (λ 1 + λ λ + λ )/ ; else calculate λ avg = λ ; ed obtai approximate packet service time usig ad λ avg ; if 48 the allow the ew device to joi ; update =, λ +1 = λ ; else reject admissio ; retai existig value of ; ed Algorithm 1: Admissio policy. The calculated ad measured values for packet service time uder symmetric ad asymmetric traffic are show i Fig. 4(a) ad Fig. 4(b), respectively. Short horizotal lies show approximate values of service times as calculated by the algorithm, while circle poits show measured values (averaged over a five secod time widow) after admissio. The superimposed lie at T = 48 is set as a desirable admissio coditio. We observe very close match betwee calculated ad simulated values for both symmetric ad asymmetric traffic. We also observe that the admissio coditio is same i both cases, allowig 31 odess to get admitted with a average packet arrival rate λ = 2 packets per secod. Iterestigly, measured values of packet service time do ot icrease all the time with icreasig umber of odes i asymmetric case sometimes simulatio results with higher umber of odes fall slightly behid the simulatio results with lower umber of odes. The reaso for such behaviour will be clear if we observe the diagram show i Fig. 6, which shows the distributio of packet arrival rates amog the odes i the case of asymmetric traffic. Although we assume that the distributio of load variatio is uiform i the rage of 50% aroud the mea, the umber of samples (which is betwee 15 to 31) is ot sufficietly high eough to geerate a steady average arrival rate λ. As a result, whe a ew ode is admitted, the ew average arrival rate may vary withi a few percet of the average arrival rate λ. Thus, after admittig a ew ode, the ew measured service time is affected by the curret umber of odes as well as the ew average arrival rate. For example, the avearge service time geerated by a cluster of size 20 odes with λ = 2.03 packets per secod may be slightly greater tha the service time geerated by 21 odes with λ = 1.98 packets per secod. VI. CONCLUSION We have developed simplified aalytical expressios for the packet service time that ca be used for admissio cotrol at the cluster coordiator. Simulatio results for symmetric traffic show that simplified admissio coditio is slightly more coservative tha the accurate value.

8 8 Service time distributio of idividual odes Service time distributio of idividual odes (a)symmetric traffic (b)asymmetric traffic. FIG. 5: Packet service time distributio of idividual odes. [1] E. H. Callaway, Jr. Wireless Sesor Networks, Architecture ad Protocols. Auerbach Publicatios, Boca Rato, FL, [2] adard for part 15.4: Wireless MAC ad PHY specificatios for low rate WPAN. IEEE d , IEEE, New York, NY, Oct [3] J. Mišić, K. L. Cha, ad V. B. Mišić. Admissio cotrol i Bluetooth picoets. IEEE Trasactios o Vehicular Techology, 53(3): , May [4] J. Mišić, S. Shafi, ad V. B. Mišić. Performace of beaco eabled PAN with uplik trasmissios i o-saturatio mode - access delay for fiite buffers. I Proc. BroadNets 2004, pages 416 4, Sa Jose, CA, Oct [5] J. Mišić, S. Shafi, ad V. B. Mišić. Avoidig the bottleecks i the MAC layer i low rate WPANs. I Proc. HWISE2005 (ICPADS 2005 Workshops), pages , Fukuoka, Japa, July [6] J. Mišić, S. Shafi, ad V. B. Mišić. Maitaiig reliability through activity maagemet i sesor etworks. I Proc. Qshie 2005, Orlado, FL, Aug [7] V. B. Mišić, J. Fug, ad J. Mišić. Cross-layer activity maagemet i a sesor etwork. IEEE Commuicatios Magazie, 44(1): , Ja [8] RSoft Desig, Ic. Artifex v Sa Jose, CA, [9] N. Saxea, G. Tsudik, ad J. H. Yi. Admissio cotrol i Peer-to-Peer: desig ad performace evaluatio. I Proc. SASN 03, pages , Fairfax, VA, [10] N. Saxea, G. Tsudik, ad J. H. Yi. Access cotrol i ad hoc groups. I Iteratioal Workshop o Hot Topics i Peer-to-Peer Systems, pages 2 7, Voledam, The Nederlads, Oct [11] S. H. Shah, K. Che, ad K. Nahrstedt. Dyamic Badwidth Maagemet i Sigle-Hop Ad Hoc Wireless Networks. Mobile Networks ad Applicatios, 10: , [12] Y. Yag ad R. Kravets. Cotetio-aware admissio cotrol for ad hoc etworks. IEEE Trasactios o Mobile Computig, 4(4): , July-August 2005.

9 9 180 Packet arrival rate of idividual ode T FIG. 6: Packet arrival rate of idividual odes uder asymmetric traffic.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Research Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications

Research Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications Hidawi Publishig Corporatio Iteratioal Joural of Telemedicie ad Applicatios Volume 29, Article ID 98746, 13 pages doi:1.1155/29/98746 Research Article Delay Aalysis of GTS Bridgig betwee IEEE 82.15.4 ad

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Appendix A. Use of Operators in ARPS

Appendix A. Use of Operators in ARPS A Appedix A. Use of Operators i ARPS The methodology for solvig the equatios of hydrodyamics i either differetial or itegral form usig grid-poit techiques (fiite differece, fiite volume, fiite elemet)

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

QoS Management: A Model-Based Approach

QoS Management: A Model-Based Approach Copyright ad Referece Iformatio: This material (preprit, accepted mauscript, or other author-distributable versio) is provided to esure timely dissemiatio of scholarly work. Copyright ad all rights therei

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Civil Engineering Computation

Civil Engineering Computation Civil Egieerig Computatio Fidig Roots of No-Liear Equatios March 14, 1945 World War II The R.A.F. first operatioal use of the Grad Slam bomb, Bielefeld, Germay. Cotets 2 Root basics Excel solver Newto-Raphso

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

On Computing the Fuzzy Weighted Average Using the KM Algorithms

On Computing the Fuzzy Weighted Average Using the KM Algorithms O Computig the Fuzzy Weighted Average Usig the KM Algorithms Feilog iu ad Jerry M Medel Sigal ad Image Processig Istitute, Departmet of Electrical Egieerig Uiversity of Souther Califoria, 3740 McClitock

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

CS644 Advanced Networks

CS644 Advanced Networks Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information