Copyright 2010, Elsevier Inc. All rights Reserved

Size: px
Start display at page:

Download "Copyright 2010, Elsevier Inc. All rights Reserved"

Transcription

1 Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless Networks Copyright 2010, Elsevier Ic. All rights Reserved 1

2 Framig, Reliability, Sharig Delieatig the sequece of bits trasmitted over the lik ito complete messages that ca be delivered to the ed ode Techiques to detect trasmissio errors ad take the appropriate actio (coceptually same as RPC) Makig the liks reliable i spite of trasmissio problems Media Access Cotrol Problem Carrier Sese Multiple Access (CSMA) etworks Wireless Networks with differet available techologies ad protocol 2

3 Framig We are focusig o packet-switched etworks, which meas that blocks of data (called frames at this level), ot bit streams, are exchaged betwee odes. It is the etwork adaptor that eables the odes to exchage frames. Bits flow betwee adaptors, frames betwee hosts 3

4 Framig Whe ode A wishes to trasmit a frame to ode B, it tells its adaptor to trasmit a frame from the ode s memory. This results i a sequece of bits beig set over the lik. The adaptor o ode B the collects together the sequece of bits arrivig o the lik ad deposits the correspodig frame i B s memory. Recogizig exactly what set of bits costitute a frame that is, determiig where the frame begis ad eds is the cetral fuctio of the adaptor 4

5 Framig: Byte orieted BISYNC origial Setiel Approach (late 60s, IBM) Frames trasmitted begiig with leftmost field Begiig of a frame is deoted by sedig a special SYN (sychroize) character Data portio of the frame is cotaied betwee special setiel character STX (start of text) ad ETX (ed of text) SOH : Start of Header DLE : Data Lik Escape CRC: Cyclic Redudacy Check BISYNC Frame Format 5

6 Framig: Bit-orieted Protocol HDLC : High Level Data Lik Cotrol Begiig ad Edig Sequeces: Seder: ay time five cosecutive 1 s have bee trasmitted from the body of the message seder iserts 0 before trasmittig the ext bit (bit stuffig) Receiver: 5 cosecutive 1 s received: Next bit 0 : Stuffed, so discard it Next bit 1 : Either Ed of the frame marker, Or Error has bee itroduced i bitstream If 0 ( ) à Ed of the frame marker If 1 ( ) à Error, discard the whole frame HDLC Frame Format 6

7 Error Detectio Bit errors are itroduced ito frames Because of electrical iterferece ad thermal oises Commo techique for detectig trasmissio error CRC (Cyclic Redudacy Check) Used i HDLC, CSMA/CD Other approaches Checksum (IP) 7

8 Error Detectio Basic Idea of Error Detectio To add redudat iformatio to a frame that ca be used to determie if errors have bee itroduced Imagie (Extreme Case) Trasmittig two complete copies of data Idetical à No error Differ à Error Poor Scheme??? bit message, bit redudat iformatio Error ca go udetected I geeral, we ca provide strog error detectio techique efficietly k redudat bits, bits message, k << I Etheret, a frame carryig up to 12,000 bits of data requires oly 32- bit CRC 8

9 Error Detectio Extra bits are redudat They add o ew iformatio to the message Derived from the origial message usig some algorithm Both the seder ad receiver kow the algorithm IP weak checksum (sum of 16 bit words) Lik Level: CRC (see book/wikipedia for details as iterested) m r m r Seder Receiver Receiver computes r usig m, If they match, o error 9

10 Error Correctio Need to: Detect Error, Correct/Recover from Error Two approaches whe the recipiet detects a error Usig error correctio algorithm, the receiver recostructs the message The overhead is ofte cosidered too high for wired liks more relevat to wireless some errors go ucorrected Corrupt frames must be discarded. Notify the seder that the message was corrupted, so the seder ca sed agai. If the error is rare, the the retrasmitted message will be errorfree 10

11 Reliable Trasmissio A lik-level protocol that wats to deliver frames reliably must recover from discarded frames. Combiatio of two fudametal mechaisms A ackowledgemet (ACK for short) is a small cotrol frame that a protocol seds back to its peer sayig that it has received the earlier frame. A cotrol frame is a frame with header oly (o data). The receipt of a ackowledgemet idicates to the seder of the origial frame that its frame was successfully delivered. 11

12 Reliable Trasmissio If the seder does ot receive a ackowledgmet after a reasoable amout of time, the it retrasmits the origial frame. The actio of waitig a reasoable amout of time is called a timeout. The geeral strategy of usig ackowledgemets ad timeouts to implemet reliable delivery is sometimes called Automatic Repeat request (ARQ). Build up the cocept so you uderstad why we do t use the simplest form 12

13 Stop ad Wait Protocol Idea of stop-ad-wait protocol is straightforward After trasmittig oe frame, the seder waits for a ackowledgemet before trasmittig the ext frame. If the ackowledgemet does ot arrive after a certai period of time, the seder times out ad retrasmits the origial frame 13

14 Stop ad Wait Protocol Timelie showig four differet scearios for the stop-ad-wait algorithm. (a) The ACK is received before the timer expires; (b) the origial frame is lost; (c) the ACK is lost; (d) the timeout fires too soo 14

15 Stop ad Wait Protocol If the ackowledgmet is lost or delayed i arrivig The seder times out ad retrasmits the origial frame, but the receiver will thik that it is the ext frame sice it has correctly received ad ackowledged the first frame As a result, duplicate copies of frames will be delivered How to solve this Same coceptual issue as with TCP, RPC Use 1 bit sequece umber (0 or 1) Whe the seder retrasmits frame 0, the receiver ca determie that it is seeig a secod copy of frame 0 rather tha the first copy of frame 1 ad therefore ca igore it (the receiver still ackowledges it, i case the first ackowledgemet was lost) 15

16 Stop ad Wait Protocol Timelie for stop-ad-wait with 1-bit sequece umber 16

17 Seder Stop ad Wait Protocol -- Limitatios The seder has oly oe outstadig frame o the lik at a time This may be far below the lik s capacity Cosider a slow 1.5 Mbps lik with a 45 ms RTT The lik has a delay badwidth product of 67.5 Kb or approximately 8 KB Sice the seder ca sed oly oe frame per RTT ad assumig a frame size of 1 KB Maximum Sedig rate Bits per frame Time per frame = = 182 Kbps Or about oe-eighth of the lik s capacity To use the lik fully, the seder should trasmit up to eight frames before havig to wait for a ackowledgemet QUIZ QUESTION 17

18 Slidig Widow Protocol: Parallelism Timelie for Slidig Widow Protocol 18

19 Seder Slidig Widow Protocol Seder assigs a sequece umber deoted as SeqNum to each frame Seder maitais three variables Sedig Widow Size (SWS) Upper boud o the umber of outstadig (uackowledged) frames that the seder ca trasmit Last Ackowledgemet Received (LAR) Sequece umber of the last ackowledgemet received Last Frame Set (LFS) Sequece umber of the last frame set Seder maitais ivariat: LFS LAR SWS 19

20 Seder Slidig Widow Protocol Whe a ackowledgemet arrives the seder moves LAR to right, thereby allowig the seder to trasmit aother frame Also the seder associates a timer with each frame it trasmits It retrasmits the frame if the timer expires before the ACK is received Note that the seder has to be willig to buffer up to SWS frames 20

21 Receiver Slidig Widow Protocol Receiver maitais three variables Receivig Widow Size (RWS) Upper boud o the umber of out-of-order frames that the receiver is willig to accept Largest Acceptable Frame (LAF) Sequece umber of the largest acceptable frame Last Frame Received (LFR) Sequece umber of the last frame received Receiver maitais ivariat: LAF LFR RWS 21

22 Receiver Slidig Widow Protocol Whe a frame with sequece umber SeqNum arrives: If SeqNum LFR or SeqNum > LAF Discard it (the frame is outside the receiver widow) If LFR < SeqNum LAF Accept it Decide whether or ot to sed a ACK Let SeqNumToAck Deote the largest sequece umber ot yet ackowledged, such that all frames with sequece umber less tha or equal to SeqNumToAck have bee received The receiver ackowledges the receipt of SeqNumToAck eve if higher-umbered packets have bee received This ackowledgemet is said to be cumulative. The receiver the sets LFR = SeqNumToAck ad adjusts LAF = LFR + RWS 22

23 Slidig Widow Protocol Iefficiecies Whe timeout occurs, the amout of data i trasit decreases Sice the seder is uable to advace its widow Whe the packet loss occurs, this scheme is o loger keepig the pipe full The loger it takes to otice that a packet loss has occurred, the more severe the problem becomes How to improve this -- Will discuss uaces i cotext of TCP i future lecture Negative Ackowledgemet (NAK) Additioal Ackowledgemet Selective Ackowledgemet 23

24 NAKs, Duplicate Acks, Selective Acks Negative Ackowledgemet (NAK) Receiver seds NAK for frame 6 whe frame 7 arrive (i the previous example) However this is uecessary sice seder s timeout mechaism will be sufficiet to catch the situatio Additioal Ackowledgemet Receiver seds additioal ACK for frame 5 whe frame 7 arrives Seder uses duplicate ACK as a clue for frame loss Selective Ackowledgemet Receiver will ackowledge exactly those frames it has received, rather tha the highest umber frames Receiver will ackowledge frames 7 ad 8 Seder kows frame 6 is lost Seder ca keep the pipe full (additioal complexity) 24

25 Sequece umbers How to distiguish betwee differet icaratios of the same sequece umber? Number of possible sequece umber must be larger tha the umber of outstadig frames allowed Stop ad Wait: Oe outstadig frame 2 distict sequece umber (0 ad 1) Let MaxSeqNum be the umber of available sequece umbers SWS + 1 MaxSeqNum Is this sufficiet? 25

26 Sequece umber space SWS + 1 MaxSeqNum Is this sufficiet? Depeds o RWS If RWS = 1, the sufficiet If RWS = SWS, the ot good eough For example, we have eight sequece umbers 0, 1, 2, 3, 4, 5, 6, 7 RWS = SWS = 7 Seder seds 0, 1,, 6 Receiver receives 0, 1,,6 Receiver ackowledges 0, 1,, 6 ACK (0, 1,, 6) are lost Seder retrasmits 0, 1,, 6 Receiver is expectig 7, 0,., 5 To avoid this, If RWS = SWS, SWS < (MaxSeqNum + 1)/2 26

27 Sharig Liks Etheret Wifi 27

28 Etheret Most successful local area etworkig techology of last 30 years. Developed i the mid-1970s by researchers at the Xerox Palo Alto Research Ceters (PARC). Uses CSMA/CD techology Carrier Sese Multiple Access with Collisio Detectio. A set of odes sed ad receive frames over a shared lik. Carrier sese meas that all odes ca distiguish betwee a idle ad a busy lik. Collisio detectio meas that a ode listes as it trasmits ad ca therefore detect whe a frame it is trasmittig has collided with a frame trasmitted by aother ode. Iterestig desig lessos for higher level distributed systems (pub/sub bus) 28

29 Etheret -- Origis Uses ALOHA (packet radio etwork) as the root protocol Developed at the Uiversity of Hawaii to support commuicatio across the Hawaiia Islads (early 70s). For ALOHA the medium was atmosphere, for Etheret the medium is a coax cable. DEC ad Itel joied Xerox to defie a 10-Mbps Etheret stadard i This stadard formed the basis for IEEE stadard was later exteded to iclude a 100-Mbps Fast Etheret ad a 1000-Mbps Gigabit Etheret. 29

30 Etheret -- hardware Etheret segmet origial was coaxial cable of up to 500 m. Up to 5 segmets ca be joied by repeaters -- total reach 2500 m. Later thier cable kow as 10Base2 up to 200 m; Twisted pair 10Base1 up to 100 m (used with Etheret Hubs that xmit oto all liks) Hosts coect to a Etheret segmet by tappig ito it. A trasceiver (a small device directly attached to the tap) detects whe the lie is idle ad drives sigal whe the host is trasmittig, ad receives icomig sigal. Etheret adaptor plugs ito host ad implemets protocol 30

31 Etheret is a Bus Ay sigal placed o the Etheret by a host is broadcast over the etire etwork Sigal is propagated i both directios. Repeaters forward the sigal o all outgoig segmets. Termiators attached to the ed of each segmet absorb the sigal. Etheret hubs rebroadcast oto all attached liks so still oe broadcast etwork 31

32 Access Protocol for Etheret -- Framig Etheret s Media Access Cotrol (MAC). implemeted i Hardware o the etwork adaptor. Frame format Preamble (64bit): allows the receiver to sychroize with the sigal (sequece of alteratig 0s ad 1s). Host ad Destiatio Address (48bit each). Packet type (16bit): acts as demux key to idetify the higher level protocol. Data (up to 1500 bytes) Miimally a frame must cotai at least 46 bytes of data. Frame must be log eough to detect collisio. CRC (32bit) 32

33 Etheret Addresses Each host o a Etheret (i fact, every Etheret host i the world) has a uique Etheret Address. The address belogs to the adaptor, ot the host. It is usually burt ito ROM. Etheret addresses prited i a huma readable format sequece of six umbers separated by colos. Each umber correspods to 1 byte of the 6 byte address ad is give by a pair of hexadecimal digits, oe for each of the 4-bit ibbles i the byte; Leadig 0s are dropped. 8:0:2b:e4:b1:2 is Each maufacturer of devices is allocated a differet prefix prepeded to address o every adaptor they build (AMD assiged 24bit prefix 8:0:20) 33

34 Etheret Receiver Each frame trasmitted o a Etheret is received by every adaptor coected to that Etheret. Each adaptor recogizes those frames addressed to its address ad passes oly those frames o to the host. I additio, to uicast address, a Etheret address cosistig of all 1s is treated as a broadcast address. All adaptors pass frames addressed to the broadcast address up to the host. Similarly, a address that has the first bit set to 1 but is ot the broadcast address is called a multicast address. A give host ca program its adaptor to accept some set of multicast addresses. 34

35 Etheret Trasmitter Liste before Talk Whe the adaptor has a frame to sed ad the lie is idle, it trasmits the frame immediately. The upper boud of 1500 bytes i the message meas that the adaptor ca occupy the lie for a fixed legth of time. Whe the adaptor has a frame to sed ad the lie is busy, it waits for the lie to go idle ad the trasmits immediately. ( Carrier Sese =Liste before talk) The Etheret is said to be 1-persistet protocol because a adaptor with a frame to sed trasmits with probability 1 wheever a busy lie goes idle. 35

36 Etheret Trasmitter Collisio Detectio Sice there is o cetralized cotrol it is possible for two (or more) adaptors to begi trasmittig at the same time, Either because both foud the lie to be idle, Or, both had bee waitig for a busy lie to become idle. The two (or more) frames are said to be collide o the etwork. Each seder is able to determie that a collisio is i progress (sigal is abormal) by Listeig while trasmittig". At the momet a adaptor detects that its frame is collidig with aother, it first makes sure to trasmit a 32- bit jammig sequece ad the stops trasmissio. Trasmitter miimally seds 96 bits i the case of collisio with earby host: 64-bit preamble + 32-bit jammig sequece 36

37 Collisio Detectio ot istataeous The worst case sceario happes whe the two hosts are at opposite eds of the Etheret. To kow for sure that the frame its just set did ot collide with aother frame, the trasmitter may eed to sed as may as 512 bits. Every Etheret frame must be at least 512 bits (64 bytes) log. 14 bytes of header + 46 bytes of data + 4 bytes of CRC The farther apart two odes are, the loger it takes for a frame set by oe to reach the other, ad the etwork is vulerable to collisio durig this time 37

38 Collisio detectio delay A begis frame at time t; d is oe lik latecy The first bit of A s frame arrives at B at time t + d Suppose a istat before host A s frame arrives, host B begis to trasmit its ow frame B s frame will immediately collide with A s frame ad this collisio will be detected by host B Host B will sed the 32-bit jammig sequece Host A will ot kow that the collisio occurred util B s frame reaches it, which could happe at t + 2 * d Host A must cotiue to trasmit util this time i order to detect the collisio (liste while talkig) Host A must trasmit for 2 * d to be sure that it detects all collisios (d= 51.2 µs if 2500 màtrasmit 512 bits o 10 Mbps Etheret) 38

39 Etheret Trasmitter Algorithm Cosider that a maximally cofigured Etheret is 2500 m log, ad there may be up to four repeaters betwee ay two hosts, the roud trip delay has bee determied to be 51.2 µs Which o 10 Mbps Etheret correspods to 512 bits The other way to look at this situatio, We eed to limit the Etheret s maximum latecy to a fairly small value (51.2 µs) for the access algorithm to work efficietly Hece the maximum legth for the Etheret is o the order of 2500 m. Copyright 2010, Elsevier Ic. All rights Reserved 39

40 Expoetial backoff What if the etwork is very busy lots of host wat to trasmit a lot Collisio rate goes up Oce a adaptor has detected a collisio, ad stopped its trasmissio, it waits a certai amout of time ad tries agai. Each time the adaptor tries to trasmit but fails, it doubles the amout of time it waits before tryig agai. This strategy of doublig the delay iterval betwee each retrasmissio attempt is kow as Expoetial Backoff. 40

41 Expoetial backoff w/ radomizatio The adaptor first delays either 0 or 51.2 µs, selected at radom. If this effort fails, it the waits 0, 51.2, 102.4, µs (selected radomly) before tryig agai; This is k * 51.2 for k = 0, 1, 2, 3 After the third collisio, it waits k * 51.2 for k = (agai selected at radom). I geeral, the algorithm radomly selects a k betwee 0 ad 2 1 ad waits for k * 51.2 µs, where is the umber of collisios experieced so far. 41

42 Experiece with Etheret Etherets work best uder lightly loaded coditios. Uder heavy loads, too much of the etwork s capacity is wasted by collisios. Most Etherets are used i a coservative way. Have fewer tha 200 hosts coected to them which is far fewer tha the maximum of Most Etherets are far shorter tha 2500m with a roudtrip delay of closer to 5 µs tha 51.2 µs. Etherets are easy to admiister ad maitai. There are o switches that ca fail ad o routig ad cofiguratio tables that have to be kept up-to-date. It is easy to add a ew host to the etwork. It is iexpesive. Cable is cheap, ad oly other cost is the etwork adaptor o each host. Copyright 2010, Elsevier Ic. All rights Reserved 42

43 Wireless Liks Wireless liks trasmit electromagetic sigals Radio, microwave, ifrared Wireless liks all share the same wire (so to speak) The challege is to share it efficietly without uduly iterferig with each other Most of this sharig is accomplished by dividig the wire alog the dimesios of frequecy ad space Cotrol Rage through trasmit sigal power Cotrol Frequecy through frequecy hoppig, spread spectrum 43

44 Wireless across various scales Wireless techologies differ i a variety of dimesios How much badwidth they provide How far apart the commuicatio odes ca be Four promiet wireless techologies Bluetooth; Wi-Fi (more formally kow as ); WiMAX (802.16); 3G-4G cellular wireless 44

45 Most wireless etworks use asymmetry Mostly widely used wireless liks today are usually asymmetric-- Two ed-poits are differet kids of odes Oe ed-poit usually has o mobility, but has wired coectio to the Iteret (kow as base statio or Access Poit (AP)) The ode at the other ed of the lik is ofte mobile 45

46 IEEE Also kow as Wi-Fi Like its Etheret ad toke rig sibligs, is desiged for use i a limited geographical area (homes, office buildigs, campuses) Primary challege is to mediate access to a shared commuicatio medium i this case, sigals propagatig through space supports additioal features power maagemet ad security mechaisms May variats over time, may details, will focus o shared cocepts 46

47 IEEE Origial stadard defied two radio-based physical layer stadard Oe usig the frequecy hoppig Over 79 1-MHz-wide frequecy badwidths Secod usig direct sequece Usig 11-bit chippig sequece Both stadards ru i the 2.4-GHz ad provide up to 2 Mbps The physical layer stadard b was added Usig a variat of direct sequece b provides up to 11 Mbps Uses licese-exempt 2.4-GHz bad The came a which delivers up to 54 Mbps usig OFDM a rus o licese-exempt 5-GHz bad Most recet stadard is g which is backward compatible with b Uses 2.4 GHz bad, OFDM ad delivers up to 54 Mbps Copyright 2010, Elsevier Ic. All rights Reserved 47

48 Wireless chaels more challegig Example: each of four odes able to sed ad receive sigals with select other odes ot all B ca exchage frames with A ad C, but it caot reach D C ca reach B ad D but ot A If they were all coected to a Etheret they would all reach each other 48

49 Collisio maagemet challege -- Hidde odes Suppose both A ad C wat to commuicate with B ad so they each sed it a frame. A ad C are uaware of each other sice their sigals do ot carry that far These two frames collide with each other at B But ulike a Etheret, either A or C is aware of this collisio A ad C are said to hidde odes with respect to each other The Hidde Node Problem. Although A ad C are hidde from each other, their sigals ca collide at B. (B s reach is ot show.) 49

50 IEEE Collisio Avoidace addresses these two problems with a algorithm called Multiple Access with Collisio Avoidace (MACA). Key Idea less radom access, more coordiatio Seder ad receiver exchage cotrol frames with each other before the seder actually trasmits ay data. This exchage iforms all earby odes that a trasmissio is about to begi Seder trasmits a Request to Sed (RTS) frame to the receiver. The RTS frame icludes a field that idicates how log the seder wats to hold the medium - Legth of the data frame to be trasmitted Receiver replies with a Clear to Sed (CTS) frame This frame echoes this legth field back to the seder 50

51 IEEE Collisio Avoidace Ay ode that sees the CTS frame kows that it is close to the receiver, therefore caot trasmit for the period of time it takes to sed a frame of the specified legth Ay ode that sees the RTS frame but ot the CTS frame is ot close eough to the receiver to iterfere with it, ad so is free to trasmit 51

52 IEEE Collisio Avoidace Usig ACK i MACA Proposed i MACAW: MACA for Wireless LANs Receiver seds a ACK to the seder after successfully receivig a frame All odes must wait for this ACK before tryig to trasmit If two or more odes detect a idle lik ad try to trasmit a RTS frame at the same time Their RTS frame will collide with each other does ot support collisio detectio So the seders realize the collisio has happeed whe they do ot receive the CTS frame after a period of time I this case, they each wait a radom amout of time before tryig agai. The amout of time a give ode delays is defied by the same expoetial backoff algorithm used o the Etheret. Copyright 2010, Elsevier Ic. All rights Reserved 52

53 IEEE Access Poit Distributio System Followig figure illustrates a distributio system that coects three access poits, each of which services the odes i the same regio Each of these regios is aalogous to a cell i a cellular phoe system with the APs playig the same role as a base statio Each odes associates itself with oe access poit For ode A to commuicate with ode E, A first seds a frame to its AP- 1 which forwards the frame across the distributio system to AP-3, which fially trasmits the frame to E 53

54 Frame Format for Distributio across APs Source ad Destiatios addresses: each 48 bits Data: up to 2312 bytes; CRC: 32 bit Cotrol field: 16 bits 6 bit Type field: idicates whether the frame is a RTS or CTS frame or beig used by the scaig algorithm; A pair of 1 bit fields : called ToDS ad FromDS Simplest case: Both DS bits are 0 -- oe ode seds directly to aother, Addr1 idetifies the target ode, ad Addr2 idetifies the source ode Complex case: Both DS bits are 1 -- message wet from wireless ode oto distributio system, ad from distributio system to aother wireless ode Addr1 idetifies the ultimate destiatio, Addr2 idetifies the immediate seder (the oe that forwarded the frame from the distributio system to the ultimate destiatio) Addr3 idetifies the itermediate destiatio (the oe that accepted the frame from a wireless ode ad forwarded across the distributio system) Addr4 idetifies the origial source Addr1: E, Addr2: AP-3, Addr3: AP-1, Addr4: A 54

55 IEEE AP associatio How do the odes select their access poits How does it work whe odes move from oe cell to aother The techique for selectig a AP is called scaig The ode seds a Probe frame All APs withi reach reply with a Probe Respose frame The ode selects oe of the access poits ad seds that AP a Associatio Request frame The AP replies with a Associatio Respose frame A ode egages this protocol wheever it jois the etwork, as well as whe it becomes uhappy with its curret AP This might happe, for example, because the sigal from its curret AP has weakeed due to the ode movig away from it Wheever a ode acquires a ew AP, the ew AP otifies the old AP of the chage via the distributio system Copyright 2010, Elsevier Ic. All rights Reserved 55

56 Bluetooth Used for very short rage commuicatio betwee mobile phoes, PDAs, otebook computers ad other persoal or peripheral devices Operates i the licese-exempt bad at 2.45 GHz Has a rage of oly 10 m Commuicatio devices typically belog to oe idividual or group Sometimes categorized as Persoal Area Network (PAN) Versio 2.0 provides speeds up to 2.1 Mbps Power cosumptio is low 56

57 ZigBee ZigBee competes with Bluetooth Devised by the ZigBee alliace ad stadardized as IEEE It is desiged for situatios where the badwidth requiremets are low ad power cosumptio must be very low to give very log battery life It is also iteded to be simpler ad cheaper tha Bluetooth, makig it fiacially feasible to icorporate i cheaper devices such as a wall switch that wirelessly commuicates with a ceilig-mouted fa 57

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Reliable Transmission

Reliable Transmission Reliable Transmission How to fix corrupted frames. Error correcting codes too expensive Should discard frames (retransmission) Recover from Corrupt s should be done in the Link Level Data Link Networks

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

Direct Link Networks (II)

Direct Link Networks (II) Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access

More information

Bluetooth Basics. Bluetooth Overview

Bluetooth Basics. Bluetooth Overview Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 2 Getting Connected Copyright 2010, Elsevier Inc. All rights Reserved Perspectives on Connecting An end-user s view of the

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

CS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray CS 457 Networking and the Internet Fall 2016 Indrajit Ray Link Layer Protocols Problems In earlier lectures we saw networks consisting of links interconnecting nodes. How to connect two nodes together?

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Counting Regions in the Plane and More 1

Counting Regions in the Plane and More 1 Coutig Regios i the Plae ad More 1 by Zvezdelia Stakova Berkeley Math Circle Itermediate I Group September 016 1. Overarchig Problem Problem 1 Regios i a Circle. The vertices of a polygos are arraged o

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Learning to Shoot a Goal Lecture 8: Learning Models and Skills

Learning to Shoot a Goal Lecture 8: Learning Models and Skills Learig to Shoot a Goal Lecture 8: Learig Models ad Skills How do we acquire skill at shootig goals? CS 344R/393R: Robotics Bejami Kuipers Learig to Shoot a Goal The robot eeds to shoot the ball i the goal.

More information

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Communication methods. Communication methods. Communication methods. Dimensions to consider. Waveform

Communication methods. Communication methods. Communication methods. Dimensions to consider. Waveform Commuicatio methods Commuicatio methods Media ad sigalig covetios used to trasmit data betwee digital devices Differet physical layers methods icludig: wires, radio freuecy (RF), optical (IR, fiber) Differet

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

IS-IS for IPv6. ISP Workshops

IS-IS for IPv6. ISP Workshops IS-IS for IPv6 ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April 2018

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Communication methods. Communication methods. Communication methods. Dimensions to consider. Waveform

Communication methods. Communication methods. Communication methods. Dimensions to consider. Waveform Commuicatio methods Commuicatio methods Media ad sigalig covetios used to trasmit data betwee digital devices Differet physical layers methods icludig: wires, radio freuecy (RF), optical (IR, fiber) Differet

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Principles of modern LAN design and operation. Guido Marchetto Fulvio Risso Politecnico di Torino

Principles of modern LAN design and operation. Guido Marchetto Fulvio Risso Politecnico di Torino Priciples of moder LAN desig ad operatio Guido Marchetto Fulvio Risso Politecico di Torio 1 Copyright otice This set of trasparecies, hereiafter referred to as slides, is protected by copyright laws ad

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the

More information

Chapter 2: Non-hierarchical Coloured Petri Nets. 1`(1,"COL")++ 1`(2,"OUR")++ 1`(3,"ED ")++ 1`(4,"PET")++ 1`(5,"RI ")++ 1`(6,"NET") (n,d) AllPackets

Chapter 2: Non-hierarchical Coloured Petri Nets. 1`(1,COL)++ 1`(2,OUR)++ 1`(3,ED )++ 1`(4,PET)++ 1`(5,RI )++ 1`(6,NET) (n,d) AllPackets Modellig ad Validatio of ocurret Systems hapter 2: No-hierarchical Kurt Jese & Lars Michael Kristese {jese,lmristese} @cs.au.d lls s To Sed Sed NextSed 6 `(,"OL")++ `(2,"OUR")++ `(3,"E ")++ `(4,"PET")++

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Today s Topic: Vacatios Sa Fracisco Moterey

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1 Advaced Architectures Master Iformatics Eg. 2017/18 A.J.Proeça Memory Hierarchy (most slides are borrowed) AJProeça, Advaced Architectures, MiEI, UMiho, 2017/18 1 Itroductio Programmers wat ulimited amouts

More information