Networks An introduction to microcomputer networking concepts
|
|
- Mavis Randall
- 6 years ago
- Views:
Transcription
1 Behavior Research Methods& Instrmentation 1978, Vol 10 (4), Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES H. JOHNSON Eastern Virginia MedicalSchool, Norfolk, Virginia This paper presents a brief history of the se of internal compter networks, an introdction to networking concepts and topology. and sggestions regarding a possible system for se in a psychology laboratory. Considerations abot the design and se of a microcompter network are discssed. As additional behavioral scientists obtain microcompters for research, there is apt to be a growing interest in sharing hardware-software components with other investigators to redce costs and increase comptational power. This concept is sally referred to as compter networking. The initial ideas abot compter networking began with the introdction of timesharing and the development of data commnications technology in the late 1950s. Timesharing systems involve a large central compter acting as a host to several remote terminals. With increasing service demands, some single central compters were replaced with mltiple connected compters. These were the first tre compter networks. In sch sitations, the host processors performed large comptations, controlled data bases, and spervised network operations. Remote compting systems performed smaller comptations in a local mode nder an independent operating system, bt participated in network activity when processing demands reqired. As minicompter technology developed, networking became more individalized and tailored to the needs of sitations. Individal processors were assigned very specific tasks and programmed to commnicate with neighbor processors and data base files, This approach reslted in easier software development and improved tolerance for systems failres (Digital Eqipment Corporation, 1974). The topology of links (circits and channels) and nodes (endpoint or jnctions of a circit) also became increasingly specialized as a reslt of minicompter technology. Any node cold be set p as an exclsive ser or provider of resorces, and the geometric arrangement of a network varied from simple point- Please send reqests for reprints to James H. Johnson, Department of Psychiatry, Eastern Virginia Medical School, Norfolk, Virginia to-point operations to more complex mixed strctres. The advent ofmicroprocessor technology promises to lead to additional tailored network topologies. Becase of the lower cost ofmicrocompters, behavioral scientists are now likely to be able to afford more sophisticated network topologies in laboratory and other experimental settings. However, at present there is insfficient general knowledge in the field to make fll se ofthese concepts. For example, in a recent paper on developing a laboratory compter network, Brown and Deffenbacher (1978) sggest an approach whereby a psychology department wold have a single large microcompter for program development and tasks reqiring large memory, along with several independent low-cost microcompters to service instrment needs. This is a network only in the loosest sense, as the varios micros do not commnicate with each other following program development. The prpose of the present paper is to acqaint behavioral scientists with other more advanced networking concepts. It is hoped that this material will be of se to those considering the installation of a network of microcompters, bt nfamiliar with alternatives to a simple, independent networking approach. NETWORKING The low cost of microhardware makes it possible to locate a sizable amont of compting power near the ser. Each local node may inclde its own cathoderay tbe (CRT) terminal and a compter with sfficient memory to handle most needs. If a particlar ser has special reqirements to control instrments and actators, these can be added to the node. The local compter handles all special eqipment formatting, so that only basic data are commnicated to other processors in the network. It also does extensive calclations (e.g., matrix calclations p to 20 by 20 appear feasible), Large problems are completed at a node 522
2 COMPUTER NETWORKING 523 with extra memory and floating-point hardware, bt reqests to this calclator node are minimized becase many sch reqests can be handled at the local nodes. When resorces are not available at the local node, a message can be sent to nodes that have the needed capabilities. For example, if a local node reqires a data printot, a reqest is made to a node with an attached printer. For other special resorce reqirements, sch as remote commnications, graphics display, large calclation, me handling, and special instrments, the local node sends a message to the appropriate node reqesting the se of the resorce. Sch messages are roted throgh a network control node that determines if varios resorces can be allocated to the reqesting ser. A local node can alert the network control node of nsal events. For example, if a local node is monitoring an experiment and a malfnction occrs, the network control node might se a commnications node to atomatically telephone the appropriate investigator. Similar monitoring can be sed for prposes of secrity. The program action to be taken in response to a malfnction can be located within either the local or the me node. Therefore, several different corses of action are possible depending pon the task of the local node, time of day, or severity of the malfnction. The network control node might call different phone nmbers, depending on the type of malfnction and the natre of the experiment nder control. A local node may have special instrmentation, sch as a gas cromatograph with atomatic sample finding and recording, attached. To insre that the nodes are interchangeable, a standard interface mst be sed on all of the nodes. For interfacing instrments, standards crrently exist that are sefl. The IEE488 bs standard is sitable for parallel interfaces. It has sfficient control and data lines to handle most reqirements for laboratory instrmentation. For serial interface, the EIA RS2322 can be sed on most reqired eqipment. These standard interfaces mst look the same to each program that is expected to control them. This allows one instrment to be attached to two or more local nodes for reliability or to be switched from one location to another. Also, it allows several sch instrments to be attached to different nodes sing the same programs for data collection and control. Contemporary networking technology reqires many special fnctions to be available to all local sers. The special nodes perform fnctions for the other nodes in the network and have niqe programs that reflect their specialty capabilities. Examples of special-prpose nodes inclde file handling, network control, large calclation, remote commnications, and printing. A file node handles all the storage and retrieval fnctions, inclding bffering for the network. Usally, the files are stored locally on disks or tape. File data can be dplicated locally, or in some cases, on another system throgh a remote commnications node. The me node keeps a directory of all the active flles available. In a properly designed system, files that are inactive for a fixed time are atomatically archived by the me node. This insres available space on the file system for crrent se. Programs for se by the varios nodes are stored sing the me node. A reqest for a particlar program from a local node is first directed to the network control node for prposes of athorization. Once athorization is granted, it is forwarded to the file node for retrieval and transmission to the local ser. At the local ser node, a commnication program formats the file for exection, loads it into memory, and, after the last segment of the file is received, starts exection of the program. This process can also be initiated by the network control node. The ability to download programs to the ser node nder command of the network control node is extremely sefl. For example, it allows an experimenter to se different control programs for different phases of an experiment. The network control node directs the processing throghot the network. Downloading capabilities and program-access rights from other nodes are controlled by it. Local nodes refer to it whenever otside help is needed. The network control node can take appropriate action sch as transmitting a message to a CRT, downloading a new program to the node, or reqesting an operator intervention. It starts the network when the power is applied to the system. Finally, the network control node can serve as a message switching center. A special node for calclating is sally inclded in a network. Typically, this node is qite expensive, since it reqires a large amont of memory and floatingpoint arithmetic hardware. The calclation node can accept inpt sch as a program name to be retrieved from the file node, inpt data file names, and the names of files for the storage of reslts. When a calclation program is finished, reslts are released to the reqesting node by freeing the otpt files. This allows the local node to begin accessing the otpt me to review reslts. A special node is reqired for commnications with other networks. The commnications node interprets the network protocol for commnications with remote systems, and reqests programs from the me node that are appropriate to a particlar protocol. Inpt-otpt (I/O) nodes control the physical I/O to electromechanical devices sch as a printer, card reader, and plotter. The I/O node contains bffers so that data can be transferred directly to or from a local node. However, in cases where significant activity is expected, I/O data may be roted throgh the file node. This node is responsible for qeing procedres and all standard data formatting programs.
3 524 WALLACE, JOHNSON, AND JOHNSON ( ) (1.11.1) ( ) (11.01) ( ) Figre 1. Hypercbe network showing coordinate addresses for each node. (Note the Gray Code is sed for node ordering so that adjacent nodes will differ by only 1 nit dimension.) NETWORKTOPOLOGY Network topologies vary from application to application. The particlar type of network selected is dependent pon the parameters of reliability, cost, flexibility, and expansion needs. There are no reqirements that nodes be contigos. s can be connected sing telephone lines and modem or twisted pairs of wires. Ths, network topology is not limited by the physical setting. Of the several common network configrations, the Hypercbe has the most secre commnications linkage. In a Hypercbe network (Figre 1), each node is connected to for other nodes in a symmetric manner. In order to isolate two parts of the network, a large nmber of commnications lines or node failres mst occr. In networks where reliable commnications are reqired, sch as an integrated laboratory network, this may be the best configration. However, the nmber of commnications links reqired eliminates this network topology from most applications. The Tors configration, shown in Figre 2, gives p some of the commnications reliability of the Hypercbe to redce the nmber of commnication links. For applications where concentric rings of commnications lines can be sed, this topology gives a high degree of reliability. In many process and laboratory environments, the Tors configration provides an acceptable compromise between reliability and excessive commnications needs. The Mesh network, shown in Figre 3, is sed to reliably blanket an area with ser nodes. In a psychology department it might be desirable to give every investigator some processing and laboratory eqipment fnctions. In this sitation, the Mesh network is ideal. However, once again, the nmber of commnications links reqired for a network of this type is high. The Tree topology, shown in Figre 4, minimizes the commnications links necessary in a network. Since this type of network can be separated by the failre of one commnication link or node, it shold be sed only where commnication failres can be tolerated. For example, it might be sed in sitations where the local nodes have sfficient capabilities to operate independently for some time. The Tree configration simplifies control programming and is Figre 2. Tors network showing coordinate addresses for each node. (Note the Gray Code is sed for node ordering so that adjacent nodes will differ by only 1 nit dimension.)
4 COMPUTER NETWORKING 525 relatively inexpensive. Therefore, it is apt to be the most practical system in a medim-sized environment. The Star configration, shown in Figre 5, reqires that all the commnication between nodes be roted throgh the central node. For small systems of 4-16 sers, this is practical if file-access reqirements are not great. While the Star topology is vlnerable to hardware and line failres, it is often sed becase it is relatively inexpensive. TYPICAL LABORATORY SYSTEM 0= ser o = Spec,al "" Calclations Figre 3. Mesh network. Figre 4. Tree network. Data Base U User s For a small laboratory the Star configration, modified as shown in Figre 6, wold probably be appropriate. The ser nodes actally consist of two compters linked throgh shared memory. These compters are designated as the ser processor and the commnications processor. The commnications processor has control of the node. It can stop the ser processor, load memory with a program received from the file node, and start the ser processor execting the program. The commnications processor has complete access to the memory ofthe ser processor. The ser processor signals the commnications processor for message transmission. It does this throgh a special control line attached to the commnications processor. A system of "mail boxes" in memory is sed to transfer messages. The ser processor has all the external devices for the node attached to it. This allows all commnication processors to be identical. The external devices are all attached to a similar bs strctre located at the same place in each ser node. Ths, the same program can monitor and control the same external device sing any local node. When a node fails, the network control node can download another node with the appropriate device control program, switch the device to the back-p node, and initiate the device control program. The network operating system is configred for each installation sing standard software. This software is the control program for the network control node. It User s DB Dala Base Figre S. Star network. Figre 6. Modified Star network.
5 526 WALLACE, JOHNSON, AND JOHNSON determines the fnctions of the ser nodes, file-access right, and rights to other special resorces. This software is modified as additional nodes and resorces are added to the network. DISCUSSION In this paper, we have attempted to provide the reader with an introdction to the concepts ofcompter networking, network topologies, and a potential topology for laboratory se. The paper was motivated ot of a concern that most psychologists (c.f. Brown & Deffenbacher, 1978) are nfamiliar with internal networking approaches. Networking concepts sally become important only after sfficient microcompter eqipment is installed in laboratory settings. However, initial eqipment prchases limit the ser's evental networking options. Therefore, it is imperative that psychologists be aware of the relevant concepts prior to major eqipment acqisitions in this area. In some cases, behavioral scientists will not want to make se of most of the concepts otlined above. For example, those involved in highly individalized projects or located in settings with fewer than two or three microcompter systems will probably not be able to make se of these techniqes. However, in other settings, sch as larger psychology departments, networking concepts are apt to be very helpfl as a means to providing investigators with a sefl range of eqipment at a less expensive cost. REFERENCES BROWN, E. L., & DEFFENBACHER, K. Microcompters big and little: Selecting a low cost laboratory compter network. Behavior Research Methods & Instrmentation, 1978, 10, DIGITAL EQUIPMENT CORPORATION. Introdction to minicompter networks. Maynard. Mass: (Receivedfor pblication Jne 16, 1978; revision accepted Jne 19,1978.)
Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationEMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03
EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationdss-ip Manual digitalstrom Server-IP Operation & Settings
dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationFeatures. ICMS Integrated Corrosion Management System
ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion
More informationICMS3 Integrated Corrosion Management System
Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationEEC 483 Computer Organization
EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and
More informationCS 153 Design of Operating Systems
CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationLDAP Configuration Guide
LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................
More informationEMC AppSync. User Guide. Version REV 01
EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationAccess Professional Edition 2.1
Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification
More informationUSER S GUIDE: SPRINT RELAY CUSTOMER PROFILE
USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE www.mysprintrelay.com/login n Log-in Go to www.mysprintrelay.com/login. If yo don t have a sername or password, click the gray men btton Cstomer New Profile/Call
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationContent Content Introduction
Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationStandard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH
8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationTRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless
By Mitchell Ross TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless Several crrent trends give case to rethink the design of wireless systems in medical bildings. Increasingly, patients are
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationMaking Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution
Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More informationReview Multicycle: What is Happening. Controlling The Multicycle Design
Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationNEAR EAST UNIVERSITY. Faculty of Engineering
NEAR EAST UNIVERSITY Faclty of Engineering Department of Electrical and Electronic Engineering CONVEYOR SYSTEM CONTROL BY PLC Gradation Project EE-400 Stdent: Necip Faz1I Battal (20011431) Spervisor: Ozgr
More informationA RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA
A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationCS 4204 Computer Graphics
CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types
More informationThe multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM
Lectre (Wed /5/28) Lab # Hardware De Fri Oct 7 HW #2 IPS programming, de Wed Oct 22 idterm Fri Oct 2 IorD The mlticycle path SrcA Today s objectives: icroprogramming Etending the mlti-cycle path lti-cycle
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationIntroduction to Windows Server Copyright 2018 NY SYSTEMS INC.
Introdction to Windows Server 2008 1 Learning Objectives Identify the key featres of each Windows Server 2008 edition Understand client systems that can be sed with Windows Server 2008 Identify important
More informationReview. A single-cycle MIPS processor
Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?
More informationAnalog Telephones. User Guide. BusinessPhone Communication Platform
Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make
More informationScientific Computing on Bulk Synchronous Parallel Architectures
Scientific Compting on Blk Synchronos Parallel Architectres R. H. Bisseling Department of Mathematics, Utrecht University and W. F. McColl y Programming Research Grop, Oxford University April 27, 1994
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationWorkshop. Improving the Bus Network
Workshop Improving the Bs Network Workshop Objectives To consider a range of objectives and proposals that cold improve the bs system in Brisbane to contribte to pblic (inclding RACQ members ) mobility
More informationCSE 141 Computer Architecture Summer Session I, Lectures 10 Advanced Topics, Memory Hierarchy and Cache. Pramod V. Argade
CSE 141 Compter Architectre Smmer Session I, 2004 Lectres 10 Advanced Topics, emory Hierarchy and Cache Pramod V. Argade CSE141: Introdction to Compter Architectre Instrctor: TA: Pramod V. Argade (p2argade@cs.csd.ed)
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationPART I: Adding Instructions to the Datapath. (2 nd Edition):
EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================
More informationNortel DECT Handset 4025 User Guide
DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard
More informationContent Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety...
STAR -1- Content 1. Safety Precation... 4 2. Getting started... 7 Installing the cards and the Battery... 7 Charging the Battery... 8 3. Inpt method... 9 To Shift Entry Methods... 9 Nmeric and English
More informationMultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny
MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445
More informationA Wireless MAC Protocol comparison.
Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationEXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation
EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationAddressing in Future Internet: Problems, Issues, and Approaches
Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationPicking and Curves Week 6
CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking
More informationDVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs
Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationLTC 8600 Series Allegiant Matrix/Control Systems - Modular
Video 86 Series Allegiant Matrix/Control Systems - Modlar 86 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 128 Camera by 16 monitor switching Modlar constrction Powerfl alarm handling
More informationDSCS6020: SQLite and RSQLite
DSCS6020: SQLite and RSQLite SQLite History SQlite is an open sorce embedded database, meaning that it doesn t have a separate server process. Reads and writes to ordinary disk files. The original implementation
More informationDI-80. When Accuracy Counts
DI-80 Indi cator When Accracy Conts Operation Manal 73357 CONTENTS 1. INTRODUCTION...3 1.1. Display...3 1.2. A/D Section...3 1.3. Item Memory...3 1.4. Environment...4 1.5. Interface...4 1.6. Option...4
More informationClustering and Clustering
Clstering and Clstering Tools Testing Migrate configration settings Qick configration and trobleshooting Storage configration Performance and reliability Secrity 20 Enhanced Web Services Microsoft Internet
More informationLecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat
Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationSpam detection system: a new approach based on interval type-2 fuzzy sets
Ryerson University Digital Commons @ Ryerson Theses and dissertations 1-1-2010 Spam detection system: a new approach based on interval type-2 fzzy sets Reza Ariaeinejad Ryerson University Follow this and
More informationDecoders. 3-Input Full Decoder
ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More information