History Based Probabilistic Backoff Algorithm

Size: px
Start display at page:

Download "History Based Probabilistic Backoff Algorithm"

Transcription

1 America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), ISSN: Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese doi: /ajeassp Published Olie 5 (3) 2012 ( History Based Probabilistic Backoff Naredra Rajagopala ad C. Mala Departmet of Computer Sciece ad Egieerig, Natioal Istitute of Techology, Trichy, Idia Received , Revised ; Accepted ABSTRACT Performace of Wireless LAN ca be improved at each layer of the protocol stack with respect to eergy efficiecy. The Media Access Cotrol layer is resposible for the key fuctios like access cotrol ad flow cotrol. Durig cotetio, Backoff algorithm is used to gai access to the medium with miimum probability of collisio. After studyig differet variatios of back off algorithms that have bee proposed, a ew variat called History based Probabilistic Backoff is proposed. Through mathematical aalysis ad simulatio results usig NS-2, it is see that proposed History based Probabilistic Backoff algorithm performs better tha Biary Expoetial Backoff algorithm. Keywords: Wide Area Networks (WANs), Local Area Networks (LANs), Wireless Fidelity (WiFi), Istitutio of Electrical ad Electroics Egieers (IEEE), Carrier Sese Multiple Access with Collisio Detectio (CSMA/CD) 1. INTRODUCTION Withi a short spa of time, commuicatio etworks have goe through rapid evolutio sice its iceptio. Network systems are classified ito Local Area Networks (LANs), Wide Area Networks (WANs) ad Metropolita Area Networks (MANs) based upo its area of coverage. LAN is a importat classificatio which is widely used to coect stadaloe systems i offices or i istitutios. The Istitutio of Electrical ad Electroics Egieers (IEEE) is a techical professioal society which stadardizes specificatios. IEEE came up with differet stadards for differet LAN techologies such as IEEE for wired etheret LANs, IEEE for wired toke rig LANs, IEEE (Schiller, 2008; Wu et al., 2001; 2003) for wireless LANs. Mobility has become oe of the ecessary requiremets for users. IEEE b also kow as Wireless Fidelity (WiFi) is oe of the widely used stadards today. Media access cotrol is a importat fuctio i ay Local Area Network. Access Cotrol is the mai focus i this work. Cocurret access of the shared medium by may statios would lead to collisio ad retrasmissio of data frames, resultig i degradatio of the etwork efficiecy. Access cotrol is a protocol by which decisio is made as to who will access the medium at a give poit of time. Aother importat fuctio hadled by the data lik layer is flow cotrol. The seder ad the receiver come to a uderstadig o how much of data ca be set, so that it is coveiet for both the seder ad the receiver to optimize the badwidth utilizatio. This fuctio is called flow cotrol. The ature of the wired ad wireless media differs cosiderably. Wired medium is scalable with the usage of higher badwidth cables ad ot easily subjected to iterferece ad disturbace. The sigal stregth is uiform throughout the medium makig it possible to sese for collisio wheever two or more statios access it simultaeously. The protocol used for media access cotrol i IEEE is Carrier Sese Multiple Access with Collisio Detectio (CSMA/CD) (Schiller, 2008). But i the case of a wireless medium the frequecy rage is fixed ad also highly vulerable to iterferece ad disturbace, makig the same access cotrol specificatios usuitable for both media. I wireless LANs the sigal stregth decreases proportioal to the Correspodig Author: Naredra Rajagopala, Departmet of Computer Sciece ad Egieerig, Natioal Istitute of Techology, Trichy, Idia Sciece Publicatios 230

2 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) square of the distace it travels, makig it practically ifeasible to sese a collisio as the retured sigal would be very mild which may go udetected. Carrier Sese Multiple Access with Collisio Avoidace (CSMA/CA) (Ziouva ad Atoakopoulos, 2003) is the protocol for access cotrol i IEEE The overview of IEEE MAC is explaied ext followed by discussio o the differet variatios of Backoff s. A overview of the proposed History Based Probabilistic Backoff is discussed ext followed by Mathematical aalysis of the proposed, Simulatio Results followed by coclusio Overview of IEEE Media Access Cotrol IEEE Media Access Cotrol supports asychroous ad time boud delivery of data frames. The stadard supports madatory Distributed Coordiatio Fuctio (DCF) (Wu et al., 2003; Ziouva ad Atoakopoulos, 2003) ad optioal Poit Coordiatio Fuctio (PCF) (Wu et al., 2003; Ziouva ad Atoakopoulos, 2003). I the case of PCF, a access poit elected as the moitor keeps pollig the other odes o whether they are iterested to access the medium. It allocates the medium to oe of the odes based upo priority criteria. PCF is ecessary for real time services. But ad-hoc etworks caot guaratee real time services as it is formed dyamically o the move by some statios ad do ot cotai a access poit. I DCF two techiques are used i data trasmissio. Oe techique is the basic two way hadshakig mechaism i which the seder seds the data frame ad the receiver seds a Positive Ackowledgemet (PACK) after receivig the data frame. If the seder does ot receive the PACK util timeout occurs, the frame is retrasmitted. This hadshakig mechaism is simple ad easy, but results i wastage of badwidth ad very low throughput due to hidde termial ad exposed termial problems (Schiller, 2008). If A, B ad C are three statios, statio A is trasmittig packet to statio B which is ot visible to statio C. Now if statio C also tries to sed a packet to statio B, it would lead to a collisio or iterferece at B. This problem is called hidde termial problem. Statio C uderstads that statios A ad B are i coversatio by sesig the medium ad refrais from sedig ay data to statio D, eve though statio D is ot i the iterferece rage of both statios A ad B. This is called as exposed termial problem. The other techique is a four way hadshakig i which Request To Sed (RTS) ad Clear To Sed (CTS) mechaisms are used to reserve the medium. This mechaism tries to overcome Sciece Publicatios 231 the hidde termial ad exposed termial problems. If statios A ad B are i coversatio, statio A seds RTS to statio B. Every statio receivig the RTS irrespective of whether it is the iteded recipiet or ot, must set their Network Allocatio Vector (NAV) (Biachi, 2000), which idicates the earliest time duratio to be elapsed to access the medium. Statio B respods with CTS, statio C uderstads that statios A ad B are i coversatio ad refrais from sedig data to statios A or B. If statio C eeds to commuicate with statio D which is out of iterferece rage of both the statios A ad B, the statio C seds RTS to statio D which respods with the CTS, eablig the commuicatio betwee them without disturbig statios A ad B. The access cotrol protocol CSMA/CA uses four way hadshakig with RTS/CTS. Eve though the probability of collisio of data frames is elimiated drastically due to the usage of CSMA/CA, there is a probability of collisio of cotrol frames, because two statios ca try to access the medium by sedig the RTS simultaeously, resultig i a collisio. To overcome this issue the Backoff algorithm is used. It specifies the time spa after which the system ca attempt to access the medium agai thus reducig the probability of collisio. Differet variatios of backoff algorithms are proposed i the literature Overview of Existig Back Off s Three importat variatios i the literature amely Biary Expoetial Backoff (Nasir ad Albalt, 2009; Shi et al., 2004; Chatzimisios et al., 2005; Moura ad Mariheiro, 2005), Modified Biary Expoetial Backoff (Shi et al., 2004) ad Probability Based Backoff (Rajagopala ad Mala, 2010), are discussed here Biary Expoetial Backoff Accordig to the Biary Expoetial Back off (BEB) algorithm: Step 1: If a seder statio tries to trasmit data to a receiver statio ad there is a collisio, the seder statio would radomly choose a value with uiform probability from its cotetio widow [0-]. Step 2: The Cotetio Widow () is set to mi iitially ad the doubled every successive collisio util it reaches max. Step 3: It remais at max util the trasmissio is successful or the umber of retries exceed the specified limit of 7 for RTS, wherei it is assumed that the statio is ureachable.

3 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) Step 4: Wheever there is a successful trasmissio or the umber of retries exceed the limit, is reset to mi. This basic BEB algorithm assumes that the probability fuctio of successful trasmissio of a data frame is idepedet of whether the previous frame was successfully trasmitted or ot. But the probability fuctio of successful or usuccessful trasmissio of a data frame is depedet upo how may retries were attempted before the previous data frame was successfully trasmitted Modified Biary Expoetial Backoff Modified Biary Expoetial Backoff (MBEB) algorithm was proposed i (Shi et al., 2004) to the BEB algorithm i which the cotetio widow of previous trasmitted data frame is retaied for the curret frame: Step 1: If the trasmissio is successful, the the cotetio widow is reduced by half i.e., = /2, which would be used as value for ext frame trasmissio. Step 2: If the trasmissio is usuccessful, the the cotetio widow is doubled = 2 util it reaches max which is retaied as it is, for further retries util successful. Step 3: Whe the umber of retries exceed the limit, the is ot reset to mi, but retaied as it is, for the ext data frame trasmissio. Step 4: Every time whe the cotetio widow is updated, it is verified whether the value falls below mi, if it falls below mi, the it is seto mi +1. Step 5: The ew value is verified whether it exceeds max ad if it does, the the calculated ew value is igored ad is set to max Probability Based Back Off The Probability Based Backoff (PBB) is as follows: Step 1: The iitial value of Cotetio Widow is set to mi. The variables S ad C which represet umber of successful trasmissios ad umber of collisios respectively are iitialized to 0. Step 2: After each attempt to trasmit a data frame, S or C is icremeted accordigly ad the value of probability P is calculated usig P = C/(C +S). Sciece Publicatios 232 Step 3: The value of is calculated usig the formula = 1 + (2 P). Step 4: The value of i the case of successful trasmissio is calculated by the formula a ew = MAX[ mi + 1, Ad the value of i case of usuccessful trasmissio, by the formula: a ew = MIN[ max - 1, Step 5: Wheever the umber of retrasmissios exceed the umber of retries, Cotetio widow value is ot reset but carried forward to the ext frame trasmissio. The BEB algorithm assumes that the probability of a successful trasmissio of a data frame is idepedet of the previous trasmissios. Every ew trasmissio is iitialized to mi. This results i decreased throughput. The MBEB algorithm retais the value from the previous trasmissio, but agai it decreases or icrease the value expoetially, which ca deteriorate the performace. The PBB algorithm takes ito accout the total umber of successful trasmissios ad collisios to determie the value, but without cosideratio of the order of trasmissio History Based Probabilistic Backoff Accordig to Biary Expoetial Backoff, wheever a collisio occurs durig a data trasmissio, the cotetio widow size is doubled, or i other words, multiplied by 2 util successfully trasmitted or give up tryig for a maximum umber of attempts. I case of Modified Biary Expoetial Backoff, the cotetio widow size is doubled for every collisio util the maximum value is reached ad retaied the same for the allowed maximum umber of tries. I case of a successful trasmissio, the cotetio widow value is divided by two for every successful trasmissio util a miimum value is reached ad is retaied at the miimum value for subsequet attempts. The cotetio widow size is ot reset for every ew trasmissio, but is carried ahead from the previous trasmissio. It ca be mathematically represeted as: ext = prev 2 i case of successful trasmissio. ext = + prev /2 i case of collisio.

4 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) I geeral, ext = prev 2 a, where is 1 i case of successful trasmissio ad-1 whe it is a collisio. The value of is static. This work proposes aalyses ad reasos out theoretically ad through simulatio the eed ad effect of expoetial icrease or decrease i the size of the cotetio widow by a factor of 2. Mathematically the value of is static ad either 1-1. If the cotetio widow is icreased by a factor more tha 2, the cotetio widow would be loger, leadig to higher latecy. If the cotetio widow is icreased by a factor less tha 1, the due to very short cotetio widow, it would result i may collisios ad decreased throughput. I the proposed algorithm, the value of is varied dyamically betwee-1 ad 1 depedig o the traffic load or collisio rate. The traffic load or the collisio rate is represeted by: Sciece Publicatios P = C/(C + S) + β where, variable C represets umber of collisios ad variable S represets successful trasmissio. Variable β is added to give weight o the order of collisio or successful trasmissio. The value of β is calculated by heuristic method by the equatio below. If T 1,T 2,T 3,... T( -1 ) is the trasmissios, the: For I = 1,2,3,4,,(-1): β ± (i ) ( i+ 1) mod ulo2 [( i 1)]2 = [ ] ± is used to idicate whether it is a successful trasmissio or a collisio. As P is a ratio, it varies betwee 0 ad 1. But the iterval of α is betwee -1 ad 1, twice of P. Hece the value of α is give by equatio: α = -1 + (p 2) After calculatig the value of α, the cotetio widow is calculated by equatio: = 2 α ew 1.7. The History based Probabilistic Backoff Step 1: The iitial value of Cotetio Widow is set to mi. The variables S ad C which represet umber of successful trasmissios ad umber of collisios respectively are iitialized to Step 2: After each attempt to trasmit a data frame, S or C is icremeted accordigly ad the value of probability P is calculated If P is the probability estimatio of T th. Trasmissio, the for i = 1, 2, 3, 4,..., ( 1): β ± (i ) ( i+ 1) mod ulo2 [ i 1]/2 = [ ] P = C/(C + S) P = P If P >0.80 OR P <0.20 Eq. 1a: Else Eq. 1b: P = C/(C + S) + β (1a) (1b) Step 3: The value of a is calculated usig the formula Eq. 2: α = -1 + (P 2) (2) Step 4: The value of is calculated by the formula Eq. 3: ew = MAX[ mi + 1, α (3) I the case of successful trasmissio ad Eq. 4: ew = MIN[ max - 1, α (4) For usuccessful trasmissio. Step 5: Wheever the umber of retrasmissios exceed the umber of retries, Cotetio widow value is ot reset but carried forward to the ext frame trasmissio: = ew 1.8. Mathematical Aalysis of BEB, MBEB, PBB ad HBPB Cosider a sceario i which three data frame trasmissio attempts have bee made, each of which may result i success or failure; success is represeted by S ad failure or collisio is represeted by C. Now whe there is a attempt to trasmit the fourth frame, the value of the cotetio widow is calculated usig the BEB algorithm, MBEB algorithm ad PBB algorithm. A comparative study is discussed i (Nasir ad Albalt, 2009; Shi et al., 2004; Chatzimisios et al., 2005) o

5 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) BEB algorithm ad MBEB algorithm. (Biachi, 1998; 2000) discuss its effect o throughput. From the basic BEB algorithm, it is kow that the calculatio of the cotetio widow of a data frame does ot deped o previous trasmissios but oly o the successive usuccessful attempts BEB Cosider the scearios i Table 1, calculatig the values of the after 3 trasmissios usig basic BEB algorithm. Iitially let = mi. I Table 1, first row, trasmissio 1 resulted i collisio, = mi 2. Trasmissio 2 also resulted i a collisio, = mi 2 2. Similarly after third trasmissio, = mi 2 3, represeted as 2. I the secod row of Table 1. Agai, iitially, by the BEB algorithm, = mi. Further, it is observed that the first trasmissio ad secod trasmissio resulted i collisio deoted by C, but the third trasmissio was successful i trasmittig the frame: At trasmissio 2, = mi 2 At trasmissio 3, = mi 2 2 At trasmissio 4, = mi as reflected i Table 1 Similarly examiig the third row ad fourth row, it ca be observed that irrespective of the history of the trasmissio, if the previous trasmissio is successful value is reset to mi, as show i rows 3 ad MBEB MBEB algorithm is applied to the same sceario ad the value after each trasmissio is determied ad tabulated i Table 2. Iitially at trasmissio 1, = mi, As trasmissio 1 resulted i collisio, = mi 2, As trasmissio 2 also a collisio, = mi 2 2, = = mi 2 3 represeted as 2 i Table 2. The sceario i the secod row differetiates MBEB algorithm from the BEB algorithm: As trasmissio 1 results i collisio, = mi 2 Trasmissio 2 also a collisio, = mi 2 2 Trasmissio 3 is successful, = /2 = mi 2 Sciece Publicatios 234 The iitial value of = mi at row 3. As the first trasmissio is a failure, = mi 2. As the secod trasmissio is a success, = /2 = mi Third trasmissio is a success, = MAX [ /2, mi +1] = mi +1. Similarly applyig the MBEB algorithm, the value at trasmissio 3 i rows 3 ad 4 would be = mi + 1 represeted as /2 i the Table PBB The PBB algorithm is applied to the give sceario ad the correspodig values are tabulated i Table 3. The iitial value of = mi. Cosiderig the first row, after the first usuccessful trasmissio: = mi 2 because P = 1. Hece a = 1 + (P 2) = 1. Thus = 2 a = mi 2 As trasmissio 2 has also eded i collisio, P = 1 = 2 3 = mi 2 2. Similarly for the fourth trasmissio: = MIN [ mi 2 3, max -1] represeted as 2 i Table 3 Table 1. BEB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C W 2 C C S mi C S S mi S S S mi Table 2. MBEB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S /2 C S S /2 S S S /2 Table 3. PBB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S 3 C S S 3 2 S S S /2 2

6 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) I the secod row after the first ad secod trasmissio which is similar to the first row: = mi 2 2 Trasmissio 3 is successful, P = 2/3. = a-1 + (2 (1-P) ) = -1/3. Therefore = 2 = mi /3 = mi /3, represeted as prev 2 i Table 3. I the third row, after the first usuccessful trasmissio, = mi 2, After secod trasmissio, P = 1/2, a = 1 + (2(1-P)) = 0. = 2 = = mi 2. Trasmissio 3 is successful, P = 1/3, = a-1 + (2 (1- P)) = 1/3. Therefore = 2 = mi 2 21/3 = 3 mi 24/3, represeted as prev 2 i Table 3. As all the trasmissios are successful trasmissios i row 4, P = 0, hece = 1+ (2 P) = -1, the value of = 2 = 2 1 = mi /2. But value is ot allowed to go below mi. Hece: = MAX[ mi + 1, /2] = mi + 1. = mi + 1, represeted by /2 i Table HBPB Cosiderig the same sceario as for the above algorithms, the iitial value of = mi Cosiderig the first row, after the first usuccessful trasmissio, = mi 2 because P = 1. Hece a = 1 + (P 2) = 1. Thus = 2 = mi 2 As trasmissio 2 has also eded i collisio, P = 1 = 2 = mi 2 2. Similarly for the fourth trasmissio, = MIN[ mi 2 3, max -1] represeted as 2 i Table 4. I the secod row of Table 4, The value of P is 2/3 ad β= = 0.04,= P = / = , ew = I the Third row of Table 4, the value of P is 1/3 ad β = = 0.14, = P = / = , ew = As all the trasmissios are successful trasmissios i row 4, P = 0, hece = 1+(2 P) = -1, The value of = 2 a = 2 1 = mi /2. But value is ot allowed to go below mi. Hece, = MAX[ mi + 1, /2] = mi + 1. = mi + 1, represeted by /2 i Table 4. The History Based Probabilistic Backoff (HBPB) is evaluated with Network Simulator NS-33 (Network Simulator. to compare with the basic Biary Expoetial Backoff (BEB) algorithm. Sciece Publicatios 235 Table 4. HBPB algorithm results Tras1 Tras2 Tras3 for Tras4 C C C 2 C C S C S S S S S 2 Table 5. Simulatio parameters Parameter Value Simulatio area m Simulatio Duratio 1000sec MAC Protocol Routig Protocol DSDV Traffic Type CBR RTS retry limit 7 Cotetio Widow ( max ) 1023 Cotetio Widow ( mi ) 31 Table 6. Retrasmissio failure cout BEB vs HBPB algorithm Number of Retrasmissio Retrasmissio Sl. No Nodes cout for BEB cout for HBPB Fig. 1. Retrasmissio Failures usig BEB Vs HBPB The Simulatio Parameters are give i Table 5. Compared to the basic biary expoetial backoff algorithm implemeted i NS-2.33, the two modules ic_cw () ad rst_cw () are modified to implemet the History Based Probabilistic Backoff. Global variables called Collisio Cout ad Trasmissio Cout are declared ad used to keep cout of successful trasmissios ad collisios. The umber of odes are varied from , for the same etwork cofiguratio.

7 Naredra Rajagopala ad C. Mala / America Joural of Egieerig ad Applied Scieces 5 (3) (2012) Fig. 2. Throughput usig BEB Vs HBPB The umber of RTS retrasmissio failures is logged for varyig umber of odes. The calculatio of β i the implemetatio of HBPB algorithm is limited to up to five trasmissios sice the sum of the rest is egligible. The retrasmissio failure cout is recorded i Table 6 ad also plotted i Graph 1 (Fig. 1). Also the throughput of both the algorithms are compared ad plotted i Graph 2 (Fig. 2). Sciece Publicatios 2. CONCLUSION The performace of BEB algorithm, MBEB algorithm ad PBB algorithm is aalyzed ad compared with HBPB algorithm mathematically. It ca be observed from the results tabulated that the value of Cotetio Widow grows expoetially i both the cases of BEB ad MBEB algorithms without takig the etwork collisio rate ito cosideratio. The PBB algorithm dyamically varies the value of takig the collisio rate ad the success rate of trasmissios ito cosideratio, makig it more adaptable to the etwork. A improvemet is proposed by itroducig β as a parameter i HBPB algorithm to cosider the order of collisios or successful trasmissios. It ca be iferred from the simulatio results that the proposed HBPB algorithm performs better tha the Biary Expoetial Backoff algorithm i terms of better throughput. It performs sigificatly better i the case of a cogested etwork. 3. REFERENCES Biachi, G., IEEE saturatio throughput aalysis. IEEE Commu. Lett., 2: DOI: / Biachi, G., Performace aalysis of the IEEE distributed coordiatio fuctio. IEEE J. Selected Area Commu., 18: DOI: / Chatzimisios, P., A.C. Boucouvalas, V. Vitsas, A. Vafiadis ad A. Ecoomidis et al., A simple ad effective backoff scheme for the IEEE MAC protocol. Bouremouth Uiversity, UK. Moura, J.A. ad R.N. Mariheiro, MAC approaches for QoS ehacemet i wireless LANs. Proc. JETC Netw. Simulator. Nasir, Q. ad M. Albalt, Improved backoff algorithm for IEEE etworks. Proceedigs of the Iteratioal Coferece o Networkig, Sesig ad Cotrol, Mar., IEEE Xplore Press, Okayama, pp: 1-6. DOI: /ICNSC Rajagopala, N. ad C. Mala, aalysis ad comparative study of differet backoff algorithms with probability based backoff algorithm. Recet Treds Netw. Security Appli., 89: DOI: / _34 Schiller, J.M., Mobile Commuicatios. 1st Ed., Pearso Educatio, Idia, ISBN-10: , pp: 512. Shi, H.J., D.R. Shi ad H.Y. You, A Efficiet Backoff Scheme for IEEE DCF. Persoal Wireless Commu., 3260: DOI: / _15 Wu, H., Y. Li, S. Cheg, Y. Peg ad K. Log, IEEE Distributed coordiatio fuctio: ehacemet ad aalysis. J. Comput. Sci. Techol., 18: DOI: /BF Wu, H., Y. Log ad S. Cheg, A simple model of IEEE wireless LAN. Proceedig of the Iteratioal Cofereces o Ifo-Tech ad Ifo- Net, Oct. 29-Nov. 01, IEEE Xplore Press, Beijig, pp: DOI: /ICII Ziouva, E. ad T. Atoakopoulos, The IEEE distributed coordiatio fuctio i smallscale ad-hoc wireless LANs. It. J. Wireless Iform. Netw., 10: DOI: /A:

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis Globecom 2012 - Wireless Commuicatios Symposium Ackowledgemet-Aware MPR MAC Protocol for Distributed WLANs: Desig ad Aalysis Arpa Mukhopadhyay, Neelesh B. Mehta, Seior Member, IEEE, Vikram Sriivasa, Member,

More information

Admission control issues in sensor clusters

Admission control issues in sensor clusters Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Achieving Fairness in Wireless LANs by Enhanced DCF *

Achieving Fairness in Wireless LANs by Enhanced DCF * U.C. ECECS Techical Report 2005-03 August 2005 Achievig Fairess i Wireless LANs by Ehaced 802. DCF * by Nagesh S. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle: Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Chapter 3. Floating Point Arithmetic

Chapter 3. Floating Point Arithmetic COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Achieving Fairness in Wireless LANs by Enhanced IEEE DCF *

Achieving Fairness in Wireless LANs by Enhanced IEEE DCF * Achievig Fairess i Wireless LANs by Ehaced IEEE 802.11 DCF * Nagesh S. P. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig,

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Research Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications

Research Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications Hidawi Publishig Corporatio Iteratioal Joural of Telemedicie ad Applicatios Volume 29, Article ID 98746, 13 pages doi:1.1155/29/98746 Research Article Delay Aalysis of GTS Bridgig betwee IEEE 82.15.4 ad

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Research Article Kinematics Analysis and Modeling of 6 Degree of Freedom Robotic Arm from DFROBOT on Labview

Research Article Kinematics Analysis and Modeling of 6 Degree of Freedom Robotic Arm from DFROBOT on Labview Research Joural of Applied Scieces, Egieerig ad Techology 13(7): 569-575, 2016 DOI:10.19026/rjaset.13.3016 ISSN: 2040-7459; e-issn: 2040-7467 2016 Maxwell Scietific Publicatio Corp. Submitted: May 5, 2016

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor Iteratioal Joural of Computer Applicatios (97 8887) Volume 132 No.11, December21 Optimizatio of based CPU Schedulig Algorithms to Miimize Starvatio of Processes usig a Efficiecy Factor Muhammad A. Mustapha

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

New Analytical Model of Distributed Coordination Function

New Analytical Model of Distributed Coordination Function IJCSNS Iteratioal Joural of Comuter Sciece ad Netork Security, VOL.8 No.2, December 2008 25 Ne Aalytical Model of Distributed Coordiatio Fuctio Petr Kovar ad Novotý Vít, Bro Uiversity of Techology, Purkyova

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Counting Regions in the Plane and More 1

Counting Regions in the Plane and More 1 Coutig Regios i the Plae ad More 1 by Zvezdelia Stakova Berkeley Math Circle Itermediate I Group September 016 1. Overarchig Problem Problem 1 Regios i a Circle. The vertices of a polygos are arraged o

More information

Bluetooth Basics. Bluetooth Overview

Bluetooth Basics. Bluetooth Overview Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS NTER-CELL LOAD BALANCNG TECHNQUE FOR MULT-CLASS TRAFFC N MMO-LTE-A NETWORKS 1 T.PADMAPRYA, 2 V. SAMNADAN 1 Research Scholar, Podicherry Egieerig College 2 Professor, Departmet of ECE, Podicherry Egieerig

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree 1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information