Prioritizing Information for Achieving QoS Control in WSN

Size: px
Start display at page:

Download "Prioritizing Information for Achieving QoS Control in WSN"

Transcription

1 th IEEE Internatonal Conference on Advanced Informaton Networkng and Applcatons Prortzng Informaton for Achevng os Control n WSN 1 Atf Sharf, 2 Vdyasagar Potdar Dgtal Ecosystems and Busness Intellgence Insttute, Curtn Unversty of echnology Perth, WA, Australa 1 atf.sharf@postgrad.curtn.edu.au 2 v.potdar@curtn.edu.au Abstract Achevng os objectve n Wreless Sensor Network (WSN that deals wth multmeda nformaton s of paramount mportance n the WSN research communty. From the applcaton pont of vew, meetng applcaton specfc os constrants s equally mportant as desgnng energy effcent embedded crcutry for WSN nodes. Among varous WSN communcaton protocol stack, the transport layer functonalty has gan fundamental fame lately n addressng the applcaton specfc os objectves by supportng Source prortzaton besdes the relablty and congeston control aspects of the desgn that helps n ganng hgh throughput wth mnmum end-to-end packet latency. hs paper present the desgn of a new transport layer protocol that prortzes sensed nformaton based on ts nature whle smultaneously supportng the data relablty and congeston control features. he proposed transport protocol s tested n three possble scenaros.e. wth prorty, wthout and dstrbuted prorty features. Smulaton results reveal that by prortzng the Source nformaton and prortzed ntermedate storage and forwardng reduces the End-to-End (E-2-E latency of Source packets havng <100 msec except for Source A where t s slghtly hgher than 400msec compared to non prortzed case where the E-2-E Source packet latency accounts to >400msec whch s qute sgnfcant. Smulaton test has been performed for dstrbuted prortzed ntermedate storage and forwardng among whch the network dstrbuton wth node K as prortzed ntermedate storage node (DIS-K outperformed all of the mentoned cases by havng 100% acheved Source prorty,0% packet drop rate and 0.28Mbps acheved bt rate. Keywords- WSN, prorty, os, transport protocol, congeston control, relablty. I. INRODUCION Wreless Sensor Network (WSN gathers the ntenton of the research communty from past few years n a varety of applcatons rangng from envronmental montorng to mltary by nvolvng multple dscplnes of control, sgnal processng and embedded computng [1-3, 9]. WSN comprsed of tny peces of hardware called mote, havng nbult features of sensng, processng and communcaton over wreless channel, dstrbuted randomly n space to form an ad-hoc network for communcatng the sensed nformaton from the regon of nterest to central control staton also called snk. Energy s a prmary concern whle desgnng the WSN and achevng the objectve of energy effcency researchers are consstently engaged n desgnng the power effcent hardware and communcaton protocol stack for WSN. Beng a network of A.J.D.Rathnayaka Department of Electronc and elecommuncaton Engneerng, Unversty of Moratuwa Sr Lanka ajdr03@ent.mrt.ac.lk energy hungry devces, energy effcent hardware and communcaton protocol stack desgn whle smultaneously enablng the feature of energy scavengng s of paramount mportance for longevty of the WSN. In WSN, among varous other layers of the communcaton protocol stack, transport layer s of fundamental mportance for ensurng the E-2-E relablty of the sensed nformaton as sgnfcant proporton of the overall mote s energy budget s spent for ths type of communcaton besdes mote s locally [1-3] sensng and processng the nformaton of nterest. he man causes of packet drop nclude: Congeston, Collsons due to hdden motes, Poor SNR due to bad channel qualty, Lnk breakage due to mote falure. Packet retransmsson caused by packet drop due to poor channel condtons or network congeston consderably consumes mote s power and therefore reduces the lfe of the WSN. Recently research communty s tryng to modfy the exstng WSN desgn (for fxed applcaton to target heterogeneous applcatons where the data s ether scalar or multmeda by nature. For such applcatons data prortzaton s also of sgnfcant mportance for achevng the longevty of the WSN as the multmeda packet drop retransmssons occurs at consderable dspense of the mote s power budget. ransport layer of the WSN s responsble for communcatng the sensed pece of nformaton from the Source mote to snk [3]. Data nformaton relablty ether Hop-by-Hop (H-b-H or E-2-E s of key mportance from the applcaton ualty of Servce (os pont of vew and transport layer s responsble for mantanng the applcaton specfc os [1]. he data packets fal to reach the snk can be retreved by snk whch sends the Negatve Acknowledgement (NACK to Source or some ntermedate node (desgnated for temporary storage. he number and the arrangement of these storage nodes are hghly depends upon the followng: Requred level of applcaton specfc os to be acheved, Network topology, X/10 $ IEEE DOI /AINA

2 Level of congeston n the dfferent parts of the network, Severty of nterference that causes massve data packet loss. We nvestgated the dependence of the WSN transport layer protocol on underlyng MAC/Wreless-Phy layer where we concluded that for the longevty of the WSN the transport layer has a drect relatonshp wth the underlyng MAC/Wreless- Phy layer [11]. Based on the observatons we had envsaged a transport protocol desgn based on stochastc control framework that manages congeston and E-2-E data relablty features of the WSN transport layer protocol [12]. In the followng paper we are ncorporatng the prorty feature n the exstng stochastc control frame work based transport layer protocol desgn that enables prortzaton of the Source nformaton and prortzed ntermedate storng and forwardng of the Source nformaton towards snk n-order to ensure the applcaton specfc os. he rest of the paper s organzed as followng. After ntroducng the related work s covered n Secton II followed by the problem defnton, system requrements and desgn consderatons n secton III. Secton IV descrbes the proposed transport layer protocol. Secton V descrbes the algorthm of the proposed transport layer protocol followed by secton VI where we have descrbe the smulaton setup used for observng ts behavor and the smulaton results we have taken. he dscusson followed by the conclusons wll be presented n the secton VII. II. RELAED WORK In ths secton we focus on the exstng transport protocols used for WSN. We begn the dscusson wth CP [13], UDP [14] and then extend t to varous other WSN transport protocols lke CODA [15], ESR [16], RMS [17], PSF [18], RBC [19], GARUDA [20], DC [21], SCP [22] and CPWW [23]. able 1 compares varous WSN transport protocols lke CODA, ESR, RMS, PSF, RBC, GARUDA, DC, SCP and CPWW. CP [13] (connecton orented by nature assumes congeston as the man cause of packet drop. It assures strct E-2-E relablty at very hgh energy cost, whch s not acceptable n WSN because of ts strct energy constrants. UDP [14] on the other hand, beng connectonless by nature, offers sgnfcant throughput n comparson to CP, but the packet drop rate s sgnfcantly hgher durng congeston [11]. herefore the basc nference s that UDP offers extremely hgh throughput but mnmum relablty, whereas CP offers extremely hgh relablty but low throughput. Our lterature study concludes that the exstng research n the feld of WSN transport protocol development exsts n between these two extremes, whch we now dscuss n detal. As show n able 1, CODA (.e. Congeston Detecton and Avodance protocol [15] lacks relablty but provdes excellent congeston control n the forward drecton. hs control s acheved by explct notfcaton of the congested scenaro to the chld motes. It utlzes wreless channel load and motes buffer occupancy for congeston detecton and uses open-loop H-b-H back pressure and closed loop E-2-E mult- Source regulaton for rate adjustment. Features Protocol CODA ESR ABLE I. Drecton Upstream Upstream RMS Upstream No PSF Downstream No GARUD A SCP Downstream Upstream WSN RANSPOR PROOCOLS Congeston Control Support Yes, Actve control, Explct Nototfcaton Passve Control, Implct Notfcaton No Passve Control, Implct Notfcaton Relablty Management Support CPWW [23] (CP Westwood s a sender based extenson of the exstng CP protocol. It refnes the wndow control and back-off process of the exstng CP desgn thereby achevng greater desgn effcency under sporadc or random data losses. Under congested network condtons CPWW uses the estmated value of the avalable channel bandwdth for properly settng the congeston wndow and slow start threshold lmts. It also ensures rapd data retreval, by avodng excessvely conservatve reductons of congeston wndow and the slow start threshold lmts. Other than CODA and CPWW, there are a number of other WSN transport protocols publshed n the lterature lke ESR, RMS, PSF, RBC, GARUDA and DC. hese protocols only am to provde relablty but completely lack congeston control feature. We now brefly explan ths set of protocols. Event-to-Snk Relable ransport (ESR [16] ams to provde Event Based (EB relablty support by employng mplct (Imp loss detecton and notfcaton and E-2-E loss recovery mechansm. It also provdes passve congeston control n the Forward (Fwd drecton by ncorporatng Imp congeston notfcaton feature. Relable Mult-Segment ransport protocol (RMS [17] offers Packet Based (PB relablty support, H-b-H Loss No CPWW Upstream Yes No Yes, Event Based, Implct loss detecton and notfcaton wt h E- 2-E recovery Yes, Packet Based, NACK based loss detecton and H-b-H recovery Yes, Packet Based, NACK based loss detecton and H-b-H recovery Yes, Packet Based, NACK based loss detecton and H-b-H recovery, wo-ter wo stage Yes, Packet Based and Event Based, NACK/ACK based loss detecton and E-2-E recovery 836

3 Recovery (LR n the forward drecton by ncorporatng Not Acknowledge (NACK based loss detecton and notfcaton control. It uses tmng nformaton for data loss detecton and once data loss s detected t sends a NACK to the Source mote or storage mote, whch then retransmts the correspondng data packet upon recevng the NACK. Pump Slowly Fetch uckly (PSF [18] ams to address the relablty support only n the reverse (Rev drecton from the snk motes to the Source motes. It uses NACK for data loss detecton and s facltated wth rapd H-b-H loss recovery mechansm. However t s unable to detect the loss of a sngle packet when packets are transmtted n bulk. It also requres more buffer storage (beng H-b-H nature at the ntermedate motes for data recovery. Relable Bursty Convergecast protocol (RBC [19] offers E-2-E packet based relablty support n the Fwd drecton. he level of relablty provded by RBC s comparatvely hgher than RMS and PSF because t ncorporates Imp H-b-H loss detecton, loss notfcaton and loss recovery mechansm at MAC level. It uses NACK/ACK (Acknowledge as a means for data loss notfcaton and Implct Acknowledgement (IACK for loss notfcaton at MAC level only. GARUDA [20] provdes relablty n the Rev drecton,.e., from the snk mote to the sensor motes. It uses core motes located at 3-hop dstance apart for temporary sensed data storage, whch could be retreved n the event of loss. It uses NACK for data loss detecton and two-ter two-stage loss recovery mechansm. Dstrbuted CP cashng protocol (DC [21] ams to provde total packet drven relablty n both drectons. It uses ACK and Selectve ACK (SACK for data loss detecton. In DC snk mote has the loss recovery control and uses H-b-H mechansm for possble loss recovery. Sensor CP (SCP [22] s the only protocol so far that offers both congeston control and data relablty. It uses open-loop H-b-H rate control mechansm wth Imp congeston notfcaton. It uses packet processng and nter-arrval tme for congeston detecton. It offers both packet and event drven relablty and uses ACK and NACK to facltate E-2-E relablty objectve. In ths secton we revewed the exstng transport protocol schemes for WSN. SCP s the closest work to what we are proposng, snce t addresses congeston control as well as relablty. In the next secton we gve an overvew of our proposed protocol. III. PROBLEM DEFINIION In WSN the factors lke packet collsons at the recevng node due to transmssons from other nodes havng the common destnaton (hdden node problem, congeston, route falure, crosstalk: resultng n hgh bt error rate (BER etc contrbutes towards hgh power cost for per data packet communcaton, lower system throughput and ncreased E-2-E data packet latency. So for enhancng the WSN energy effcency transport layer protocol plays a vtal role n ncreasng the network throughput and mnmal E-2-E packet latency whle mantanng the applcaton specfc os [11]. Also data nformaton routng based on the nature of the packet nformaton further elevates the energy effcency of WSN. In ths paper we present a lght weght transport protocol that takes E-2-E packet nformaton, ntermedate node storage memory occupancy for evaluatng the congeston ndex and packet nformaton type for packet prortzaton. he smulaton of the envsaged transport layer protocol enable us n better understandng of the above mentoned performance lmtng features and would open new dmensons n transport protocol desgnng for WSN. A. Requrements and Desgn Consderatons he key requrement of the proposed transport protocol s as follows: 1. Congeston Control 2. Data Relablty 3. Heterogeneous Applcaton Support 4. Snk Enabled Control he frst requrement for our proposed protocol s Congeston Control. o adhere to ths requrement the protocol should be able to detect, notfy and mtgate congeston n the network or at local hot-spots effectvely. hs s one of the man requrements because by adherng to ths requrement packet drops can be reduced and hence the energy assocated wth packet retransmssons can be saved. o address ths requrement the proposed protocol ncorporates the followng desgn consderaton. he congeston control functonalty n the proposed protocol employs end-to-end nformaton of each packet at the snk mote for measurng the congeston state of the network (or lnk. he new rate value for future data packet s then estmated based on ths end-to-end nformaton or congeston state of the network. he Second requrement for our proposed protocol s Data Relablty and can be met by the ntroducton of the temporary dscrete data storage for possble data retreval n event of packet drop ether due to congeston or poor channel condtons. Any ntermedate mote, located at bottleneck locatons of the WSN (near snk or mote havng large number of chld motes, can serve the purpose of storage mote. In the proposed scheme the mmedate chld mote to snk and motes at locatons that relays large amount of data (ts own sensed data plus the data from large number of chld motes can serve the purpose of ntermedate storage. In the proposed scheme the ntermedate storage motes store data for predefned nterval of tme based on the apror estmated value of total probablty of data packet drop (P f. However n order to conserve the energy spectrum of the WSN network we possbly n future ncorporatng the dea of varable relablty that ensures the retreval of only hgh prorty data packet (e.g. event based nformaton f lost wll be retreved n comparson to less pror scalar nformaton. he data flow n the wreless network may be event drven, perodc or contnuous of ether multmeda or scalar by nature, so the proposed transport protocol should have the feature of Heterogeneous Applcaton Support and s not lmted to 837

4 certan applcaton scenaros. Such type of problem can be addressed by prortzng the data based on ts type. So the ntermedate motes processes the ncomng packets based on ts prorty/nature of data. Presently the proposed transport protocol scheme works based on Snk Enabled Control [12], as snk has hgh computatonal power n comparson to Source and ntermedate sensor motes. So majorty of the computatonally ntensve tasks related to congeston control and relablty are beng performed by the snk mote. In our case we have mplemented a state machne, as descrbed n the Secton V, whch predcts the congeston state of the network based on the (.e. packet E-2-E and usng ths ndex to defne a new Source rate plan. IV. PROPOSED PRIORIY BASEDRANSPOR PROOCOL SCHEME A. Proposed WSN ransport Protocol Scheme he block dagram of the proposed scheme s shown n Fgure 2. he proposed scheme comprsed of followng functonal modules Congeston Control Module Prortzaton and Relablty Module Congeston Detecton Fgure 1. he Proposed ransport Layer Protocol 1 Congeston Control Module Congeston control module [8] s used to detect, nform and mtgate the congeston n the network. Congeston n the network occurs when the data sendng rate from multple Sources exceeds the avalable channel bandwdth. Falure to prevent congeston n the network results n 1. Data packet drop and wll consderably deplete network energy budget. 2. Increased E-2-E data packet latency. Here the packet for sngle hop (1-hop propagaton s gven by (1 pr Prortzaton Rate Readjustment Congeston Control Module pp Data Retreval Prortzaton and Relablty Module Congeston Notfcaton For detaled mathematcal understandng please refer to [12]. We ncorporated Prortzed Source nformaton forwardng ncludng ntermedate storage feature n the exstng transport layer protocol [12] based on stochastc control framework. = average E-2-E packet n seconds, pr pp = average packet processng tme at node n seconds, = average node queue n seconds, = average 1-hop propagaton tme n seconds. o effectvely prevent congeston n the WSN we envsaged a prortzed transport layer protocol for WSN. he congeston ndex helps n dentfyng the level of congeston n the network and s gven by the followng equaton: C n * m ( E 2 E (2 m = congeston level whch s realzed by the ntermedate mote memory storage, n= number of ntermedate storage nodes, (E-2-E= E-2-E packet n seconds. locaton/word then m s gven by: otal free spaces n the storage m otal Memory space for storage * (3 m = * (4 Also for N number of hops between Source and snk wth per mote and per lnk propagaton of pr then ( E2E s gven by: ( E 2 E N * pr (5. (6 pr MAC = ueue at any ntermedate mote and s gven by = * (7 1 p = Current ueue ndex, 1-p = me to execute one packet. and MAC s gven by: MAC / (8 RS CS MAC = MAC access, RS/CS = Delay due to ongong transmsson as ndcated by RS/CS, ch = Channel access. So Eq.(2.e. congeston ndex, can now be gven as: C n * * N * ( * pp RS / CS ch (9 ch 838

5 Eq. (9 represents the congeston ndex or the congeston state of the network and s helpful n decdng the future rate plans for the Source motes. Based on ths C the envsaged ransport Layer Protocol wll then measure or estmate the new rate plan (based on the E-2-E data packet nformaton (E-2-E for the Sources and notfy them n order to mtgate congeston. he newly estmated (E-2-E nvolvng C s gven by [6] c C ˆ / (10 Hence the new estmated rate value Rˆ c comes to be: ˆ ( c Rˆ c (11 N N = total number of hops between Source and snk. 2 Prortzaton and Relablty Module he purpose of the Prortzaton and Relablty module of the envsaged WSN transport layer protocol s to Retan the sensed nformaton at selected ntermedate motes [10] for some defned tme nterval. Resend the sensed nformaton upon recevng the Negatve Acknowledgement (NACK from the snk. Receve the ncomng packets from all possble Sources (Scalar and Multmeda sensor equpped and rearrange the packets based on ther nformaton content prorty. If the ntermedate node receves data packets from multple Sources havng smlar nformaton prorty then the packet wth mnmum E-2-E tme to lve value (L wll be served frst. V. PROPOSED PROOCOL -ALGORIHM In the prevous secton we dscussed the man modules of our proposed transport protocol and also outlned how we calculate the key parameters used for congeston control and relablty. In ths secton we outlne each step nvolved n computng the new rate nformaton and the network congeston level as beng proposed by our lght weght transport protocol scheme meant for congeston detecton and relablty assurance. he key steps are as follows: Step1: Generaton and transmsson of the new packets at Source node hs s the frst step n whch the Source node sense the envronment and start generatng the data packets of sze 1 KB and start sendng ths nformaton at a rate R c 0 specfed by the snk control. Step2: Storage of the packets at the ntermedate buffer node also beng used for routng too When the Source starts sendng the data packets at some defned rate they are then stored at the ntermedate storage node s buffer. At any partcular storage node the packet s storage tme s beng dctated by the packet s probablty of success.e. P success. Step3: Data packets beng receved by the Snk node he ntermedate storage nodes pror for beng used for storage can also be used for routng purposes, the routed Source nformaton reaches the snk for post processng of the packet.e. ˆ ( (E-2-E. c Step4: Congeston Detecton After started recevng the data packets the snk controller starts computng the new rate value based on the exstng congeston state of the network by lookng at the E-2-E of each packet. Followng steps are nvolved for the computaton of the new estmated rate value 1. f t c Jont densty functon that relates ( C, the E-2-E packet and congeston ndex C. 2. Posteror estmate for receved packets ˆ ( c 3. Compare ths posteror estmate of ˆ ( c wth threshold hres, f exceeds then congeston has been detected else no congeston. Step5: Estmated error J computaton In ths step the snk controller compares the estmated ˆ ( c of the receved packet wth the actual ( c and based on ths the snk controller computes the estmaton error J. Step6: Condtonal mean-square error computaton Condtonal mean-square error fndng usng helps n fndng the means-square estmate of the new [6, 12] Step7: Computaton of new estmated rate value ˆ ( c Usng equaton Rˆ c, the snk controller N starts computng the new rate value computed based on the estmated ˆ (. c Step8: New rate notfcaton to Source nodes Fnally the new estmated rate value s beng communcated to the Source nodes by the snk ncludng the level of congestonc. VI. SIMULAION SEUP AND RESULS hs secton descrbes the smulaton setup used for an extensve testng of the proposed transport layer protocol. he smulaton setup s shown n the Fgure 2 where Sources A, B and J are vdeo sensor motes whle Source C and H are generc scalar sensor motes. he prorty of the vdeo data packet s hgher than the scalar data packet and follows the followng prorty rule: Pr(A=Pr(B=Pr(J>Pr(C>Pr(H (12 For detaled understandng of the proposed ransport Layer Algorthm refer [12] 839

6 Pr(A = Prorty of data packet from Source A, Pr(B = Prorty of data packet from Source B, Pr(C = Prorty of data packet from Source C, Pr(H = Prorty of data packet from Source H, Pr(J = Prorty of data packet from Source J. Fgure 2. he Network opology Used For Evaluaton In ths smulaton we have used Network Smulator NS-2 [16] and we consder that the entre mult-hop network s comprsed of 10 nodes as an ad-hoc network for the case of IEEE [4]. For ths wreless setup we performed the extensve analyss of E-2-E throughput, E-2-E packet latency and the average percentage prorty acheved. he network parameters are lsted n able II. In order to ensure the relablty n the results the smulatons have been performed fve tmes for the three possble cases of the proposed transport layer protocol and are: Proposed protocol wthout prortzed Source nformaton storage and forwardng, Proposed protocol wth complete prortzed Source nformaton storage and forwardng, Proposed protocol wth dstrbuted prortzed Source nformaton storage and forwardng. A. Performance metrcs he extensve performance of the envsaged transport layer protocol s evaluated aganst the followng performance metrcs 1. Average E-2-E Packet Latency: It s defned as the total tme a packet would take ncludng all the s resultng from queung, retransmssons at the MAC layer, propagaton s and transfer tme from the Source to snk (E-2-E. 2. Average E-2-E hroughput: It s defned as the number of data packets send by all the potental Sources to the data receved by the snk correspondng to each Source. 3. Percentage Average Data Loss: It s defned as the percentage rato of the data loss, dfference of sent and receved data, to the send data. he man contrbutors of data loss are collsons at the recevng end n the presence of blnd nodes, congeston and lnk falure due to node energy depleton. 4. Average Percentage Prorty Acheved: It s defned as the average number of specfc Source data packets receved at the snk to the number of data packets send by the same Source. ABLE II. Parameter NEWORK PARAMEERS Values Frequency 2.472e+9 ransport Protocols 1. Proposed protocol wthout prortzed Source nformaton storage and forwardng 2. Proposed protocol wth complete prortzed Source nformaton storage and forwardng 3. Proposed protocol wth dstrbuted prortzed Source nformaton storage and forwardng MAC IEEE [4] RX and CS e-10W hreshold e-10 W Routng agent Ad hoc On-Demand Dstance Vector (AODV [7] Ifqlen (ueue 200 packets length at MAC level Energy Model Yes: NS-2 based Energy computaton [5] CP hreshold 10 Mote Intal power Mote Idle power Mote Rx power 100 W 712e-6 W 35.28e-3 W Mote x power 31.32e-3W Mote Sleep power 0.001W B. Smulaton Results In the followng secton we wll dscuss the smulaton results obtaned. he smulaton has been performed 5 tmes and the results mentoned here show the average values taken to ensure the relablty n the results. 1 Average E-2-E packet comparson of the proposed prorty based transport protocol Fgure 3 shows the average E-2-E packet comparson of the proposed transport layer protocol for three possble cases. he results shown here represent the average E-2-E that a data packet suffers orgnated from varous Sources. It would be obvous that for the frst case where there has been no ntermedate data packet storage and prortzed delvery of Source packets the average E-2-E latency of the Source data packet s qute sgnfcant and s above than 400 msec on average. Also except for the Source J whose prorty s hghest (same as Source A and B as compared to Source C and H has suffered comparably less average E-2-E (beng close to snk whch s approxmately 368 msec. However, an mproved response (less than 60 msec average E-2-E Source packet latency for Sources C, H and J except for the Source A and B whose average E-2-E packet latency accounts to 431 and 116 msec has been observed n second case where the strct relablty and prorty has been lad down n WSN. Lastly for thrd (dstrbuted prortzed ntermedate storage and forwardng case we observed least E-2-E Source data packet for the followng dstrbuted network topology: DIS-K havng average E-2-E Source packet latency s <40 msec, where the mote K s used for storage and prortzed data forwardng, 840

7 DIS-I havng average E-2-E Source packet latency s <52 msec, where the mote I s used for storage and prortzed data forwardng, DIS-F-K havng average E-2-E Source packet latency s <40 msec, where the motes F and K s used for storage and prortzed data forwardng. he worst performance s observed n case of network topology where the motes G and F are used for storage and prortzed data forwardng. For DIS G case the average E-2- E latency for Source A packets s around 1.22 sec, 0.97 sec for Source B and C packets whle 131 and 390 msec for Source H and J packets. For DIS-F case the average E-2-E latency for Source A, B, C, H and J packets s around sec, 1.97 sec, 2.42 sec, sec and sec respectvely. However, an acceptable result s observed (below 120 msec n case of network topology where the motes combnaton F-I and F-G-I are used for storage and prorty. G, F and Source J so lkely prevents the chances of packet drop to best possble. Fgure 4. Average throughput comparson 3 Average Packet Drop comparson of the proposed prorty based transport protocol he average Source data packet drop comparson for varous network confguratons s shown n the Fgure 5. Fgure 3. Average E-2-E packet Delay comparson 2 Average hroughput comparson of the proposed prorty based transport protocol he average throughput comparson of the proposed transport protocol for varous possble network confguratons s shown n Fgure 4. From the result the confguraton DIS- F-G-I has the hghest possble throughput havng a peak value of Mbps and s because of havng three stage dstrbuted prortzed storage and forwardng (so chances of packet drop reduces. Where as DIS-F shows the poorest response among all havng average throughput of 0.15 Mbps ths degradaton s because of congeston and ncreased packet queue latency. Although F s recevng all the nformaton packets from ts chld Sources A, B and C but stll counters must be made to prevent congeston related packet drop due to nformaton packets from Source H, J and possble relay nformaton of G, I and K that wll ncrease the queung and thus results n poor E-2-E packet latency. Also the confguratons lke DIS- K and DIS-I acheve a far average throughput level of 0.28 and 0.3 Mbps and the reason for ths farness s that these nodes are close to snk so they gather maxmum packet nformaton form the chld Source and relay nodes and then based on prortzed storage and forwardng rule pass the nformaton to snk. After DIS-F-G-I, DIS-F-I (whch has an acceptable Source data packet E-2-E latency shows better average throughput response of 0.34Mbps (here n addton to node F whch gathers packet nformaton from ts chld Source nodes A, B and C the node I also gathers the relay nformaton from Fgure 5. Average Percentage Packet Drop From the results t would be obvous that hghest possble data loss has been observed for the wthout case (percentage data loss for Source B s 4%, percentage data loss for Source A s 7%, percentage data loss for Source C s 9% whle for Source J and H s 0% and s obvous because of havng no prortzed ntermedate storage and forwardng of the Source nformaton whch s qute vtal for strct os orented applcatons lke Wreless Multmeda Sensor Networks (WMSNs. Sgnfcantly hgh loss has also been observed n case of DIS-F network confguraton and the reason for ths hgh data loss s that the node F s gatherng nformaton from Sources A, B and C at hgh rate but relayng the entre nformaton on ts output lnk whch s shared by node G (that relay nformaton of Source H s qute dffcult and also snce ths dstrbuted storage node (node F s at dstant from the snk so the lkely probablty of packet drop due to large queung at node F and at ntermedate nodes and congeston at the later end (node K whch s close to snk s hgh. Among others he DIS-F-K (nodes F and K are storage nodes and DIS-K (mmedate to snk shows better result where n DIS-K the percentage average data loss s 0% for all possble Sources whle for DIS-F-K the percentage average data loss for all Sources s 0% whle 1.5% for Source A. 841

8 4 Average Percentage prorty acheved comparson of the proposed prorty based transport protocol Fgure 6 shows the average percentage Source prorty acheved for varous possble network confguratons the major reasonng nvolved for varous cases under ths secton s already covered n the Average Packet Drop comparson secton above (Secton VI subsecton B-3. Agan for ths case only DIS-K and DIS-F-K acheves the 100% Source prortes. Also for the wthout prorty network confguraton case only the Sources H and J acheve the level of 100% whle for Sources A, B and C the acheved prorty level s 93.02%, 97.5% and 90.9% respectvely. However for wth complete prorty network confguraton case only Sources B, H and J acheves the 100% level whle for Source A and C the acheved prorty level s 96.5% and 94.24%. Smlarly for the dstrbuted prortzed storage and forwardng network confguratons lke DIS-F-G, DIS-F-G-I and DIS-I, where the Sources whch faled to acheve 100% level are Source C and A (for DIS-F-G-I, DIS-F-G and DIS-I respectvely. he acheved prorty level for Source A and C are 95.45% and 94.2% for DIS-F-G-I, 94.12% and 98.25% for DIS-F-G and 98.98% and 94.12% for DIS-I. Agan the DIS-G network confguraton whch performed poorly for the cases of Average E-2-E data packet latency, Average data packet drop and throughput shows degraded results for Acheved average Source prorty (acheved Source prorty level of 89.19%, 92.16%, 91.18%, 100% &100% for Sources A, B, C, H and J. Fgure 6. Average Percentage prorty acheved VII. DISCUSSIONS AND CONCLUSIONS In the followng paper we have presented a scheme for WSN transport layer whch guarantees congeston control, relablty and Source prorty. he congeston control has been acheved by takng nto account the E-2-E of Source data packet at the snk. E-2-E relablty of the data packet has been acheved by employng the dstrbuted memory concept n WSN whch stores the data packet for some defnte tme frame and enables the prortzed forwardng of the Source data packet based on the set Source prorty and L value for Source data packets. Results reveal that by employng the dstrbuted memory and prortzed forwardng concept n WSN we can prevent the Source data packet drop and ensures the applcaton specfc os. DIS-K topology n comparson to all shows better result n terms of average percentage Source data packet drop, E-2-E data packet latency and acheved prorty for varous Sources havng dfferent prorty levels. In the next step we wll ncorporate the cross layer feature to the exstng desgn and ths sets our future research drecton. REFERENCES [1] I.F. Akyldz,. Meloda, and K.R. Chowdhury, A Survey on wreless multmeda sensor networks, Computer Networks (Elsever J., vol. 51, pp , [2] V. Potdar, A. Sharf, E. Chang, "Wreless Sensor Networks: A Survey," wana, Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops, pp , UK, 2009 [3] V. Potdar, A. Sharf, E. Chang, "Wreless Multmeda Sensor Network echnology: A Survey," he 7th IEEE Internatonal Conference on Industral Informatcs (INDIN 2009, pp ,uk, 2009 [4] IEEE P802.11, Man General Info Page, Aug [5] he Network Smulator NS-2, July [6] F.L. Lews, L. Xe and D. Popa, Optmal and Robust Estmaton wth an ntroducton to Stochastc Control heory, Second Edd, CRC Press, 6000 Broken Sound Parkway, NW (2008. ch 1-4, pp [7] C.E. Perkns, E.B. Royer and S. Das, Ad hoc On-Demand Dstance Vector (AODV Routng, RFC 3561, July [8] B. Hull, K. Jameson, H. Balakrshnan, Mtgatng Congeston n Wreless Sensor Networks, In Proceedngs of the ACM Conference on Embedded Networked Sensor Systems (SenSys, pp , [9] D. Estrn, D. Culler, and M. Srvastava, Overvew of sensor networks, Computer, vol. 37, no. 8, pp.41 49, 2004 [10] S.-J. Park, R. Vedantham, R. Svakumar, and I. F. Akyldz, A scalable approach for relable downstream data delvery n wreless sensor networks, n Proc. ACM MobHoc 2004, May [11] A.Sharf, V.M. Potdar and A.J.D.Rathnayaka, Performance Evaluaton of dfferent ransport layer protocols on the IEEE and IEEE MAC/PHY layers for WSN, 7th Int Conf MoMM, pp , Malaysa, [12] A.Sharf, V. Potdar, A.J.D Rathnayaka and. Dllon, Relable ransport Protocol for WSN wth Congeston Avodance usng Stochastc Control Framework, Submtted to ERI Journal, Dec [13] CP, [14] UDP, Aug [15] C.Y. Wan, S.B. Esenman, and A.. Campbell, "CODA: Congeston detecton and avodance n sensor networks", Proc. ACM SenSys, pp , USA, Nov [16] Y. Sankarasubramanam, O.B. Akan, and I.F. Akyldz, ESR: Eventto-Snk Relable ransport n Wreless Sensor Networks, ACM MobHoc, pp , USA, [17] F. Stann and J. Hedeman, RMS: Relable Data ransport n Sensor Networks, In Proc. of the Frst IEEE Int. Workshop on Sensor Network Protocols and Applcatons, pp , USA, [18] C. Y. Wan, A.. Campbell, and L. Krshnamurthy, PSF: A Relable ransport Protocol for Wreless Sensor Networks, ACM Int. Workshop on WSN and App, pp. 1-11, USA, [19] H. Zhang, A. Arora, Y.R. Cho, M. G. Gouda, Relable Bursty Convergecast n Wreless Sensor Networks, ACM Mobhoc, pp , USA, [20] S.J. Park, R. Vedantham, R. Svakumar, and I. F. Akyldz, A scalable approach for relable downstream data delvery n wreless sensor networks, ACM MobHoc, pp , Japan, [21] A. Dunkels,. Vogt, H. Rtter, J. Alonso, Dstrbuted CP Cachng for Wreless Sensor Networks, Annual Medterranean Ad Hoc Networkng Workshop, urkey, [22] Y.G. Iyer, S. Gandham, S. Venkatesan, SCP: a Generc ransport Layer Protocol for Wreless Sensor Networks, ICCCN, pp , USA, [23] S. Mascolo, C. Casett, M. Gerla, M. Y. Sanadd, and R. Wang CP Westwood: Bandwdth Estmaton for Enhanced ransport over Wreless Lnks, ACM SIGMOBILE 01, Rome, Italy,

Priority Enabled Transport Layer Protocol for Wireless Sensor Network

Priority Enabled Transport Layer Protocol for Wireless Sensor Network 2010 IEEE 24th Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops Prorty Enabled Transport Layer Protocol for Wreless Sensor Network 1 Atf Sharf, 2 Vdyasagar Potdar Dgtal

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Journal of Network and Computer Applcatons 37 (2014) 216 228 Contents lsts avalable at ScenceDrect Journal of Network and Computer Applcatons journal homepage: www.elsever.com/locate/jnca HOCA: Healthcare

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network SENSORCOMM 2012 : The Sxth Internatonal Conference on Sensor Technologes and Applcatons A Relable and Real-Tme AggregatonAaware Data Dssemnaton n a Chan- Based Wreless Sensor Network Zahra Taghkhak, Nrvana

More information

Traffic Priority Based Adaptive and Responsive Congestion and Rate Control for Wireless Mesh Networks

Traffic Priority Based Adaptive and Responsive Congestion and Rate Control for Wireless Mesh Networks Computer and Informaton Scence; Vol. 7, No. 2; 2014 ISSN 1913-8989 E-ISSN 1913-8997 Publshed by Canadan Center of Scence and Educaton Traffc Prorty Based Adaptve and Responsve Congeston and Rate Control

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

TP-CRAHN: A Transport Protocol for Cognitive Radio Ad-hoc Networks

TP-CRAHN: A Transport Protocol for Cognitive Radio Ad-hoc Networks TP-CRAHN: A Transport Protocol for Cogntve Rado Ad-hoc Networks Kaushk R. Chowdhury Broadband Wreless Networkng Lab Georga Insttute of Technology Atlanta, GA 3332, USA Emal: kaushkc@ece.gatech.edu Marco

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm Seventh Internatonal Conference on Informaton Technology Dervaton of Three Queue Nodes Dscrete-Tme Analytcal Model Based on DRED Algorthm Jafar Ababneh, Hussen Abdel-Jaber, 3 Fad Thabtah, 3 Wael Had, EmranBadarneh

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Availability and QoS Performance Evaluation of Public IP Networks Tivadar Jakab 1, Gábor Horváth 1, Rozália Konkoly 2, Éva Csákány 2 1

Availability and QoS Performance Evaluation of Public IP Networks Tivadar Jakab 1, Gábor Horváth 1, Rozália Konkoly 2, Éva Csákány 2 1 Avalablty and QoS Performance Evaluaton of Publc IP Networks Tvadar Jakab, Gábor Horváth, Rozála Konkoly, Éva Csákány Department of Telecommuncatons, Budapest Unversty of Technology and Economcs Magyar

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Attribute Allocation in Large Scale Sensor Networks

Attribute Allocation in Large Scale Sensor Networks Attrbute Allocaton n Large Scale Sensor Networks Ratnabal Bswas Kaushk Chowdhury Dharma P. Agrawal OBR Research Center for Dstrbuted and Moble Computng, Dept. of ECECS, Unversty of Cncnnat, Cncnnat, OH

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Available online at ScienceDirect. Procedia Computer Science 103 (2017 )

Available online at  ScienceDirect. Procedia Computer Science 103 (2017 ) Avalable onlne at www.scencedrect.com ScenceDrect Proceda Computer Scence 03 (207 ) 562 568 XIIth Internatonal Symposum «Intellgent Systems», INTELS 6, 5-7 October 206, Moscow, Russa Retral queueng systems

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. WP A Tree Based Response Tme Algorthm for Event Drven Wreless Sensor Networks 1 Itu Sngdh, 2 Saurabh Kumar 1 Department of Computer Scence and Engneerng, Brla Insttute of Technology, Mesra, Ranch, Jharkhand,

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN* ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks Combned SINR Based Vertcal Handoff Algorthm for Next Generaton Heterogeneous Wreless Networks Kemeng Yang, Iqbal Gondal, Bn Qu and Laurence S. Dooley Faculty of Informaton Technology Monash Unversty Melbourne,

More information