Service Scheduling for General Packet Radio Service Classes

Size: px
Start display at page:

Download "Service Scheduling for General Packet Radio Service Classes"

Transcription

1 Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver, BC, Canada Motoroa Ceuar Infrastructure Group, Richmond, BC, Canada Abstract- Whie the quaity of service (QoS) profies for a number of genera packet radio service (GPRS) casses has been specified [1] by ETSI, how QoS management is provided by means of traffic scheduing, traffic shaping, and connection admission contro, in a GPRS network is an impementation issue that is attracting significant current research interest. This paper presents an evauation of severa traffic scheduing methods, incuding of, Static Priority Scheduing () and Eariest Deadine First () by simuations, with the objective of meeting the deay profies defined for a number of GPRS casses. Traffic sources representative of GPRS appications, incuding emai, feet management and word wide web appications are empoyed. We focus on the forward ink which represents the botteneck of a typica GPRS data connection. Resuts show that is abe to meet the deay requirements at a much higher channe utiization compared to the other aternatives. I. INTRODUCTION Genera Packet Radio Services (GPRS), as a major component of GSM Phase 2+ [1, 2], aims at providing pubic packet-switched data services over the existing GSM network infrastructure. In order to meet the different requirements of a wide variety of user appications, a number of Quaity of Service (QoS) profies have been specified. There is significant current interest in the deveopment of QoS management functions for GPRS networks that meet the requirements of these profies whie maintaining a high bandwidth efficiency. This is especiay true since the radio spectrum is a imited and vauabe resource. QoS management invoves the characterization, shaping/poicing and scheduing of user traffic, and admission contro of users (Fig.1). In this paper, we focus on traffic scheduing methods for GPRS. Though there are a ot of scheduing methods or service discipines [3-13] that have been studied, e.g. First-In- First-Out (), Static Priority Scheduing (), Virtua Cock, Weighted Fair Queuing (WFQ), Sef-Cocked Fair Queuing, Start-Time Fair Queuing (STFQ), Worst-case Fair Weighted Fair Queuing (WF 2 Q), Eariest Deadine First (), Deay Eariest-Due-Date (Deay-EDD), Jitter Eariest- Due-Date (Jitter-EDD), Stop-and-Go, Weighted Round- Robin (WRR), Deficit Round Robin (DRR), Hierarchica Round Robin (HRR), Rate-Controed Static Priority (RCSP), and Leave-in-time etc, we are not aware of any extensive evauation of traffic scheduing reative to GPRS requirements (predictive and best effort) in the iterature so far. In this paper, the resuts of the foowing scheduing methods are considered. First In First Out () Static Priority Scheduing () Eariest Deadine First () The performance of these scheduing methods are compared and commented. New Traffic Type Traffic Source MS Traffic Contract Traffic Characterization Traffic Conditioning (Shaping Poicing) BSS QoS Management of GPRS SGSN GPRS networks GGSN Admission Contro Traffic Scheduing PDNs or other networks Fig. 1. QoS management of GPRS networks. This paper is organized as foows. Section II describes the QoS profie of GPRS. The descriptions of the scheduing methods are given in Section III. Section IV incudes the traffic source modes, simuation scenarios and simuation resuts, and finay concusions are given in Section V. II. QOS PROFILE OF GPRS There are five aspects in the QoS profie for GPRS, precedence, reiabiity, mean throughput, peak throughput, and deay casses [2]. There are four deay casses in the GPRS QoS profie: casses 1, 2 and 3 offer what we ca predictive services and require QoS management, whie cass 4 provides a best-effort service. Tabe I gives the deay requirements for packets containing 128 and 1024 octets of information. To determine the deay requirements for different packet engths in each predictive service cass, we interpoate between the two packet engths given in the specification. The deay requirement r(c,) for a packet with any size and deay cass c as given in (1) /$10 (c) 1998 IEEE

2 TABLE I DELAY CLASSES AND REQUIREMENTS FOR DIFFERENT PACKET SIZES Deay Cass Packet Size 128 octets 1024 octets Mean 95 % Mean 95 % 1.(Predictive) (Predictive) (Predictive) (Best Effort) Unspecified c = 1; c = 1; > c = 2; 128 r ( c, ) = 128 (1) c = 2; > c = 3; c = 3; > where c stands for deay cass, stands for the size of the packet. A quantifiabe performance measurement with respect to the different service casses and packet engths is needed to faciitate comparisons between different scheduing methods. We deveop the method of normaizing the measured deays to eiminate packet engths as a factor in the comparisons. Let pk denote the packet arrived to the destination, cass(pk) denote the cass of the packet, and pk_en(pk) denote the packet ength of the packet. The normaized deay for pk is given by Experienced rea deay of pk Required deay of pk The required deay of pk is cacuated by the function r ( cass( pk), pk _ en( pk) ) indicated by (1). The mean normaized deay is given by N i=1 Normaizeddeay of pk i (3) N Using the measurement of normaized deay, it is more convenient to evauate the the deay performance of the queuing system with variabe packet size and different deay casses. If the mean normaized deay is beow 1, we can make concusion that the deay performance requirement is met. (2) Deay Requirement sec required deay pk Size rea deay required deay Fig. 2. Normaized deay cacuation. A. First In First Out () III. SCHEDULING METHODS bytes is the simpest scheduing and queuing method. First arrived packet is served first. Two buffers are used, one for predictive services(cass 1, 2 and 3), the other for best-effort service(cass 4). We aways use a separate buffer for besteffort servces in a of the scheduing methods, which receives service ony if the buffers for the predictive casses are empty. B. Static Priority Scheduing () With, each deay service cass has its own buffer and is assigned a fixed (static) service priority: highest for cass 1 and owest for cass 4 (best-effort). When the next downink time sot is avaiabe, a cass i buffer wi receive service ony if a cass j (j < i) buffers are empty. C. Eariest Deadine First () With Eariest Deadine First () or Eariest Due Date (EDD) method, each arrived packet has its own deadine (or due-date). The packets are served in the order of their deadines. Assume the arriva time of a packet is a, and the ength of the packet is. Its deay cass is c(1 c 3), the time-sot capabiity of its destination is s, and rate denote the data rate of one time-sot. Then we have dead _ ine = a + r(c, )- (4) s rate where, the function r(c,) denotes the deay requirement of the packet with deay cass c and ength cacuated by (1). The mechanism needs to sort the packet queue using at east O(ogN) insertion operation for each arrived packet. This may affect its appication due to impementation difficuty /$10 (c) 1998 IEEE

3 A. Traffic Sources IV. PERFORMANCE EVALUATIONS To generate the traffic presented to the simuator (by the sources), we used three types of traffic sources and their combinations incuding emai, feet management and WWW appications. FUNET mode was used for Emai and MOBITEX mode for feet management traffic generation [14]. For generating a reaistic WWW traffic, which takes into account the sef-simiar nature of the traffic, we used avaiabe traces. 1) FUNET mode This mode is based on statistics coected on emai usage from the Finish University and Research Network (FUNET). TABLE II shows the percentage of messages shorter than the indicated ength. Percentage TABLE II DISTRIBUTION OF FUNET MODEL Message ength (Kbytes) < <1 < <2 <3 <5 <10 The trace is downoaded from the web site where stores the socaed Internet Traffic Archive. "The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as we as providing the grist for trace-driven simuations. The archive is aso open to programs for reducing raw trace data to more manageabe forms, for generating synthetic traces, and for anayzing traces". Fig. 3 shows the data rate of the trace we used. The WWW document size distribution in the trace is given in TABLE III. Rate(10 5 bps) TABLE III WWW DOCUMENT SIZE DISTRIBUTION Document size(bits) Number >10,000, >1,000, >100, >10, The probabiity distribution function f(x) for this mode can be approximated by the Cauchy (0.8,1) distribution. f ( x) = Cauchy(0.8,1) = π 1 ( 1 + ( x 0.8) 2 ) The packet inter-arriva time distribution for FUNET mode is exponentia. 2) Feet management mode This mode is based on statistics coected from a feet management appication using the Mobitex wireess packet data network in Sweden. The average message ength on the upink is 30 bytes and 115 bytes on the downink. upink: 30+uniform(-15,15) bytes, downink: 115+uniform(-57,57) bytes. The packet inter-arriva time distribution for Mobitex mode is assumed exponentia as we. 3) Rea WWW browsing trace (5) Time(10 4 sec) Fig.3. Data rate of WWW browsing service (accumuating interva=60 secs). B. Simuation Scenarios In our simuations, we consider appying different service casses to each traffic source type. We aso evauate the effects of varying the number of GSM time sots, n, avaiabe for GPRS between 1, 3 and 7, with a capacity of 13.4 Kbps (CS2) for each time sot. Service scheduing is performed in the LLC ayer based on LLC frames. The number of time sots assigned to a frame is determined by the mobie station s time sot capabiity, number of RLC bocks in the frame and the number of sots eft. The portion of a type of service (emai, feet management or WWW) in the tota traffic is aso changeabe. The combination of a the different parameters, generated tota of 18 simuation scenarios, which were used to evauate and compare the performance of the scheduing methods. In TABLE IV we just give two simuation scenarios /$10 (c) 1998 IEEE

4 I II Services TABLE IV TWO SIMULATION SCENARIOS System Sots Deay Cass Sots Cap. Portion Emai /3 Feet Man /3 WWW /3 Emai /2 Feet Man /4 WWW /4 C. Simuation Resuts In this part, the simuation resuts of the scheduing methods are given. Ony two scenarios are shown in Fig.4 and Fig.5, respectivey. From the simuation resuts, we determine that athough and are very simpe to impement, they do not meet the deay requirements under a high degree of ink utiization. In contrast, by scheduing packets according to their deadines, can achieve up to 90% ink utiization whie meeting the deay requirements. The main reason is that some of the traffic sources are very bursty, and generate packets which sizes vary over a arge range, from severa hundreds bits, e.g., in feet management case, to miions of bytes, e.g., for WWW browsing. It means some of the services may amost at the same time generate tons of traffic and pump them into the wireess networks with very imited capacity. The high variabiity of packet arriva rates and packet sizes reduces the effectiveness of and even for traffic within the same service cass, because short packets are often impeded by ong packets. Note that the service discipine for is essentiay for packets within the same service cass. Many short packets waiting a ong time behind a ong packet resuts in significant increases in the overa mean deay statistics. From our observations, packet ength variation is the main reason why and do not meet the deay requirements under high ink utiization eves. Based on the simuations, we concude that to achieve a good overa performance, packet engths must be considered in scheduing, as in, by servicing short packets ahead of ong packets. The simuation resuts aso show that if a simper scheduing method such as is chosen to reduce the impementation and processing compexity in the scheduer, traffic shaping/poicing may be needed to reduce the burstiness of the traffic sources. This requires additiona processing at the edges of the GPRS network. V. CONCLUSIONS In this paper, we studied the scheduing methods for GPRS. First, we proposed a QoS management framework for GPRS, the packet switched technoogy over GSM. Then we introduced the deay requirement definitions for GPRS in the QoS profie and the normaized deay measurement that more convenient for performance evauations. Through simuations, we evauated the three scheduing methods for GPRS, without any traffic shaping/poicing poicy. The simuation resuts show that the bursty nature of data sources can degrade the performance for and, in the absence of traffic shaping/poicing, whie can provide good performance. However, performance compexity remains an issue for. Other scheduing methods, when combined with traffic shaping/poicing poicies, are expected to provide a more robust performance. This is the topic of our ongoing research. REFERENCES [1] G. Brasche and B. Wake, Concepts, services, and protocos of the new GSM phase 2+ genera packet radio service, IEEE Commun. Magazine, vo. 35, no. 8, pp , Aug [2] ETSI, GSM V6., Digita ceuar teecommunications system (phase 2+); genera packet radio service (GPRS); service description; stage 2, Mar [3] C.Li, R.Bettati, and W.Zhao, Static priority scheduing for ATM networks, Proc. 18th IEEE Rea-time Systems Symposium, pp , [4] T.Hou and C.Chen, Jitter-EDD impementation for transporting MPEG-2 video streams on ATM network, Proc.12th Internationa Conf. on Information Networks, pp , Jan [5] H.Zhang, Service discipines for guaranteed performance service in packet-switching networks, Proceedings of the IEEE, vo.83, no.10, pp , Oct [6] P.Goya, H.M.Vin and H.Cheng, Start-time fair queuing: a scheduing agorithm for integrated services packet switching networks, Proc. of SIGCOMM'96, [7] N.R.Figueira and J.Pasquae, Leave-in-time: a new service discipine for rea-time communications in a packet-switching network, Proc. of SIGCOMM'95, pp , [8] D.D.Cark, S.Shenker and L.Zhang, Supporting reatime appications in an integrated services packet network: architecture and mechanism, Proc. ACM SIGCOMM'92, pp.14-26, [9] L.Zhang, Virtua cock: a new traffic contro agorithm for packet switching networks, Proc. ACM SIGGCOM'90, pp.19-29, Sep [10] J.C.R.Bennert and H.Zhang, WF 2 Q: worst-case fair weighted fair queueing, INFOCOM'96, /$10 (c) 1998 IEEE

5 [11] S.Goestani, A sef-cocked fair queueing scheme for broadband appications, Proc. IEEE INFOCOM'94, pp , Jun [12] H.Zhang and D.Ferrari, Rate-controed static priority queueing, Proc. IEEE INFOCOM'93, pp , Apr [13] C.Liu and J.Layand, Scheduing agorithms for mutiprogramming in a hard rea-time environment, J.ACM, vo.20, pp.46-61, Jan [14] Traffic reference modes for GPRS, GPRS-TG Meeting no 2, Stockhom June, normaized deay of Emai ink utiization normaized deay of Emai normaized deay of Feet Management ink utiization ink utiization normaized deay of Feet Management normaized deay of WWW ink utiization ink utiization Fig. 5. Simuation resut II. normaized deay of WWW ink utiization Fig. 4. Simuation resut I /$10 (c) 1998 IEEE

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 7, JULY 2018 4565 Peer-Assisted Computation Offoading in Wireess Networks Yei Geng, Student Member, IEEE, and Guohong Cao, Feow, IEEE Abstract

More information

Radio Resource Management in GPRS with Quality of Service

Radio Resource Management in GPRS with Quality of Service Radio Resource Management in GPRS with Quality of Service Josep Bada, Ferran Casadevall, Javier Jiménez and Eduardo Medrano Universitat Politècnica de Catalunya (UPC), Dept. of Signal Theory and Communications,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Error Control Strategies for WiMAX Multi-hop Relay Networks

Error Control Strategies for WiMAX Multi-hop Relay Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

TD-SCDMA Physical Layer Design Overview

TD-SCDMA Physical Layer Design Overview TD-SCDMA Layer Design Overview Author Information Coege: Information Security Engineering Coege Cass: F0503602 Name: SHI Junxiao Instructor: WU Yue Instructor's coege: Information Security Engineering

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Buffer-aware Worst Case Timing Analysis of Wormhole Network On Chip

Buffer-aware Worst Case Timing Analysis of Wormhole Network On Chip 1 Buffer-aware Worst Case Timing Anaysis of Wormhoe Network On Chip Ahem Mifdaoui and Hamdi Ayed* University of Tououse -ISAE ahem.mifdaoui@isae.fr, hamdi.ayed@isae.fr arxiv:1602.01732v2 [cs.ni] 25 May

More information

Feedback-Free Packet Loss Recovery for Video Multicast

Feedback-Free Packet Loss Recovery for Video Multicast Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Distributed Utility-Optimal Scheduling with Finite Buffers

Distributed Utility-Optimal Scheduling with Finite Buffers Distributed Utiity-Optima Scheduing with Finite Buffers Dongyue Xue, Robert Murawski, Eyem Ekici To cite this version: Dongyue Xue, Robert Murawski, Eyem Ekici. Distributed Utiity-Optima Scheduing with

More information

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003 Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

OVSF based fair and multiplexed priority calls assignment CDMA Networks

OVSF based fair and multiplexed priority calls assignment CDMA Networks OVSF based fair and mutipexed priority cas assignment CDMA Networks VIPIN BAYAN 1, DAVINDER S SAINI 2, GUNJAN GUPTA 3 Department of Eectronics and Communication Engineering, Jaypee Institute of Information

More information

index.pdf March 17,

index.pdf March 17, index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

Understanding Fairness and its Impact on Quality of Service in IEEE

Understanding Fairness and its Impact on Quality of Service in IEEE Understanding Fairness and its Impact on Quaity of Service in IEEE 82.11 Michae Brede, Markus Fider Mutimedia Communications Lab, TU Darmstadt arxiv:88.3937v1 [cs.ni 28 Aug 28 Abstract The Distributed

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Techniques for Scheduling I/O in a High Performance Multimedia-on-Demand Server

Techniques for Scheduling I/O in a High Performance Multimedia-on-Demand Server Syracuse University SURFACE Eectrica Engineering and Computer Science Coege of Engineering and Computer Science 995 Techniques for Scheduing I/O in a High Performance Mutimedia-on-Demand Server Divyesh

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012 3191 Anaytica Modeing of Muti-hop IEEE 802.15.4 Networks Piergiuseppe Di Marco, Student Member, IEEE, Pangun Park, Member, IEEE,

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

Analysis and Optimisation of Stable Matching in Combined Input and Output Queued Switches

Analysis and Optimisation of Stable Matching in Combined Input and Output Queued Switches Western Austraian Teecommunications Research nstitute (WATR) Anaysis and Optimisation of Stabe Matching in Combined nput and Output Queued Switches Andreas Schweizer This thesis is presented for the degree

More information

Reducing the Requirement in FEC Codes via Capillary Routing

Reducing the Requirement in FEC Codes via Capillary Routing Reducing the Requirement in FEC Codes via Capiary Routing Emin Gabrieyan Switzernet Sàr and EPFL Lausanne, Switzerand emin.gabrieyan@switzernet.com Roger D. Hersch Écoe Poytechnique Fédérae de Lausanne

More information

A Comparative Simulation Study for Multiple Traffic Scheduling Algorithms over GPRS

A Comparative Simulation Study for Multiple Traffic Scheduling Algorithms over GPRS A Comparative Simulation Study for Multiple Traffic Scheduling Algorithms over GPRS Maurizio D Arienzo, Antonio Pescapè, Rajiv Chakravorty, Giorgio Ventre Computer Science Department University of Napoli

More information

Adaptive 360 VR Video Streaming: Divide and Conquer!

Adaptive 360 VR Video Streaming: Divide and Conquer! Adaptive 360 VR Video Streaming: Divide and Conquer! Mohammad Hosseini *, Viswanathan Swaminathan * University of Iinois at Urbana-Champaign (UIUC) Adobe Research, San Jose, USA Emai: shossen2@iinois.edu,

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Topics 1. Manipulators and robots

Topics 1. Manipulators and robots Proceedings of the Internationa Symposium of Mechanism and Machine Science, 017 AzCIFToMM Azerbaijan Technica University 11-14 September 017, Baku, Azerbaijan Topics 1. Manipuators and robots Anaysis and

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 3, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 3, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 3, APRIL 2010 409 Distributed Scheduing Scheme for Video Streag over Muti-Channe Muti-Radio Muti-Hop Wireess Networks Liang Zhou, Xinbing

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Keywords Wireless Mesh Network, Routing, WMN Routing Metric, Best Path Selection in WMNs, Wireless Routing Strategy.

Keywords Wireless Mesh Network, Routing, WMN Routing Metric, Best Path Selection in WMNs, Wireless Routing Strategy. Voume 6, Issue 7, Juy 2016 ISSN: 2277 128X Internationa Journa of Advanced Research in Computer Science and Software Engineering Research Paper Avaiabe onine at: www.ijarcsse.com An Efficient Routing Metric

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

A Model for Enhancing Connection Rerouting Using Active Networks

A Model for Enhancing Connection Rerouting Using Active Networks A Mode for Enhancing Connection Rerouting Using Active Networks Kwan Wu Chin, Mohan Kumar Department of Computer Science, Curtin University of Technoogy, GPO Box U 1987, Perth 6845, Western Austraia (chinkw,kumar)@cs.curtin.edu.au

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Carrier Aggregation. (one) Key Enabler for LTE-Advanced. Andreas Roessler. Meik Kottkamp

Carrier Aggregation. (one) Key Enabler for LTE-Advanced. Andreas Roessler. Meik Kottkamp Carrier Aggregation (one) Key Enaber for LTE-Advanced Andreas Roesser Technoogy Manager Rohde & Schwarz America andreas.roesser@rohde-schwarz.com Meik Kottkamp Technoogy Manager Rohde & Schwarz Germany

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information