High Priority Traffic in HCF on Wireless Networks
|
|
- Lilian Elliott
- 6 years ago
- Views:
Transcription
1 High Priority Trffic in HC on Wireless Networks Mo Add, Amnd Pert, Gordon Erly School of Comuting, University of Portsmouth, Lion Terrce, Portsmouth, UK {mo.dd, mnd.ert, gordon.erly Abstrct In this er we nlysis nd comre the erformnce of the high riority trffic in HC using frgment-to-frgment cknowledgement nd block-frme cknowledgment in noisy wireless environment. We will roose mechnism for the block-frme cknowledgement tht will imlement on the IEEE stndrd to suort qulity of service, with no mjor uhevl. The nlysis is vlid for ll tye of trffics low, medium nd high riority clsses. Keywords Wireless Networks, WLAN, Hybrid Coordintion unction (HC), Enhnced Distributed Chnnel Access (EDCA), , Qulity of Service. 1 Introduction Industry hve doted the Internet Protocol (IP) stndrd to route dt over their cororte network, this enbles them to mintin single infrstructure, which in turn reduces their mintennce costs. The imlementtion of Wireless idelity (Wii) networking hs llowed users to ccess the cororte network whilst still mintining mobility. Alictions such s Voice over IP (VoIP) hs rimrily been used on wired networks, imlementing this on Wii network would give greter flexibility to the user. This tye of imlementtion would enble the cororte user to rom nd collect clls from the cororte telecoms network. The drwbck of wireless imlementtion is tht VoIP demnds good qulity of service (QoS) for it to chieve n ccetble level of erformnce for the end user. It is the tye of VoIP liction s discussed bove tht necessittes clssifiction of high riority network trffic roviding good QoS delivery. This er will nlysis nd comre the erformnce of the high riority trffic in noisy wireless environment emloying HC using frgment-to-frgment cknowledgement nd block-frme cknowledgment. A mechnism for the block-frme cknowledgement tht will be comtible with the IEEE stndrd [1] to suort qulity of service [2], with no mjor uhevl will be roosed. The nlysis is vlid for ll tye of trffics low, medium nd high riority clsses. 2 Nottions We refer to the size of the frme generted by the MAC-sub lyer rotocols s L (bits). We lso refer to the size of the frgment by (bits). The number of frgments trnsmitted consecutively is therefore L/. The trnsmission rte of the NIC (Network Interconnection Crd) is (bits/sec). The ositive cknowledgment ACK nd the
2 negtive cknowledgment NAC re of equl size. We lbel the number of bck off slots before trnsmission tkes lce by S. DIS = 34sec, SIS = 16sec, we roose nother inter-frme scing IIS (Immedite Interfrme scing) equls to the length of the time slot = 9sec. The length of the time slots = BS = 9sec. The length of the TC nd CLS re 34Bytes ech. The robbility tht frme will be corruted is clled, nd the robbility tht n cknowledgment or negtive cknowledgement will be corruted is clled q. In this nlysis we will consider single ho trnsmission, s shown in figure 1. DIS SIS T T f TS CLS ACK ACK ACK S igure 1: EDC rt of the HC, the MAC rotocol. The vlue of the DIS deends on the riority clsses. Tble 1, below shows the nottions re used to simlify the equtions of the efficiency for ech scheme. T b = S*BS = 9S (bck off time) T = DIS + TS/ + CLS/ + 2*SIS (Protocol time) T = 2*SIS + ACK/ (Acknowledgment time) T = IIS+ SIS + NAC/ Tble 1. Nottions used to simlify equtions of the efficiency for ech scheme The robbility tht k retrnsmissions re required fter frgment is corruted is define s Prob = k-1 (1-). The exected number of retrnsmissions would be 1/(1-). The robbility tht k negtive cknowledgement retrnsmissions re required fter frgment is corruted is define s Prob =.q k-1 (1-q). The exected number of cknowledgements retrnsmitted would be /(1-q). 3 rgment-by-rgment Acknowledgment As shown in figure 2, the IEEE stndrd, for the relibility ech frgment is cknowledged. If frgment is corruted negtive cknowledge is send bck. In the cse where, the negtive cknowledge is lost, the sender times out nd retrnsmit the frgment. We ssume tht the length of the time out eriod is equl to the cknowledgment time T. Other ossibilities cn be considered. ACK ACK x NAC x NAC x NAC x NAC x ACK ACK v NAC v+1 NAC v+2 NAC v+3 NAC v+4 NAC v+5 NAC v+6 NAC v+7 NAC v ACK ACK igure 2: Trnsmission of sequence of rgments with Errors
3 After k retrnsmissions, when the frgment is corruted, there hve been /(1-) retril eriods of (T + /). After k retrnsmissions, when the negtive cknowledge hs been corruted, there hve been /(1-q)*(T + /). Therefore the efficiency of would be (1): E 1 T T L T b 1 ( T )( 1 q 1 ) (1) 4 Block-rme Acknowledgment An cknowledgement is sent when ll the frgments generted from the sme frme hve been received. rom the IEEE stndrd, ech frgment hs sequence number nd flg indicting the end of the trnsmission. We suggest tht in this cse when frgment is corruted negtive cknowledgment is generted fter frme sce clled IIS, which is less thn the SIS the sce of the cknowledgment, s shown in figure 3. After k retrnsmissions, when the frgment is corruted, there hve been /(1-) retril eriods of (T + /). After k retrnsmissions, when the negtive cknowledge hs been corruted, there hve been /(1-q)*(T + /). The sender receives the corruted negtive cknowledgment s noise, it wits until the chnnel is cler, then fter SIS it trnsmits next frgment, unwre of the revious unsuccessful trnsmission. x NAC x NAC x NAC x NAC x v NAC v+1 NAC v+2 NAC v+3 NAC v+4 NAC v+5 NAC v+6 NAC v+7 NAC v ACK igure 3: Block rme Acknowledgement with Sequence of Corruted rgments. The efficiency of would thn be (2). E 1 T L L * SIS *( ) L * L 1 T T b ( T ' )( 1 q 1 ) (2) 5 esults igures 4,5 nd 6 demonstrte grhiclly the results of the efficiency roosed. The efficiency ercentge for non-frgmented (), rgment-by-rgment ACK (/-A), nd Block rme ACK (B/-A) for noiseless chnnel (=q=0), s function of the frme length is shown in figure 4. The noiseless chnnel rmeter is (=.5, q=0), s
4 E E function of the frme length in figure 5. Here you cn see tht there is miniml effect on rgment-by-rgment ACK (/-A), nd Block rme ACK (B/-A) but there is significnt imct on the efficiency on the non-frgmented frme. The grh in figure 6 increses the robbility tht negtive cknowledgement will be corrut t 0.5 on the noiseless chnnel. Here, there is slight imrovement of the efficiency of the nonfrgmented frme. 512 rme (Bytes) /-A B/-A igure 4: The efficiency (%) for Non-frgmented (), rgment-by-rgment ACK (/-A), nd Block rme ACK (B/-A) for noiseless chnnel (=q=0), s function of the frme length rme (Bytes) /-A B/-A igure 5: The efficiency (%) for Non-frgmented (), rgment-by-rgment ACK (/-A), nd Block rme ACK (B/-A) for noiseless chnnel (=.5, q=0), s function of the frme length.
5 512 E /-A B/-A rme (Bytes) igure 6: The efficiency (%) for Non-frgmented (), rgment-by-rgment ACK (/-A), nd Block rme ACK (B/-A) for noiseless chnnel (=.5, q=0.5), s function of the frme length. 6 uture work We will consider n intelligent sender tht will use the noise from the negtive cknowledgments s indiction to wrong trnsmission. The receiver will hve to send negtive cknowledgment to overcome dulictions. The sender hs time out mechnism to retrnsmit non-cknowledged frgments. We believe tht this will imrove eqution 2 further. We will lso look t the imct of multi-hos on the efficiency of the roosed scheme. eferences [1] IEEE Drft Std e, Medium Access Control (MAC) Enhncements for Quilty of Service (QoS), D4.4, June 2003 [2] Anstsi, G., Lenzini, L., QoS rovided by the IEEE wireless LAN to dvnced dt liction: simultion nlysis. Wireless Networks, (6): ,2000.
A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks
A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding
More informationPerformance enhancement of IEEE DCF using novel backoff algorithm
Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm
More informationChapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:
Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl
More informationPage. Harsh Reality. Dynamic Memory Allocation. Malloc Package. Process Memory Image. Assumptions. Malloc Example
Hrsh Relity Memory Mtters Memory is not unbounded It must be llocted nd mnged 1 Mny lictions re memory dominted Esecilly those bsed on comlex, grh lgorithms Memory referencing bugs esecilly ernicious Effects
More informationOn the Interactions between Non-Cooperative P2P Overlay and Traffic Engineering Behaviors
On the Interctions between Non-Cooertive P2P Overly nd Trffic Engineering Behviors Chojiong Wng, Ning Wng, Michel Howrth University of Surrey Guildford, United Kingdom {C.Wng, N.Wng, M.Howrth}@surrey.c.uk
More information1 The Definite Integral
The Definite Integrl Definition. Let f be function defined on the intervl [, b] where
More informationLCI/USB LonWorks Commissioning Interface
Works Commissioning Interfce Importnt: Retin these instructions CONTENTS 1 Unpcking... 1 2 Storing... 1 3 Instlltion... 1 4 Uninstlling the USB Drivers... 8 5 Disposl... 8 1 UNPACKING Instlltion Instructions
More informationMIPS I/O and Interrupt
MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPerformance analysis of QoS mechanisms in IP networks
University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationEXPONENTIAL & POWER GRAPHS
Eponentil & Power Grphs EXPONENTIAL & POWER GRAPHS www.mthletics.com.u Eponentil EXPONENTIAL & Power & Grphs POWER GRAPHS These re grphs which result from equtions tht re not liner or qudrtic. The eponentil
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationL. Yaroslavsky. Fundamentals of Digital Image Processing. Course
L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationHyperbolas. Definition of Hyperbola
CHAT Pre-Clculus Hyperols The third type of conic is clled hyperol. For n ellipse, the sum of the distnces from the foci nd point on the ellipse is fixed numer. For hyperol, the difference of the distnces
More informationDesign and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding
Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg
More informationExam #1 for Computer Simulation Spring 2005
Exm # for Computer Simultion Spring 005 >>> SOLUTION
More informationAddress/Data Control. Port latch. Multiplexer
4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More information)
Chpter Five /SOLUTIONS Since the speed ws between nd mph during this five minute period, the fuel efficienc during this period is between 5 mpg nd 8 mpg. So the fuel used during this period is between
More informationLists in Lisp and Scheme
Lists in Lisp nd Scheme Lists in Lisp nd Scheme Lists re Lisp s fundmentl dt structures, ut there re others Arrys, chrcters, strings, etc. Common Lisp hs moved on from eing merely LISt Processor However,
More informationClass-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts
Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationUninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012
1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt
More informationMATH 2530: WORKSHEET 7. x 2 y dz dy dx =
MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl
More informationGraphing Conic Sections
Grphing Conic Sections Definition of Circle Set of ll points in plne tht re n equl distnce, clled the rdius, from fixed point in tht plne, clled the center. Grphing Circle (x h) 2 + (y k) 2 = r 2 where
More informationCS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2014
CS DIGITAL LOGIC & STATE MACHINE DESIGN SPRING DUE : April 7, HOMEWOR V READ : Relted portions of Chpters III, IV, VI, VII nd VIII ASSIGNMENT : There re seven questions Solve ll homework nd exm problems
More informationMTH 146 Conics Supplement
105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationThe Structure of Forward, Reverse, and Transverse Path Graphs in The Pattern Recognition Algorithms of Sellers
The Structure of Forwrd, Reverse, nd Trnsverse Pth Grhs in The Pttern Recognition Algorithms of Sellers Lewis Lsser Dertment of Mthemtics nd Comuter Science York College/CUNY Jmic, New York 11451 llsser@york.cuny.edu
More informationBonded Internet. Architecture Examples for Replacing or Enhancing Customer MPLS Networks
Bonded Internet Architecture Exmples for Replcing or Enhncing Customer MPLS Networks Bonded Internet Ensuring business customers hve: Fst, Relible, nd Secure ccess to their Cloud pplictions nd services
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationEECS 281: Homework #4 Due: Thursday, October 7, 2004
EECS 28: Homework #4 Due: Thursdy, October 7, 24 Nme: Emil:. Convert the 24-bit number x44243 to mime bse64: QUJD First, set is to brek 8-bit blocks into 6-bit blocks, nd then convert: x44243 b b 6 2 9
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationIZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI
IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER
More informationSection 3.1: Sequences and Series
Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one
More informationRouters implementations
Routers implementtions Switching Technology S38.65 http://www.netlb.hut.fi/opetus/s3865 L - Router implementtions Generl of routers Functions of n IP router Router rchitectures Introduction to routing
More informationThe Fundamental Theorem of Calculus
MATH 6 The Fundmentl Theorem of Clculus The Fundmentl Theorem of Clculus (FTC) gives method of finding the signed re etween the grph of f nd the x-xis on the intervl [, ]. The theorem is: FTC: If f is
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationPhysics 208: Electricity and Magnetism Exam 1, Secs Feb IMPORTANT. Read these directions carefully:
Physics 208: Electricity nd Mgnetism Exm 1, Secs. 506 510 11 Feb. 2004 Instructor: Dr. George R. Welch, 415 Engineering-Physics, 845-7737 Print your nme netly: Lst nme: First nme: Sign your nme: Plese
More informationIST 220: Ch3-Transport Layer
ST 220: Ch3-Trns Lyer Abdullh Konk School of nformtion Sciences nd Technology Penn Stte Berks Lerning Objectives. Understnd position of trns lyer in nternet model. Understnd rtionle for extence of trns
More informationStep-Voltage Regulator Model Test System
IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node
More information9.1 apply the distance and midpoint formulas
9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationArticle Data Dissemination in Mobile Social Networks With the Acknowledgment Feedback
Article Dt Dissemintion in Mobile Socil Networks With the Acknowledgment Feedbck Ning Wng 1 nd Jie Wu 1 Received: dte ; Accepted: dte ; Published: dte Acdemic Editor: nme 1 Deprtment of Computer nd Informtion
More informationPNC NC code PROGRAMMER'S MANUAL
PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationSubtracting Fractions
Lerning Enhncement Tem Model Answers: Adding nd Subtrcting Frctions Adding nd Subtrcting Frctions study guide. When the frctions both hve the sme denomintor (bottom) you cn do them using just simple dding
More information9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association
9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationFall 2018 Midterm 2 November 15, 2018
Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or
More informationSUPPLEMENTARY INFORMATION
Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock
More informationUT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationCopyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for
Coyright (C) 1997, 1998 by the Assocition for Comuting Mchinery, Inc. Permission to mke digitl or hrd coies of rt or ll of this work for ersonl or clssroom use is grnted without fee rovided tht coies re
More informationCOMPUTATIONAL INTELLIGENCE
COMPUTATIONAL INTELLIGENCE LABORATORY CLASSES Immentton smplstc verson of the network for some nference resons Adrn Horzyk IMPLEMENTATION OF THE SIMPLISTIC OR AANG Imment the smplstc verson of n structure
More informationTilt-Sensing with Kionix MEMS Accelerometers
Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationIntroduction to Integration
Introduction to Integrtion Definite integrls of piecewise constnt functions A constnt function is function of the form Integrtion is two things t the sme time: A form of summtion. The opposite of differentition.
More informationCPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls
Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationEpson Projector Content Manager Operation Guide
Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationTCP/ICN: Carrying TCP over Content Centric and Named Data Networks
TCP/ICN: Crrying TCP over Content Centric nd Nmed Dt Networks Ily Moiseenko Cisco Systems Dve Orn Cisco Systems Outline I. Introduction II. Design Bsic fetching proxy Relible prefetching proxy Unrelible
More informationc360 Add-On Solutions
c360 Add-On Solutions Functionlity Dynmics CRM 2011 c360 Record Editor Reltionship Explorer Multi-Field Serch Alerts Console c360 Core Productivity Pck "Does your tem resist using CRM becuse updting dt
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationStudy Guide for Exam 3
Mth 05 Elementry Algebr Fll 00 Study Guide for Em Em is scheduled for Thursdy, November 8 th nd ill cover chpters 5 nd. You my use "5" note crd (both sides) nd scientific clcultor. You re epected to no
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More informationMatrices and Systems of Equations
Mtrices Mtrices nd Sstems of Equtions A mtri is rectngulr rr of rel numbers. CHAT Pre-Clculus Section 8. m m m............ n n n mn We will use the double subscript nottion for ech element of the mtri.
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More information1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?
1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationExample: 2:1 Multiplexer
Exmple: 2:1 Multiplexer Exmple #1 reg ; lwys @( or or s) egin if (s == 1') egin = ; else egin = ; 1 s B. Bs 114 Exmple: 2:1 Multiplexer Exmple #2 Normlly lwys include egin nd sttements even though they
More informationOutdoor IEEE Cellular Networks: MAC Protocol Design and Performance
Outoor IEEE 802.11 Cellulr Networks: MAC Protocol Design n Performnce Kin K. eung, Bruce McNir, eonr J. Cimini, Jr., n Jck H. Winters AT&T bs - Reserch Miletown, NJ 07748 Abstrct We explore the fesibility
More informationClamping Systems. RotoClamp/DiskClamp. RotoClamp Inside. RotoClamp Outside. DiskClamp. Gewährleistung. Inhalt. RotoClamp. DiskClamp. LinClamp.
/ Clming Systems Gewährleistung Inhlt 0 Inside Outside / dvntges 1 Pneumtic clming with high forces 2 Sfety clming Stndrd If the ir suly fils then system clms 07 3 The vlues of hydrulic clming re reched
More informationMid-term exam. Scores. Fall term 2012 KAIST EE209 Programming Structures for EE. Thursday Oct 25, Student's name: Student ID:
Fll term 2012 KAIST EE209 Progrmming Structures for EE Mid-term exm Thursdy Oct 25, 2012 Student's nme: Student ID: The exm is closed book nd notes. Red the questions crefully nd focus your nswers on wht
More informationII. THE ALGORITHM. A. Depth Map Processing
Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A
More informationCS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08
CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008
More informationSelf-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices
More informationName Date Class. cot. tan. cos. 1 cot 2 csc 2
Fundmentl Trigonometric Identities To prove trigonometric identit, use the fundmentl identities to mke one side of the eqution resemle the other side. Reciprocl nd Rtio Identities csc sec sin cos Negtive-Angle
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationthis grammar generates the following language: Because this symbol will also be used in a later step, it receives the
LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.
More informationAVolumePreservingMapfromCubetoOctahedron
Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online
More information