Priority Queuing Technique Promoting Deadline Sensitive Data Transfers in Router based Heterogeneous Networks

Size: px
Start display at page:

Download "Priority Queuing Technique Promoting Deadline Sensitive Data Transfers in Router based Heterogeneous Networks"

Transcription

1 Priority Queuig Techique Promotig Deadlie Sesitive Data Trasfers i Router based Heterogeeous Networks Jyothish K Joh 1 ad R.V.Siva Bala 2 1 Research Scholar at Noorul Islam Uiversity, Tamil Nadu, Idia. 1 Assistat Professor at Federal Istitute of Sciece ad Techology, Kerala, Idia. 2 Associate Professor i MCA, Noorul Islam Uiversity, Tamiladu, Idia. 1 Orcid: , 2 Orcid: Abstract A heterogeeous etwork coects various operatig systems ad differet protocols. Due to the versatile techology ad eormously large umber of odes, the data traffic i iteret is upredictable ad keeps icreasig mootoously. This leads to cogestio which maily overburdes the routers sice the router is resposible for directig the traffic i the required etwork directio. Real-time data trasfers which have deadlies o various Quality of Service (QOS) parameters may suffer from severe problems of throughput ad delay while gettig trasferred through iteret. This ca be overcome either by a schedulig mechaism or by a droppig policy which help the real-time data trasfers achieve their QOS requiremets without keepig a bias agaist o-real-time data flows. I this work, we propose a cogestio avoidace techique which works o the basis of priority queuig. Whe cogestio is sesed, the deadlie sesitive data is serviced before the lower priority data. Thus, the etwork ca be maitaied stable without collapse ad data trasmissio ca also be achieved to a satisfactory level. Keywords: AAQM, Quality of Service, real-time data trasfers, NCQ, utilizatio factor INTRODUCTION Durig data trasmissio, cogestio occurs whe the icomig packets rates are very high whe compared to the shared resources like queue buffer withi the router ad outgoig badwidth. Whe cogestio is experieced i the etwork, delay is experieced by umerous data packets ad several packets get dropped as the queue starts overflowig. Excessive cogestio i the etwork leads to throughput degradatio ad icreased rate of packet loss. Network efficiecy ad reliability also reduces due to cogestio. Sometimes, due to excessive cogestio, the overall performace of the etwork fails ad there will be o data delivery [1]. The geeral router policies desiged for fair badwidth sharig i iteret majorly cocetrates i restrictig the o-resposive category. No-resposive traffic flows are those which do ot reduce the trasmissio rates eve whe a cogestio otificatio is received. But this will become a severe blow for the real-time data trasfers which cotribute oly small rates. There should be a policy by which the schedulig or droppig module should idetify realtime flows from all other traffic ad promote them. The extet of favour may be proportioal to the data rate they cotribute to the iteret. Those flows cotributig less data rates should be able to achieve their QOS deadlies. The Active queue maagemet schemes (AQM) like RED ad its variats helps to check ad react to the cogestio proe situatio but they lack service differetiatio capability to ifer whether the traffic is deadlie sesitive or ot. Therefore a queuig policy implemetig easy service differetiatio ad accurate prioritizatio help to build a stable trasmissio rate eve at the time of cogestio. RELATED WORK Itegrated service [2] & differetiated service [3] are applicatio level architectures for esurig QOS for ay type of traffic. The disadvatages of QOS architectures are additioal protocol overhead, poor scalability ad high ifrastructural eeds. Radom early detectio gateway for cogestio avoidace [4] was proposed i 1993 by Floyd ad Jacobso ad is ow recommeded for deploymet i the Iteret. RED allows a router to drop packets before its queue becomes saturated. Therefore cogestio resposive flows will back-off early resultig i shorter average queue legths which is good for iteractive applicatios. Aother advatage is packet drops will ot occur i bursts. RED achieves this by droppig packets with a certai probability depedig o the average queue legth. RED does ot categorize the flows ito realtime ad o-real- time, so RED policy does ot explicitly promote real-time data trasfers. The variats of RED, RIO (RED IN/OUT) [5] & Weighted RED (WRED) [6] are other examples of active queue maagemet schemes. The droppig policy is based o priority levels which are idicated withi packets ad i a cogested sceario, lower priority packets are dropped.rio ad WRED eed packets to be marked with priority levels. D.Li ad R. Morris [7] proposes a separate queue 4899

2 maagemet scheme called FRED (Flow Radom early Detectio, modified versio of RED) suitable for fragile ad adaptive flows. FRED maitais better fairess by admittig the equal share of flows. Hece it cotrols misbehavig flows from cosumig more badwidth. But the policy is also ot focussed towards promotig real-time data trasfers. Floyd ad K. Fall [8] propose a router policy to restrict the uresposive flows that does ot reduce the sedig rate eve whe packets are dropped. Such flows are termed as o-tcp friedly flows ad such flows are idetified from the drop history of RED. R. Mahaja ad S. Floyd [9] propose a mechaism to cotrol the droppig of resposive flows. The techique have two parts 1) Idetifyig the resposive flows 2) Mechaism to prevet the droppig for resposive flows. Idetifyig the flows is performed by radom samplig from the RED drop history. W. Feg ad et al. [10] proposes aother Active Queue Maagemet Algorithm, BLUE. A problem with queue maagemet (like RED) algorithms is highlighted i the paper as they use queue legths as the idicator of the severity of cogestio. Istead BLUE uses packet loss ad lik idle evets to idetify cogestio. R. Pa, B. Prabhakar, ad K. Psouis [11] propose a stateless active queue maagemet scheme-choke which deals with a alterate queue maagemet scheme ispired from RED. The queue for icomig packet is FIFO which is havig a RED like miimum ad maximum thresholds. But RED tries to maitai fairess oly after the queue legth become greater tha miimum threshold ad by this time misbehavig flows may have occupied the queue. Therefore fairess i RED is oly grated after queue legth is greater tha miimum threshold. CHOKe scheme oly differs i policy betwee miimum threshold ad maximum threshold whe compared to RED. CHOKe algorithm try to brig better fairess. It assumes that the statistics of misbehavig flows are preset i the occupacy before attaiig miimum threshold. L. Mamatas ad V. Tsaoussidis [12] propose a ew service differetiatio policy for real-time traffic. They suggest a ew schedulig policy for o-cogestive packets. Nocogestive packets are packets that do ot cause cogestio i etwork (real-time packets).they are aalysed by their small packet sizes. The router captures the size of the packet ad lears whether it is real time traffic, if so it is serviced faster. The limit of favour is cotrolled by a cofigurable threshold. They experimets the impact of o-cogestive queuig, NCQ [14] for sesor traffic. The authors propose LIBS [13] (Less Impact Better Service) philosophy. The packets ca be classified ito cogestive ad o-cogestive based o packet sizes. Packet sizes serves as a easier idetificatio for realtime data trasfers i iteret. Rahim Rahmai et al [15] have proposed a Adaptive AQM (AAQM) scheme. A specific method has bee proposed based o the Markov Modulated Poisso Process (MPP) to cofie the burstiess of the traffic ad also the buffer occupacy. This scheme maages to keep the packet arrival rate ad the packet departure rate very close. Kag Mi Lee et al [16] have preseted the LQ-Servo cotroller for AQM (Active Queue Maagemet) routers. The cotroller i this proposed work is developed by usig the covetioal servo techique which works o the basis of the Liear Quadratic Approach ad the addig a state variable ito the feed forward loop. The cotroller structure icludes a stadard optimal feedback regulator ad also a feed forward cotroller. This is capable of improvig the resource utilizatio ad the miimizig the eedless reservatio of the router memory like RAM (Radom Access Memory) or SMA (Shared Memory Area). Tushar Raheja et al [17] have preseted a uiterrupted sigle-lae traffic based o the queuig aalysis. The Jackso Queuig etwork aalysis is utilized to attai the traffic flow desity diagram. To determie the result of the o homogeous traffic, the simpler aalytical models are utilized. The paper, Survey o Router Policies Providig Fairess ad Service Differetiatio Favorig Real-Time Data Trasfers i Iteret [18] provides a detailed study ad compariso of all the major router policies ad service differetiatio architectures. PROPOSED PRIORITY QUEUING TECHNIQUE FOR CONGESTION AVOIDANCE Overview I this work, we propose to desig a deadlie based priority queuig techique for cogestio avoidace i router based heterogeeous etworks. Durig packet arrival, the packet size is checked. The the utilizatio factor (U) which is the ratio of umber of packet arrivals per departures is calculated [15]. The queue is divided ito two sub-queues: high priority ad low priority. If there is cogestio, the packet droppig probability is icreased for lower priority queues ad decreased for high priority queues. By this way both cogestive ad o cogestive packets are served without affectig the quality of service ad deadlie costraits. Packet Arrival Evet Adaptive AQM (AAQM) utilizes the packet arrival evet whe a packet arrivig at oe of access router icomig iterfaces is supposed to be trasmitted to the outgoig iterface. The packet arrival evet is described i the algorithm give bellow Q Q max Data Packet curret queue legth maximum queue legth 4900

3 P R um packet markig probability radom umber C arrival couter coutig the umber of packets arrived at the queue 1. Whe arrives at a queue, its Q value is compared with Q max. 2. If Q > Q max, the the packet is dropped. 3. If Q < Q max, the the packet is equeued ad a R um is geerated usig a radom umber geerator. 4. If R um < P, the the packet is marked. 5. If R um > P, the the packet is discarded. 6. The C arrival is icremeted by oe. Packet Departure Evet Whe a packet which was equeued at the router is trasmitted over the outgoig lik, the this process is called as the packet departure evet. The packet departure evet is described i algorithm bellow Data Packet C departure couter coutig the umber of packets departed from the queue 1. Durig the packet departure evet, is iitially dequeued from the queue at the router. 2. The the C departure value durig the last pre defied time iterval is icremeted by oe. Utilizatio Factor The utilizatio factor (U) is the ratio of the umber of packet arrived per departure. U = C arrival value C departure value Cogestio Cotrol based o Packet Priority No Cogestive Queuig (NCQ)[12] is icorporated ito routers to differetiate services accordig the impact of each traffic class o delay. Whe there is a class with smaller packets ad sedig rate receives better service tha oe with large packets or high sedig rate. To avoid reachig a state where the trasmissio of the small packets creates a delay i the trasmissio of the log packets, a threshold level is defied i this techique. The favoured o-cogestive traffic caot exceed a predetermied threshold, which represets the upper limit of permitted prioritized service. The threshold typically reflects a service percetage for prioritizatio. However, this percetage correspods to the umber of packets; ot the occupied buffer space. After the determiatio of the utilizatio factor i the etwork, the cogestio ca be hadled by dividig the data packets ito high priority data ad lower priority data. Therefore durig cogestio, the higher priority data will be trasmitted first ad the the lower priority data is cosidered for trasmissio. This mechaism is described i algorithm bellow. Thresh size Threshold value for the size of the data packet U packet size P Utilizatio Factor icomig data packet size of the icomig data packet Packet Droppig Probability 1. Iitially a Thresh size value is defied. 2. Durig cogestio, the size of is determied. 3. The the packet size is compared with the predefied Thresh size. 4. If packet size < Thresh size ad U 1, the the data packet is moved ito the high priority sub queue. 5. If packet size > Thresh size ad U<=1, the the data packet is moved ito the high priority sub queue. 6. If packet size > Thresh size ad U > 1, the the data packet is moved ito the lower priority sub queue. 7. If packet size < Thresh size ad U > 1, the the data packet is moved ito the higher priority sub queue. 8. After the data packet categorizatio, the data packet i the higher priority queue is trasmitted ad the lower priority queue is equeued. 9. Whe there is a eed to drop packet i order to stabilize the etwork from overburdeig, the packets i the lower priority queue are dropped. 10. The P for every packet i the queue is determied accordig to the followig equatio: For packets i high priority queue: P = P P1 For packets i low priority queue: P = P + P2 Where P1 ad P2 are the pre defied values. By this way both cogestive ad o cogestive packets are served without affectig the quality of service ad deadlie costraits. The overall Priority Queuig Techique The overall algorithm of proposed for priority queueig for deadlie sesitive data trasfers: 1. I the heterogeeous etwork, the umber of packets 4901

4 arrivig at the router is iitially calculated by cosiderig the queue legth as the decidig factor for lettig i the packet or droppig the packet. 2. The the umber of packets departig is determied. 3. Next, the U is calculated. 4. Based o the NCQ techique, the packet queue is divided ito high priority queue ad low priority queue. 5. Based o the packet size ad utilizatio factor criteria, the packets are trasmitted ito the high priority queue ad low priority queue accordigly. 6. The packets i the high priority queue are trasmitted first ad the packets i the low priority queue are equeued. 7. Durig cogestio, the packets i the low priority queue are dropped with higher probability ad the packets i the high priority queue are dropped with lower probability. 8. Thus, the packet trasmissio is performed very efficietly eve durig cogestio. CONCLUSION I this work, a priority queue techique has bee proposed for the routers to avoid cogestio i the heterogeeous etwork. Iitially the utilizatio factor is determied based o the packet icomig rate ad the packet outgoig rate. Next, the packet size is determied ad is compared with the predefied threshold size. Based o the utilizatio factor value ad the packet size, the data packet is moved ito either the high priority queue or the low priority queue. The the data i the high priority queue is trasmitted first ad the data i the lower priority queue is equeued. Durig excessive traffic, the lower priority packets are dropped with higher probability ad higher priority data is dropped with very low priority. Thus, the etwork maitais the high priority data ad trasmits it as quickly as possible. So, this proposed techique is efficiet i cogestio hadlig i the heterogeeous etwork. The future work ivolves the simulatio of eviromet where the realtime data trasfers ad bulk trasfers co-exist ad the QoS parameters like through put, delay ad packet delivery ratio has to be aalysed. REFERENCES [1] G.F.Ali Ahammed ad Reshma Bau, "Aalyzig the Performace of Active Queue Maagemet Algorithms", Iteratioal Joural of Computer Networks ad Commuicatios (IJCNC), Vol: 2, No: 2, March [2] R. Brade, D. Clark, ad S. Shakar, RFC1633 itegrated services i the Iteret architecture: a overview, Jue [3] S. Blake, D. Black, M. Carlso, E. Davies, Z. Wag, ad W. Weiss, RFC2475 a architecture for differetiated services, Dec [4] S. Floyd ad V. Jacobso, Radom Early Detectio Gateways for Cogestio Avoidace, IEEE/ACM Tras. Networkig, vol. 1, o. 4, pp , Aug [5] D.Clark ad W.Fag, Explicit allocatio of besteffort packet delivery service," IEEE/ACM Tras. Networkig, Aug [6] /guide [7] D. Li ad R. Morris, Dyamics of radom early detectio," Proc. SIGCOMM 1997, Sept [8] S. Floyd ad K. Fall, Router Mechaisms to support ed-to-ed cogestio cotrol i the Iteret," IEEE/ACM Tras. Networkig, May [9] R. Mahaja ad S. Floyd, Cotrollig high badwidth flows at the cogested router," i Proc. ICNP 2001, Nov [10] W. Feg, D. Kadlur, D. Saha, ad K.G. Shi, BLUE: A New Class of Active Queue Maagemet Algorithms, Techical Report CSE-TR , Uiv. of Michiga, Apr [11] R. Pa, B. Prabhakar, ad K. Psouis, CHOKe: a stateless AQM scheme for approximatig fair badwidth allocatio," Proc. INFOCOM2000, Mar [12] L. Mamatas ad V. Tsaoussidis, Differetiatig services with o cogestive queuig (NCQ)," IEEE Tras. Computers, [13] L. Mamatas ad V. Tsaoussidis, Differetiatig Services for Sesor Iteretworkig, Proc. IFIP Fifth A. Mediterraea Ad Hoc Networkig Workshop (Med-Hoc-Net 07), Jue [14] L. Mamatas ad V. Tsaoussidis, Less Impact Better Service (LIBS): A Service Paradigm for Iteret Telephoy, Techical Report TR-DUTH-EE , Democritus Uiv. of Thrace, Nov [15] Rahim Rahmai, Christer, Ahlud, Theo Kater, "Desig of Active Queue Maagemet for Robust Cotrol o Access Router for Heterogeeous Networks", EURASIP Joural o Wireless Commuicatios ad Networkig, [16] Kag Mi Lee, Ji Hoo Yag, Byug Suhl Suh, "Cogestio Cotrol of Active Queue Maagemet Routers Based o LQ-Servo Cotrol, Egieerig Letters 16(3), ,

5 [17] Tushar Raheja, "Modellig traffic cogestio usig queig etworks", Idia Academy of Sciece, Vol: 35, Part-4, PP: , [18] Jyothish K Joh, R V Sivabala, Survey o Router Policies Providig Fairess ad Service Differetiatio Favorig Real-Time Data Trasfers i Iteret Advaces i Itelliget Systems ad Computig Volume 324, 2015, pp ,April

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

CS644 Advanced Networks

CS644 Advanced Networks Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Analyzing the Impact of Queue Management Policies on the Self-Similarity of Aggregate Network Traffic

Analyzing the Impact of Queue Management Policies on the Self-Similarity of Aggregate Network Traffic Aalyzig the Impact of Queue Maagemet Policies o the Self-Similarity of Aggregate Network Traffic MELİKE EROL 1, SEMA OKTUĞ 1, TAYFUN AKGÜL 2 Dept. of Computer Egieerig 1, Dept. of Electroics ad Commuicatios

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Enhancing Cloud Computing Scheduling based on Queuing Models

Enhancing Cloud Computing Scheduling based on Queuing Models Ehacig Cloud Computig Schedulig based o Queuig Models Mohamed Eisa Computer Sciece Departmet, Port Said Uiversity, 42526 Port Said, Egypt E. I. Esedimy Computer Sciece Departmet, Masoura Uiversity, Masoura,

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor Iteratioal Joural of Computer Applicatios (97 8887) Volume 132 No.11, December21 Optimizatio of based CPU Schedulig Algorithms to Miimize Starvatio of Processes usig a Efficiecy Factor Muhammad A. Mustapha

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Accurate ad Efficiet Traffic Moitorig Usig Adaptive

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat 785006, Assam moowar.tezu@gmail.com D.

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction A Hierarchical Load Balaced Fault tolerat Grid Schedulig Algorithm with User Satisfactio 1 KEERTHIKA P, 2 SURESH P Assistat Professor (Seior Grade), Departmet o Computer Sciece ad Egieerig Assistat Professor

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

SATELLITE-ATM NETWORKING AND CALL PERFORMANCE EVALUATION FOR MULTIMEDIA BROADBAND SERVICES

SATELLITE-ATM NETWORKING AND CALL PERFORMANCE EVALUATION FOR MULTIMEDIA BROADBAND SERVICES EUROPEAN COOPERATION IN COST 252 TD (98) 38 THE FIELD OF SCIENTIFIC Veice, Italy, 6 November 998 AND TECHNICAL RESEARCH EURO - COST SOURCE: TASK: KEYWORDS: SRU (Uiversity of Surrey) WG2 MULTIMEDIA, S-,

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Today s Topic: Vacatios Sa Fracisco Moterey

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Next generation IP- based multimedia services on cable TV networks

Next generation IP- based multimedia services on cable TV networks Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications

Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Aalysis of Ed-to-Ed Packet Delay for Iteret of Thigs i Wireless Commuicatios Imae Maslouhi 1 Dept: Electroics, Iformatics ad Telecommuicatios

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

TU Dortmund Chair Computer Science 3. BeeJamA. Honey Bee Inspired Traffic Jam Avoidance

TU Dortmund Chair Computer Science 3. BeeJamA. Honey Bee Inspired Traffic Jam Avoidance TU Dortmud Chair Computer Sciece 3 Operatig Systems & System Architecture BeeJamA Hoey Bee pired Traffic Jam Avoidace Highly Dyamic ad Adaptive Traffic Cogestio Avoidace i Real-Time pired by Hoey Bee Behavior

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS NTER-CELL LOAD BALANCNG TECHNQUE FOR MULT-CLASS TRAFFC N MMO-LTE-A NETWORKS 1 T.PADMAPRYA, 2 V. SAMNADAN 1 Research Scholar, Podicherry Egieerig College 2 Professor, Departmet of ECE, Podicherry Egieerig

More information

Admission control approaches in the IMS presence service

Admission control approaches in the IMS presence service Bod Uiversity epublicatios@bod Iformatio Techology papers Bod Busiess School Jauary 6 Admissio cotrol approaches i the IMS presece service Muhammad T. Alam Bod Uiversity, Muhammad_Alam@bod.edu.au Zheg

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Dr. D. Ravindran, M. Ramya

Dr. D. Ravindran, M. Ramya 2016 IJSRSET Volume 2 Issue 4 Prit ISSN: 2395-1990 Olie ISSN : 2394-4099 Themed Sectio: Egieerig ad Techology Moitorig ad Normalizatio of the Loaded Servers By Load Balacig Dr. D. Ravidra, M. Ramya School

More information

UH-MEM: Utility-Based Hybrid Memory Management. Yang Li, Saugata Ghose, Jongmoo Choi, Jin Sun, Hui Wang, Onur Mutlu

UH-MEM: Utility-Based Hybrid Memory Management. Yang Li, Saugata Ghose, Jongmoo Choi, Jin Sun, Hui Wang, Onur Mutlu UH-MEM: Utility-Based Hybrid Memory Maagemet Yag Li, Saugata Ghose, Jogmoo Choi, Ji Su, Hui Wag, Our Mutlu 1 Executive Summary DRAM faces sigificat techology scalig difficulties Emergig memory techologies

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Simulation based Analysis of TCP Variants over MANET Routing Protocols using NS2

Simulation based Analysis of TCP Variants over MANET Routing Protocols using NS2 Simulatio based Aalysis of TCP Variats over MANET Routig Protocols usig NS2 Navreet Kaur M.Tech CSE Studet MMU Mullaa(Ambala) Sadhya Umrao Research Scholar,CSE Dept. MMU Mullaa (Ambala) Rajeesh Kumar Gujral,

More information

Correlated M/G/1 Queue modelling of Jitter Buffer in TDMoIP

Correlated M/G/1 Queue modelling of Jitter Buffer in TDMoIP AICT 01 : The Eighth Advaced Iteratioal Coferece o Telecommuicatios Correlated M/G/1 Queue modellig of Jitter Buffer i TDMoIP Usha Rai Seshasayee ad Maivasaka Rathiam Departmet of Electrical Egieerig Idia

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information