History Based Probabilistic Backoff Algorithm
|
|
- Bruno May
- 6 years ago
- Views:
Transcription
1 America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), ISSN: Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese doi: /ajeassp Published Olie 5 (3) 2012 ( History Based Probabilistic Backoff Naredra Rajagopala ad C. Mala Departmet of Computer Sciece ad Egieerig, Natioal Istitute of Techology, Trichy, Idia Received , Revised ; Accepted ABSTRACT Performace of Wireless LAN ca be improved at each layer of the protocol stack with respect to eergy efficiecy. The Media Access Cotrol layer is resposible for the key fuctios like access cotrol ad flow cotrol. Durig cotetio, Backoff algorithm is used to gai access to the medium with miimum probability of collisio. After studyig differet variatios of back off algorithms that have bee proposed, a ew variat called History based Probabilistic Backoff is proposed. Through mathematical aalysis ad simulatio results usig NS-2, it is see that proposed History based Probabilistic Backoff algorithm performs better tha Biary Expoetial Backoff algorithm. Keywords: Wide Area Networks (WANs), Local Area Networks (LANs), Wireless Fidelity (WiFi), Istitutio of Electrical ad Electroics Egieers (IEEE), Carrier Sese Multiple Access with Collisio Detectio (CSMA/CD) 1. INTRODUCTION Withi a short spa of time, commuicatio etworks have goe through rapid evolutio sice its iceptio. Network systems are classified ito Local Area Networks (LANs), Wide Area Networks (WANs) ad Metropolita Area Networks (MANs) based upo its area of coverage. LAN is a importat classificatio which is widely used to coect stadaloe systems i offices or i istitutios. The Istitutio of Electrical ad Electroics Egieers (IEEE) is a techical professioal society which stadardizes specificatios. IEEE came up with differet stadards for differet LAN techologies such as IEEE for wired etheret LANs, IEEE for wired toke rig LANs, IEEE (Schiller, 2008; Wu et al., 2001; 2003) for wireless LANs. Mobility has become oe of the ecessary requiremets for users. IEEE b also kow as Wireless Fidelity (WiFi) is oe of the widely used stadards today. Media access cotrol is a importat fuctio i ay Local Area Network. Access Cotrol is the mai focus i this work. Cocurret access of the shared medium by may statios would lead to collisio ad retrasmissio of data frames, resultig i degradatio of the etwork efficiecy. Access cotrol is a protocol by which decisio is made as to who will access the medium at a give poit of time. Aother importat fuctio hadled by the data lik layer is flow cotrol. The seder ad the receiver come to a uderstadig o how much of data ca be set, so that it is coveiet for both the seder ad the receiver to optimize the badwidth utilizatio. This fuctio is called flow cotrol. The ature of the wired ad wireless media differs cosiderably. Wired medium is scalable with the usage of higher badwidth cables ad ot easily subjected to iterferece ad disturbace. The sigal stregth is uiform throughout the medium makig it possible to sese for collisio wheever two or more statios access it simultaeously. The protocol used for media access cotrol i IEEE is Carrier Sese Multiple Access with Collisio Detectio (CSMA/CD) (Schiller, 2008). But i the case of a wireless medium the frequecy rage is fixed ad also highly vulerable to iterferece ad disturbace, makig the same access cotrol specificatios usuitable for both media. I wireless LANs the sigal stregth decreases proportioal to the Correspodig Author: Naredra Rajagopala, Departmet of Computer Sciece ad Egieerig, Natioal Istitute of Techology, Trichy, Idia Sciece Publicatios 230
2 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) square of the distace it travels, makig it practically ifeasible to sese a collisio as the retured sigal would be very mild which may go udetected. Carrier Sese Multiple Access with Collisio Avoidace (CSMA/CA) (Ziouva ad Atoakopoulos, 2003) is the protocol for access cotrol i IEEE The overview of IEEE MAC is explaied ext followed by discussio o the differet variatios of Backoff s. A overview of the proposed History Based Probabilistic Backoff is discussed ext followed by Mathematical aalysis of the proposed, Simulatio Results followed by coclusio Overview of IEEE Media Access Cotrol IEEE Media Access Cotrol supports asychroous ad time boud delivery of data frames. The stadard supports madatory Distributed Coordiatio Fuctio (DCF) (Wu et al., 2003; Ziouva ad Atoakopoulos, 2003) ad optioal Poit Coordiatio Fuctio (PCF) (Wu et al., 2003; Ziouva ad Atoakopoulos, 2003). I the case of PCF, a access poit elected as the moitor keeps pollig the other odes o whether they are iterested to access the medium. It allocates the medium to oe of the odes based upo priority criteria. PCF is ecessary for real time services. But ad-hoc etworks caot guaratee real time services as it is formed dyamically o the move by some statios ad do ot cotai a access poit. I DCF two techiques are used i data trasmissio. Oe techique is the basic two way hadshakig mechaism i which the seder seds the data frame ad the receiver seds a Positive Ackowledgemet (PACK) after receivig the data frame. If the seder does ot receive the PACK util timeout occurs, the frame is retrasmitted. This hadshakig mechaism is simple ad easy, but results i wastage of badwidth ad very low throughput due to hidde termial ad exposed termial problems (Schiller, 2008). If A, B ad C are three statios, statio A is trasmittig packet to statio B which is ot visible to statio C. Now if statio C also tries to sed a packet to statio B, it would lead to a collisio or iterferece at B. This problem is called hidde termial problem. Statio C uderstads that statios A ad B are i coversatio by sesig the medium ad refrais from sedig ay data to statio D, eve though statio D is ot i the iterferece rage of both statios A ad B. This is called as exposed termial problem. The other techique is a four way hadshakig i which Request To Sed (RTS) ad Clear To Sed (CTS) mechaisms are used to reserve the medium. This mechaism tries to overcome Sciece Publicatios 231 the hidde termial ad exposed termial problems. If statios A ad B are i coversatio, statio A seds RTS to statio B. Every statio receivig the RTS irrespective of whether it is the iteded recipiet or ot, must set their Network Allocatio Vector (NAV) (Biachi, 2000), which idicates the earliest time duratio to be elapsed to access the medium. Statio B respods with CTS, statio C uderstads that statios A ad B are i coversatio ad refrais from sedig data to statios A or B. If statio C eeds to commuicate with statio D which is out of iterferece rage of both the statios A ad B, the statio C seds RTS to statio D which respods with the CTS, eablig the commuicatio betwee them without disturbig statios A ad B. The access cotrol protocol CSMA/CA uses four way hadshakig with RTS/CTS. Eve though the probability of collisio of data frames is elimiated drastically due to the usage of CSMA/CA, there is a probability of collisio of cotrol frames, because two statios ca try to access the medium by sedig the RTS simultaeously, resultig i a collisio. To overcome this issue the Backoff algorithm is used. It specifies the time spa after which the system ca attempt to access the medium agai thus reducig the probability of collisio. Differet variatios of backoff algorithms are proposed i the literature Overview of Existig Back Off s Three importat variatios i the literature amely Biary Expoetial Backoff (Nasir ad Albalt, 2009; Shi et al., 2004; Chatzimisios et al., 2005; Moura ad Mariheiro, 2005), Modified Biary Expoetial Backoff (Shi et al., 2004) ad Probability Based Backoff (Rajagopala ad Mala, 2010), are discussed here Biary Expoetial Backoff Accordig to the Biary Expoetial Back off (BEB) algorithm: Step 1: If a seder statio tries to trasmit data to a receiver statio ad there is a collisio, the seder statio would radomly choose a value with uiform probability from its cotetio widow [0-]. Step 2: The Cotetio Widow () is set to mi iitially ad the doubled every successive collisio util it reaches max. Step 3: It remais at max util the trasmissio is successful or the umber of retries exceed the specified limit of 7 for RTS, wherei it is assumed that the statio is ureachable.
3 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) Step 4: Wheever there is a successful trasmissio or the umber of retries exceed the limit, is reset to mi. This basic BEB algorithm assumes that the probability fuctio of successful trasmissio of a data frame is idepedet of whether the previous frame was successfully trasmitted or ot. But the probability fuctio of successful or usuccessful trasmissio of a data frame is depedet upo how may retries were attempted before the previous data frame was successfully trasmitted Modified Biary Expoetial Backoff Modified Biary Expoetial Backoff (MBEB) algorithm was proposed i (Shi et al., 2004) to the BEB algorithm i which the cotetio widow of previous trasmitted data frame is retaied for the curret frame: Step 1: If the trasmissio is successful, the the cotetio widow is reduced by half i.e., = /2, which would be used as value for ext frame trasmissio. Step 2: If the trasmissio is usuccessful, the the cotetio widow is doubled = 2 util it reaches max which is retaied as it is, for further retries util successful. Step 3: Whe the umber of retries exceed the limit, the is ot reset to mi, but retaied as it is, for the ext data frame trasmissio. Step 4: Every time whe the cotetio widow is updated, it is verified whether the value falls below mi, if it falls below mi, the it is seto mi +1. Step 5: The ew value is verified whether it exceeds max ad if it does, the the calculated ew value is igored ad is set to max Probability Based Back Off The Probability Based Backoff (PBB) is as follows: Step 1: The iitial value of Cotetio Widow is set to mi. The variables S ad C which represet umber of successful trasmissios ad umber of collisios respectively are iitialized to 0. Step 2: After each attempt to trasmit a data frame, S or C is icremeted accordigly ad the value of probability P is calculated usig P = C/(C +S). Sciece Publicatios 232 Step 3: The value of is calculated usig the formula = 1 + (2 P). Step 4: The value of i the case of successful trasmissio is calculated by the formula a ew = MAX[ mi + 1, Ad the value of i case of usuccessful trasmissio, by the formula: a ew = MIN[ max - 1, Step 5: Wheever the umber of retrasmissios exceed the umber of retries, Cotetio widow value is ot reset but carried forward to the ext frame trasmissio. The BEB algorithm assumes that the probability of a successful trasmissio of a data frame is idepedet of the previous trasmissios. Every ew trasmissio is iitialized to mi. This results i decreased throughput. The MBEB algorithm retais the value from the previous trasmissio, but agai it decreases or icrease the value expoetially, which ca deteriorate the performace. The PBB algorithm takes ito accout the total umber of successful trasmissios ad collisios to determie the value, but without cosideratio of the order of trasmissio History Based Probabilistic Backoff Accordig to Biary Expoetial Backoff, wheever a collisio occurs durig a data trasmissio, the cotetio widow size is doubled, or i other words, multiplied by 2 util successfully trasmitted or give up tryig for a maximum umber of attempts. I case of Modified Biary Expoetial Backoff, the cotetio widow size is doubled for every collisio util the maximum value is reached ad retaied the same for the allowed maximum umber of tries. I case of a successful trasmissio, the cotetio widow value is divided by two for every successful trasmissio util a miimum value is reached ad is retaied at the miimum value for subsequet attempts. The cotetio widow size is ot reset for every ew trasmissio, but is carried ahead from the previous trasmissio. It ca be mathematically represeted as: ext = prev 2 i case of successful trasmissio. ext = + prev /2 i case of collisio.
4 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) I geeral, ext = prev 2 a, where is 1 i case of successful trasmissio ad-1 whe it is a collisio. The value of is static. This work proposes aalyses ad reasos out theoretically ad through simulatio the eed ad effect of expoetial icrease or decrease i the size of the cotetio widow by a factor of 2. Mathematically the value of is static ad either 1-1. If the cotetio widow is icreased by a factor more tha 2, the cotetio widow would be loger, leadig to higher latecy. If the cotetio widow is icreased by a factor less tha 1, the due to very short cotetio widow, it would result i may collisios ad decreased throughput. I the proposed algorithm, the value of is varied dyamically betwee-1 ad 1 depedig o the traffic load or collisio rate. The traffic load or the collisio rate is represeted by: Sciece Publicatios P = C/(C + S) + β where, variable C represets umber of collisios ad variable S represets successful trasmissio. Variable β is added to give weight o the order of collisio or successful trasmissio. The value of β is calculated by heuristic method by the equatio below. If T 1,T 2,T 3,... T( -1 ) is the trasmissios, the: For I = 1,2,3,4,,(-1): β ± (i ) ( i+ 1) mod ulo2 [( i 1)]2 = [ ] ± is used to idicate whether it is a successful trasmissio or a collisio. As P is a ratio, it varies betwee 0 ad 1. But the iterval of α is betwee -1 ad 1, twice of P. Hece the value of α is give by equatio: α = -1 + (p 2) After calculatig the value of α, the cotetio widow is calculated by equatio: = 2 α ew 1.7. The History based Probabilistic Backoff Step 1: The iitial value of Cotetio Widow is set to mi. The variables S ad C which represet umber of successful trasmissios ad umber of collisios respectively are iitialized to Step 2: After each attempt to trasmit a data frame, S or C is icremeted accordigly ad the value of probability P is calculated If P is the probability estimatio of T th. Trasmissio, the for i = 1, 2, 3, 4,..., ( 1): β ± (i ) ( i+ 1) mod ulo2 [ i 1]/2 = [ ] P = C/(C + S) P = P If P >0.80 OR P <0.20 Eq. 1a: Else Eq. 1b: P = C/(C + S) + β (1a) (1b) Step 3: The value of a is calculated usig the formula Eq. 2: α = -1 + (P 2) (2) Step 4: The value of is calculated by the formula Eq. 3: ew = MAX[ mi + 1, α (3) I the case of successful trasmissio ad Eq. 4: ew = MIN[ max - 1, α (4) For usuccessful trasmissio. Step 5: Wheever the umber of retrasmissios exceed the umber of retries, Cotetio widow value is ot reset but carried forward to the ext frame trasmissio: = ew 1.8. Mathematical Aalysis of BEB, MBEB, PBB ad HBPB Cosider a sceario i which three data frame trasmissio attempts have bee made, each of which may result i success or failure; success is represeted by S ad failure or collisio is represeted by C. Now whe there is a attempt to trasmit the fourth frame, the value of the cotetio widow is calculated usig the BEB algorithm, MBEB algorithm ad PBB algorithm. A comparative study is discussed i (Nasir ad Albalt, 2009; Shi et al., 2004; Chatzimisios et al., 2005) o
5 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) BEB algorithm ad MBEB algorithm. (Biachi, 1998; 2000) discuss its effect o throughput. From the basic BEB algorithm, it is kow that the calculatio of the cotetio widow of a data frame does ot deped o previous trasmissios but oly o the successive usuccessful attempts BEB Cosider the scearios i Table 1, calculatig the values of the after 3 trasmissios usig basic BEB algorithm. Iitially let = mi. I Table 1, first row, trasmissio 1 resulted i collisio, = mi 2. Trasmissio 2 also resulted i a collisio, = mi 2 2. Similarly after third trasmissio, = mi 2 3, represeted as 2. I the secod row of Table 1. Agai, iitially, by the BEB algorithm, = mi. Further, it is observed that the first trasmissio ad secod trasmissio resulted i collisio deoted by C, but the third trasmissio was successful i trasmittig the frame: At trasmissio 2, = mi 2 At trasmissio 3, = mi 2 2 At trasmissio 4, = mi as reflected i Table 1 Similarly examiig the third row ad fourth row, it ca be observed that irrespective of the history of the trasmissio, if the previous trasmissio is successful value is reset to mi, as show i rows 3 ad MBEB MBEB algorithm is applied to the same sceario ad the value after each trasmissio is determied ad tabulated i Table 2. Iitially at trasmissio 1, = mi, As trasmissio 1 resulted i collisio, = mi 2, As trasmissio 2 also a collisio, = mi 2 2, = = mi 2 3 represeted as 2 i Table 2. The sceario i the secod row differetiates MBEB algorithm from the BEB algorithm: As trasmissio 1 results i collisio, = mi 2 Trasmissio 2 also a collisio, = mi 2 2 Trasmissio 3 is successful, = /2 = mi 2 Sciece Publicatios 234 The iitial value of = mi at row 3. As the first trasmissio is a failure, = mi 2. As the secod trasmissio is a success, = /2 = mi Third trasmissio is a success, = MAX [ /2, mi +1] = mi +1. Similarly applyig the MBEB algorithm, the value at trasmissio 3 i rows 3 ad 4 would be = mi + 1 represeted as /2 i the Table PBB The PBB algorithm is applied to the give sceario ad the correspodig values are tabulated i Table 3. The iitial value of = mi. Cosiderig the first row, after the first usuccessful trasmissio: = mi 2 because P = 1. Hece a = 1 + (P 2) = 1. Thus = 2 a = mi 2 As trasmissio 2 has also eded i collisio, P = 1 = 2 3 = mi 2 2. Similarly for the fourth trasmissio: = MIN [ mi 2 3, max -1] represeted as 2 i Table 3 Table 1. BEB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C W 2 C C S mi C S S mi S S S mi Table 2. MBEB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S /2 C S S /2 S S S /2 Table 3. PBB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S 3 C S S 3 2 S S S /2 2
6 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) I the secod row after the first ad secod trasmissio which is similar to the first row: = mi 2 2 Trasmissio 3 is successful, P = 2/3. = a-1 + (2 (1-P) ) = -1/3. Therefore = 2 = mi /3 = mi /3, represeted as prev 2 i Table 3. I the third row, after the first usuccessful trasmissio, = mi 2, After secod trasmissio, P = 1/2, a = 1 + (2(1-P)) = 0. = 2 = = mi 2. Trasmissio 3 is successful, P = 1/3, = a-1 + (2 (1- P)) = 1/3. Therefore = 2 = mi 2 21/3 = 3 mi 24/3, represeted as prev 2 i Table 3. As all the trasmissios are successful trasmissios i row 4, P = 0, hece = 1+ (2 P) = -1, the value of = 2 = 2 1 = mi /2. But value is ot allowed to go below mi. Hece: = MAX[ mi + 1, /2] = mi + 1. = mi + 1, represeted by /2 i Table HBPB Cosiderig the same sceario as for the above algorithms, the iitial value of = mi Cosiderig the first row, after the first usuccessful trasmissio, = mi 2 because P = 1. Hece a = 1 + (P 2) = 1. Thus = 2 = mi 2 As trasmissio 2 has also eded i collisio, P = 1 = 2 = mi 2 2. Similarly for the fourth trasmissio, = MIN[ mi 2 3, max -1] represeted as 2 i Table 4. I the secod row of Table 4, The value of P is 2/3 ad β= = 0.04,= P = / = , ew = I the Third row of Table 4, the value of P is 1/3 ad β = = 0.14, = P = / = , ew = As all the trasmissios are successful trasmissios i row 4, P = 0, hece = 1+(2 P) = -1, The value of = 2 a = 2 1 = mi /2. But value is ot allowed to go below mi. Hece, = MAX[ mi + 1, /2] = mi + 1. = mi + 1, represeted by /2 i Table 4. The History Based Probabilistic Backoff (HBPB) is evaluated with Network Simulator NS-33 (Network Simulator. to compare with the basic Biary Expoetial Backoff (BEB) algorithm. Sciece Publicatios 235 Table 4. HBPB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S C S S S S S 2 Table 5. Simulatio parameters Parameter Value Simulatio area m Simulatio Duratio 1000sec MAC Protocol Routig Protocol DSDV Traffic Type CBR RTS retry limit 7 Cotetio Widow ( max ) 1023 Cotetio Widow ( mi ) 31 Table 6. Retrasmissio failure cout BEB vs HBPB algorithm Number of Retrasmissio Retrasmissio Sl. No Nodes cout for BEB cout for HBPB Fig. 1. Retrasmissio Failures usig BEB Vs HBPB The Simulatio Parameters are give i Table 5. Compared to the basic biary expoetial backoff algorithm implemeted i NS-2.33, the two modules ic_cw () ad rst_cw () are modified to implemet the History Based Probabilistic Backoff. Global variables called Collisio Cout ad Trasmissio Cout are declared ad used to keep cout of successful trasmissios ad collisios. The umber of odes are varied from , for the same etwork cofiguratio.
7 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) Fig. 2. Throughput usig BEB Vs HBPB The umber of RTS retrasmissio failures is logged for varyig umber of odes. The calculatio of β i the implemetatio of HBPB algorithm is limited to up to five trasmissios sice the sum of the rest is egligible. The retrasmissio failure cout is recorded i Table 6 ad also plotted i Graph 1 (Fig. 1). Also the throughput of both the algorithms are compared ad plotted i Graph 2 (Fig. 2). Sciece Publicatios 2. CONCLUSION The performace of BEB algorithm, MBEB algorithm ad PBB algorithm is aalyzed ad compared with HBPB algorithm mathematically. It ca be observed from the results tabulated that the value of Cotetio Widow grows expoetially i both the cases of BEB ad MBEB algorithms without takig the etwork collisio rate ito cosideratio. The PBB algorithm dyamically varies the value of takig the collisio rate ad the success rate of trasmissios ito cosideratio, makig it more adaptable to the etwork. A improvemet is proposed by itroducig β as a parameter i HBPB algorithm to cosider the order of collisios or successful trasmissios. It ca be iferred from the simulatio results that the proposed HBPB algorithm performs better tha the Biary Expoetial Backoff algorithm i terms of better throughput. It performs sigificatly better i the case of a cogested etwork. 3. REFERENCES Biachi, G., IEEE saturatio throughput aalysis. IEEE Commu. Lett., 2: DOI: / Biachi, G., Performace aalysis of the IEEE distributed coordiatio fuctio. IEEE J. Selected Area Commu., 18: DOI: / Chatzimisios, P., A.C. Boucouvalas, V. Vitsas, A. Vafiadis ad A. Ecoomidis et al., A simple ad effective backoff scheme for the IEEE MAC protocol. Bouremouth Uiversity, UK. Moura, J.A. ad R.N. Mariheiro, MAC approaches for QoS ehacemet i wireless LANs. Proc. JETC Netw. Simulator. Nasir, Q. ad M. Albalt, Improved backoff algorithm for IEEE etworks. Proceedigs of the Iteratioal Coferece o Networkig, Sesig ad Cotrol, Mar., IEEE Xplore Press, Okayama, pp: 1-6. DOI: /ICNSC Rajagopala, N. ad C. Mala, aalysis ad comparative study of differet backoff algorithms with probability based backoff algorithm. Recet Treds Netw. Security Appli., 89: DOI: / _34 Schiller, J.M., Mobile Commuicatios. 1st Ed., Pearso Educatio, Idia, ISBN-10: , pp: 512. Shi, H.J., D.R. Shi ad H.Y. You, A Efficiet Backoff Scheme for IEEE DCF. Persoal Wireless Commu., 3260: DOI: / _15 Wu, H., Y. Li, S. Cheg, Y. Peg ad K. Log, IEEE Distributed coordiatio fuctio: ehacemet ad aalysis. J. Comput. Sci. Techol., 18: DOI: /BF Wu, H., Y. Log ad S. Cheg, A simple model of IEEE wireless LAN. Proceedig of the Iteratioal Cofereces o Ifo-Tech ad Ifo- Net, Oct. 29-Nov. 01, IEEE Xplore Press, Beijig, pp: DOI: /ICII Ziouva, E. ad T. Atoakopoulos, The IEEE distributed coordiatio fuctio i smallscale ad-hoc wireless LANs. It. J. Wireless Iform. Netw., 10: DOI: /A:
Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationMarkov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size
Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA
More informationA New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*
A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationInterference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks
Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh
More informationCopyright 2010, Elsevier Inc. All rights Reserved
Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationGTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial
More informationAcknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis
Globecom 2012 - Wireless Commuicatios Symposium Ackowledgemet-Aware MPR MAC Protocol for Distributed WLANs: Desig ad Aalysis Arpa Mukhopadhyay, Neelesh B. Mehta, Seior Member, IEEE, Vikram Sriivasa, Member,
More informationAdmission control issues in sensor clusters
Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationS. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea
S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationLecture 10 Collision resolution. Collision resolution
Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags
More informationGuaranteeing Hard Real Time End-to-End Communications Deadlines
Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationAn upper bound model for TCP and UDP throughput in IPv4 and IPv6
ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationAchieving Fairness in Wireless LANs by Enhanced DCF *
U.C. ECECS Techical Report 2005-03 August 2005 Achievig Fairess i Wireless LANs by Ehaced 802. DCF * by Nagesh S. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationPartition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration
Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL
More informationA Generalized Markov Chain Model for Effective Analysis of Slotted IEEE
A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationBOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM
MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research
More informationEnergy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationRecursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:
Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical
More informationAdaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery
Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationWhat are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs
What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure
More informationChapter 3. Floating Point Arithmetic
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add
More informationOur second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.
Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationLow Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationAchieving Fairness in Wireless LANs by Enhanced IEEE DCF *
Achievig Fairess i Wireless LANs by Ehaced IEEE 802.11 DCF * Nagesh S. P. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig,
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationDesign of efficient, virtual non-blocking optical switches
Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationResearch Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications
Hidawi Publishig Corporatio Iteratioal Joural of Telemedicie ad Applicatios Volume 29, Article ID 98746, 13 pages doi:1.1155/29/98746 Research Article Delay Aalysis of GTS Bridgig betwee IEEE 82.15.4 ad
More informationEE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control
EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More informationIdentification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.
Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's
More informationHash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More informationResearch Article Kinematics Analysis and Modeling of 6 Degree of Freedom Robotic Arm from DFROBOT on Labview
Research Joural of Applied Scieces, Egieerig ad Techology 13(7): 569-575, 2016 DOI:10.19026/rjaset.13.3016 ISSN: 2040-7459; e-issn: 2040-7467 2016 Maxwell Scietific Publicatio Corp. Submitted: May 5, 2016
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationOptimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor
Iteratioal Joural of Computer Applicatios (97 8887) Volume 132 No.11, December21 Optimizatio of based CPU Schedulig Algorithms to Miimize Starvatio of Processes usig a Efficiecy Factor Muhammad A. Mustapha
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationResearch Article Optimal Configuration of Virtual Links for Avionics Network Systems
Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationOn Multicast Scheduling and Routing in Multistage Clos Networks
O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig
More informationNew Analytical Model of Distributed Coordination Function
IJCSNS Iteratioal Joural of Comuter Sciece ad Netork Security, VOL.8 No.2, December 2008 25 Ne Aalytical Model of Distributed Coordiatio Fuctio Petr Kovar ad Novotý Vít, Bro Uiversity of Techology, Purkyova
More informationTraffic Models and QoS
Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright
More informationSERIAL COMMUNICATION INTERFACE FOR ESA ESTRO
Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationQuality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationChapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3
More informationReversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits
Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig
More informationNormal Distributions
Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationCounting Regions in the Plane and More 1
Coutig Regios i the Plae ad More 1 by Zvezdelia Stakova Berkeley Math Circle Itermediate I Group September 016 1. Overarchig Problem Problem 1 Regios i a Circle. The vertices of a polygos are arraged o
More informationBluetooth Basics. Bluetooth Overview
Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationINTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS
NTER-CELL LOAD BALANCNG TECHNQUE FOR MULT-CLASS TRAFFC N MMO-LTE-A NETWORKS 1 T.PADMAPRYA, 2 V. SAMNADAN 1 Research Scholar, Podicherry Egieerig College 2 Professor, Departmet of ECE, Podicherry Egieerig
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationSum-connectivity indices of trees and unicyclic graphs of fixed maximum degree
1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationRelationship between augmented eccentric connectivity index and some other graph invariants
Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats
More information