Networks An introduction to microcomputer networking concepts

Size: px
Start display at page:

Download "Networks An introduction to microcomputer networking concepts"

Transcription

1 Behavior Research Methods& Instrmentation 1978, Vol 10 (4), Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES H. JOHNSON Eastern Virginia MedicalSchool, Norfolk, Virginia This paper presents a brief history of the se of internal compter networks, an introdction to networking concepts and topology. and sggestions regarding a possible system for se in a psychology laboratory. Considerations abot the design and se of a microcompter network are discssed. As additional behavioral scientists obtain microcompters for research, there is apt to be a growing interest in sharing hardware-software components with other investigators to redce costs and increase comptational power. This concept is sally referred to as compter networking. The initial ideas abot compter networking began with the introdction of timesharing and the development of data commnications technology in the late 1950s. Timesharing systems involve a large central compter acting as a host to several remote terminals. With increasing service demands, some single central compters were replaced with mltiple connected compters. These were the first tre compter networks. In sch sitations, the host processors performed large comptations, controlled data bases, and spervised network operations. Remote compting systems performed smaller comptations in a local mode nder an independent operating system, bt participated in network activity when processing demands reqired. As minicompter technology developed, networking became more individalized and tailored to the needs of sitations. Individal processors were assigned very specific tasks and programmed to commnicate with neighbor processors and data base files, This approach reslted in easier software development and improved tolerance for systems failres (Digital Eqipment Corporation, 1974). The topology of links (circits and channels) and nodes (endpoint or jnctions of a circit) also became increasingly specialized as a reslt of minicompter technology. Any node cold be set p as an exclsive ser or provider of resorces, and the geometric arrangement of a network varied from simple point- Please send reqests for reprints to James H. Johnson, Department of Psychiatry, Eastern Virginia Medical School, Norfolk, Virginia to-point operations to more complex mixed strctres. The advent ofmicroprocessor technology promises to lead to additional tailored network topologies. Becase of the lower cost ofmicrocompters, behavioral scientists are now likely to be able to afford more sophisticated network topologies in laboratory and other experimental settings. However, at present there is insfficient general knowledge in the field to make fll se ofthese concepts. For example, in a recent paper on developing a laboratory compter network, Brown and Deffenbacher (1978) sggest an approach whereby a psychology department wold have a single large microcompter for program development and tasks reqiring large memory, along with several independent low-cost microcompters to service instrment needs. This is a network only in the loosest sense, as the varios micros do not commnicate with each other following program development. The prpose of the present paper is to acqaint behavioral scientists with other more advanced networking concepts. It is hoped that this material will be of se to those considering the installation of a network of microcompters, bt nfamiliar with alternatives to a simple, independent networking approach. NETWORKING The low cost of microhardware makes it possible to locate a sizable amont of compting power near the ser. Each local node may inclde its own cathoderay tbe (CRT) terminal and a compter with sfficient memory to handle most needs. If a particlar ser has special reqirements to control instrments and actators, these can be added to the node. The local compter handles all special eqipment formatting, so that only basic data are commnicated to other processors in the network. It also does extensive calclations (e.g., matrix calclations p to 20 by 20 appear feasible), Large problems are completed at a node 522

2 COMPUTER NETWORKING 523 with extra memory and floating-point hardware, bt reqests to this calclator node are minimized becase many sch reqests can be handled at the local nodes. When resorces are not available at the local node, a message can be sent to nodes that have the needed capabilities. For example, if a local node reqires a data printot, a reqest is made to a node with an attached printer. For other special resorce reqirements, sch as remote commnications, graphics display, large calclation, me handling, and special instrments, the local node sends a message to the appropriate node reqesting the se of the resorce. Sch messages are roted throgh a network control node that determines if varios resorces can be allocated to the reqesting ser. A local node can alert the network control node of nsal events. For example, if a local node is monitoring an experiment and a malfnction occrs, the network control node might se a commnications node to atomatically telephone the appropriate investigator. Similar monitoring can be sed for prposes of secrity. The program action to be taken in response to a malfnction can be located within either the local or the me node. Therefore, several different corses of action are possible depending pon the task of the local node, time of day, or severity of the malfnction. The network control node might call different phone nmbers, depending on the type of malfnction and the natre of the experiment nder control. A local node may have special instrmentation, sch as a gas cromatograph with atomatic sample finding and recording, attached. To insre that the nodes are interchangeable, a standard interface mst be sed on all of the nodes. For interfacing instrments, standards crrently exist that are sefl. The IEE488 bs standard is sitable for parallel interfaces. It has sfficient control and data lines to handle most reqirements for laboratory instrmentation. For serial interface, the EIA RS2322 can be sed on most reqired eqipment. These standard interfaces mst look the same to each program that is expected to control them. This allows one instrment to be attached to two or more local nodes for reliability or to be switched from one location to another. Also, it allows several sch instrments to be attached to different nodes sing the same programs for data collection and control. Contemporary networking technology reqires many special fnctions to be available to all local sers. The special nodes perform fnctions for the other nodes in the network and have niqe programs that reflect their specialty capabilities. Examples of special-prpose nodes inclde file handling, network control, large calclation, remote commnications, and printing. A file node handles all the storage and retrieval fnctions, inclding bffering for the network. Usally, the files are stored locally on disks or tape. File data can be dplicated locally, or in some cases, on another system throgh a remote commnications node. The me node keeps a directory of all the active flles available. In a properly designed system, files that are inactive for a fixed time are atomatically archived by the me node. This insres available space on the file system for crrent se. Programs for se by the varios nodes are stored sing the me node. A reqest for a particlar program from a local node is first directed to the network control node for prposes of athorization. Once athorization is granted, it is forwarded to the file node for retrieval and transmission to the local ser. At the local ser node, a commnication program formats the file for exection, loads it into memory, and, after the last segment of the file is received, starts exection of the program. This process can also be initiated by the network control node. The ability to download programs to the ser node nder command of the network control node is extremely sefl. For example, it allows an experimenter to se different control programs for different phases of an experiment. The network control node directs the processing throghot the network. Downloading capabilities and program-access rights from other nodes are controlled by it. Local nodes refer to it whenever otside help is needed. The network control node can take appropriate action sch as transmitting a message to a CRT, downloading a new program to the node, or reqesting an operator intervention. It starts the network when the power is applied to the system. Finally, the network control node can serve as a message switching center. A special node for calclating is sally inclded in a network. Typically, this node is qite expensive, since it reqires a large amont of memory and floatingpoint arithmetic hardware. The calclation node can accept inpt sch as a program name to be retrieved from the file node, inpt data file names, and the names of files for the storage of reslts. When a calclation program is finished, reslts are released to the reqesting node by freeing the otpt files. This allows the local node to begin accessing the otpt me to review reslts. A special node is reqired for commnications with other networks. The commnications node interprets the network protocol for commnications with remote systems, and reqests programs from the me node that are appropriate to a particlar protocol. Inpt-otpt (I/O) nodes control the physical I/O to electromechanical devices sch as a printer, card reader, and plotter. The I/O node contains bffers so that data can be transferred directly to or from a local node. However, in cases where significant activity is expected, I/O data may be roted throgh the file node. This node is responsible for qeing procedres and all standard data formatting programs.

3 524 WALLACE, JOHNSON, AND JOHNSON ( ) (1.11.1) ( ) (11.01) ( ) Figre 1. Hypercbe network showing coordinate addresses for each node. (Note the Gray Code is sed for node ordering so that adjacent nodes will differ by only 1 nit dimension.) NETWORKTOPOLOGY Network topologies vary from application to application. The particlar type of network selected is dependent pon the parameters of reliability, cost, flexibility, and expansion needs. There are no reqirements that nodes be contigos. s can be connected sing telephone lines and modem or twisted pairs of wires. Ths, network topology is not limited by the physical setting. Of the several common network configrations, the Hypercbe has the most secre commnications linkage. In a Hypercbe network (Figre 1), each node is connected to for other nodes in a symmetric manner. In order to isolate two parts of the network, a large nmber of commnications lines or node failres mst occr. In networks where reliable commnications are reqired, sch as an integrated laboratory network, this may be the best configration. However, the nmber of commnications links reqired eliminates this network topology from most applications. The Tors configration, shown in Figre 2, gives p some of the commnications reliability of the Hypercbe to redce the nmber of commnication links. For applications where concentric rings of commnications lines can be sed, this topology gives a high degree of reliability. In many process and laboratory environments, the Tors configration provides an acceptable compromise between reliability and excessive commnications needs. The Mesh network, shown in Figre 3, is sed to reliably blanket an area with ser nodes. In a psychology department it might be desirable to give every investigator some processing and laboratory eqipment fnctions. In this sitation, the Mesh network is ideal. However, once again, the nmber of commnications links reqired for a network of this type is high. The Tree topology, shown in Figre 4, minimizes the commnications links necessary in a network. Since this type of network can be separated by the failre of one commnication link or node, it shold be sed only where commnication failres can be tolerated. For example, it might be sed in sitations where the local nodes have sfficient capabilities to operate independently for some time. The Tree configration simplifies control programming and is Figre 2. Tors network showing coordinate addresses for each node. (Note the Gray Code is sed for node ordering so that adjacent nodes will differ by only 1 nit dimension.)

4 COMPUTER NETWORKING 525 relatively inexpensive. Therefore, it is apt to be the most practical system in a medim-sized environment. The Star configration, shown in Figre 5, reqires that all the commnication between nodes be roted throgh the central node. For small systems of 4-16 sers, this is practical if file-access reqirements are not great. While the Star topology is vlnerable to hardware and line failres, it is often sed becase it is relatively inexpensive. TYPICAL LABORATORY SYSTEM 0= ser o = Spec,al "" Calclations Figre 3. Mesh network. Figre 4. Tree network. Data Base U User s For a small laboratory the Star configration, modified as shown in Figre 6, wold probably be appropriate. The ser nodes actally consist of two compters linked throgh shared memory. These compters are designated as the ser processor and the commnications processor. The commnications processor has control of the node. It can stop the ser processor, load memory with a program received from the file node, and start the ser processor execting the program. The commnications processor has complete access to the memory ofthe ser processor. The ser processor signals the commnications processor for message transmission. It does this throgh a special control line attached to the commnications processor. A system of "mail boxes" in memory is sed to transfer messages. The ser processor has all the external devices for the node attached to it. This allows all commnication processors to be identical. The external devices are all attached to a similar bs strctre located at the same place in each ser node. Ths, the same program can monitor and control the same external device sing any local node. When a node fails, the network control node can download another node with the appropriate device control program, switch the device to the back-p node, and initiate the device control program. The network operating system is configred for each installation sing standard software. This software is the control program for the network control node. It User s DB Dala Base Figre S. Star network. Figre 6. Modified Star network.

5 526 WALLACE, JOHNSON, AND JOHNSON determines the fnctions of the ser nodes, file-access right, and rights to other special resorces. This software is modified as additional nodes and resorces are added to the network. DISCUSSION In this paper, we have attempted to provide the reader with an introdction to the concepts ofcompter networking, network topologies, and a potential topology for laboratory se. The paper was motivated ot of a concern that most psychologists (c.f. Brown & Deffenbacher, 1978) are nfamiliar with internal networking approaches. Networking concepts sally become important only after sfficient microcompter eqipment is installed in laboratory settings. However, initial eqipment prchases limit the ser's evental networking options. Therefore, it is imperative that psychologists be aware of the relevant concepts prior to major eqipment acqisitions in this area. In some cases, behavioral scientists will not want to make se of most of the concepts otlined above. For example, those involved in highly individalized projects or located in settings with fewer than two or three microcompter systems will probably not be able to make se of these techniqes. However, in other settings, sch as larger psychology departments, networking concepts are apt to be very helpfl as a means to providing investigators with a sefl range of eqipment at a less expensive cost. REFERENCES BROWN, E. L., & DEFFENBACHER, K. Microcompters big and little: Selecting a low cost laboratory compter network. Behavior Research Methods & Instrmentation, 1978, 10, DIGITAL EQUIPMENT CORPORATION. Introdction to minicompter networks. Maynard. Mass: (Receivedfor pblication Jne 16, 1978; revision accepted Jne 19,1978.)

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

dss-ip Manual digitalstrom Server-IP Operation & Settings

dss-ip Manual digitalstrom Server-IP Operation & Settings dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

ICMS3 Integrated Corrosion Management System

ICMS3 Integrated Corrosion Management System Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Access Professional Edition 2.1

Access Professional Edition 2.1 Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification

More information

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE www.mysprintrelay.com/login n Log-in Go to www.mysprintrelay.com/login. If yo don t have a sername or password, click the gray men btton Cstomer New Profile/Call

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless By Mitchell Ross TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless Several crrent trends give case to rethink the design of wireless systems in medical bildings. Increasingly, patients are

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

NEAR EAST UNIVERSITY. Faculty of Engineering

NEAR EAST UNIVERSITY. Faculty of Engineering NEAR EAST UNIVERSITY Faclty of Engineering Department of Electrical and Electronic Engineering CONVEYOR SYSTEM CONTROL BY PLC Gradation Project EE-400 Stdent: Necip Faz1I Battal (20011431) Spervisor: Ozgr

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM Lectre (Wed /5/28) Lab # Hardware De Fri Oct 7 HW #2 IPS programming, de Wed Oct 22 idterm Fri Oct 2 IorD The mlticycle path SrcA Today s objectives: icroprogramming Etending the mlti-cycle path lti-cycle

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC.

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC. Introdction to Windows Server 2008 1 Learning Objectives Identify the key featres of each Windows Server 2008 edition Understand client systems that can be sed with Windows Server 2008 Identify important

More information

Review. A single-cycle MIPS processor

Review. A single-cycle MIPS processor Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?

More information

Analog Telephones. User Guide. BusinessPhone Communication Platform

Analog Telephones. User Guide. BusinessPhone Communication Platform Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make

More information

Scientific Computing on Bulk Synchronous Parallel Architectures

Scientific Computing on Bulk Synchronous Parallel Architectures Scientific Compting on Blk Synchronos Parallel Architectres R. H. Bisseling Department of Mathematics, Utrecht University and W. F. McColl y Programming Research Grop, Oxford University April 27, 1994

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Workshop. Improving the Bus Network

Workshop. Improving the Bus Network Workshop Improving the Bs Network Workshop Objectives To consider a range of objectives and proposals that cold improve the bs system in Brisbane to contribte to pblic (inclding RACQ members ) mobility

More information

CSE 141 Computer Architecture Summer Session I, Lectures 10 Advanced Topics, Memory Hierarchy and Cache. Pramod V. Argade

CSE 141 Computer Architecture Summer Session I, Lectures 10 Advanced Topics, Memory Hierarchy and Cache. Pramod V. Argade CSE 141 Compter Architectre Smmer Session I, 2004 Lectres 10 Advanced Topics, emory Hierarchy and Cache Pramod V. Argade CSE141: Introdction to Compter Architectre Instrctor: TA: Pramod V. Argade (p2argade@cs.csd.ed)

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

PART I: Adding Instructions to the Datapath. (2 nd Edition):

PART I: Adding Instructions to the Datapath. (2 nd Edition): EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================

More information

Nortel DECT Handset 4025 User Guide

Nortel DECT Handset 4025 User Guide DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard

More information

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety...

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety... STAR -1- Content 1. Safety Precation... 4 2. Getting started... 7 Installing the cards and the Battery... 7 Charging the Battery... 8 3. Inpt method... 9 To Shift Entry Methods... 9 Nmeric and English

More information

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445

More information

A Wireless MAC Protocol comparison.

A Wireless MAC Protocol comparison. Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

LTC 8600 Series Allegiant Matrix/Control Systems - Modular

LTC 8600 Series Allegiant Matrix/Control Systems - Modular Video 86 Series Allegiant Matrix/Control Systems - Modlar 86 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 128 Camera by 16 monitor switching Modlar constrction Powerfl alarm handling

More information

DSCS6020: SQLite and RSQLite

DSCS6020: SQLite and RSQLite DSCS6020: SQLite and RSQLite SQLite History SQlite is an open sorce embedded database, meaning that it doesn t have a separate server process. Reads and writes to ordinary disk files. The original implementation

More information

DI-80. When Accuracy Counts

DI-80. When Accuracy Counts DI-80 Indi cator When Accracy Conts Operation Manal 73357 CONTENTS 1. INTRODUCTION...3 1.1. Display...3 1.2. A/D Section...3 1.3. Item Memory...3 1.4. Environment...4 1.5. Interface...4 1.6. Option...4

More information

Clustering and Clustering

Clustering and Clustering Clstering and Clstering Tools Testing Migrate configration settings Qick configration and trobleshooting Storage configration Performance and reliability Secrity 20 Enhanced Web Services Microsoft Internet

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Spam detection system: a new approach based on interval type-2 fuzzy sets

Spam detection system: a new approach based on interval type-2 fuzzy sets Ryerson University Digital Commons @ Ryerson Theses and dissertations 1-1-2010 Spam detection system: a new approach based on interval type-2 fzzy sets Reza Ariaeinejad Ryerson University Follow this and

More information

Decoders. 3-Input Full Decoder

Decoders. 3-Input Full Decoder ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information