CS644 Advanced Networks
|
|
- Garey Hawkins
- 6 years ago
- Views:
Transcription
1 Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot provide service differetiatio amog traffic aggregates Early efforts Teet group at Berkeley ATM IETF efforts Itegrated services iitiative Differetiated services iitiative Sprig Sprig So, what is required? Flow differetiatio Simple FIFO schedulig will ot work! Admissio cotrol Resource reservatio Flow specificatio Itegrated Services Iteret Ehace IP s service model Old model: sigle best-effort service class New model: multiple service classes, icludig best-effort ad QoS classes Create protocols ad algorithms to support ew service models Old model: o resource maagemet at IP level New model: explicit resource maagemet at IP level Key architecture differece Old model: stateless New model: per flow state maitaied at routers used for admissio cotrol ad schedulig set up by sigalig protocol Sprig Sprig
2 Itegrated Services Example Itegrated Services Example Achieve per-flow badwidth ad delay guaratees Example: guaratee 1MBps ad < 100 ms delay to a flow Receiver Seder Allocate resources - perform per-flow admissio cotrol Receiver Seder Sprig Sprig Itegrated Services Example Itegrated Services Example Seder Istall per-flow state Receiver Seder Istall per flow state Receiver Sprig Sprig
3 Itegrated Services Example: Data Path Per-flow classificatio Receiver Seder Itegrated Services Example: Data Path Seder Per-flow buffer maagemet Receiver Sprig Sprig Itegrated Services Example Per-flow schedulig How Thigs Fit Together Seder Receiver Routig Messages Routig RSVP Admissio Cotrol Cotrol Plae RSVP messages Data I Forwardig Table Route Lookup Per Flow QoS Table Classifier Scheduler Data Plae Data Out Sprig Sprig
4 Service Classes Service ca be viewed as a cotract betwee etwork ad commuicatio cliet ed-to-ed service other service scopes possible Three commo services best-effort ( elastic applicatios) hard real-time ( real-time applicatios) soft real-time ( tolerat applicatios) Hard Real Time: Guarateed Services Service cotract etwork to cliet: guaratee a determiistic upper boud o delay for each packet i a sessio cliet to etwork: the sessio does ot sed more tha it specifies Algorithm support admissio cotrol based o worst-case aalysis per flow classificatio/schedulig at routers Sprig Sprig Soft Real Time: Cotrolled Load Service Service cotract: etwork to cliet: similar performace as a uloaded besteffort etwork cliet to etwork: the sessio does ot sed more tha it specifies Algorithm Support admissio cotrol based o measuremet of aggregates schedulig for aggregate possible Role of RSVP i the Architecture Sigalig protocol for establishig per flow state Carry resource requests from hosts to routers Collect eeded iformatio from routers to hosts At each hop cosults admissio cotrol ad policy module sets up admissio state or iforms the requester of the failure Sprig RSVP Usage ad Related Issues 16
5 What is still Missig? Classificatio algorithm Schedulig algorithm Admissio cotrol algorithm QoS Routig algorithm Why did ItServ fail? Ecoomic factors Deploymet cost vs Beefit Is reservatio, the right approach? Multicast cetric view Is per-flow state maiteace a issue? What about QoS i geeral? Sprig Sprig What is the Problem? Goal: provide support for wide variety of applicatios: Iteractive TV, IP telephoy, o-lie gammig (distributed simulatios), VPNs, etc Problem: Best-effort caot do it (see previous lecture) Itserv ca support all these applicatios, but Too complex Not scalable Differetiated Services (Diffserv) Build aroud the cocept of domai Domai a cotiguous regio of etwork uder the same admiistrative owership Differetiate betwee edge ad core routers Edge routers Perform per aggregate shapig or policig Mark packets with a small umber of bits; each bit ecodig represets a class (subclass) Core routers Process packets based o packet markig Far more scalable tha Itserv, but provides weaker services Sprig Sprig
6 Diffserv Architecture Differetiated Service (DS) Field Igress routers Police/shape traffic Set Differetiated Service Code Poit (DSCP) i Diffserv (DS) field Core routers Implemet Per Hop Behavior (PHB) for each DSCP Process packets based o DSCP Igress DS-1 Egress Igress DS-2 Egress DS Filed Versio HLe TOS Legth Idetificatio Flags Fragmet offset TTL Protocol Header checksum Source address Destiatio address Data IP header Edge router Core router Sprig DS filed reuse the first 6 bits from the former Type of Service (TOS) byte The other two bits are proposed to be used by ECN Sprig Differetiated Services Two types of service Assured service Premium service Plus, best-effort service Assured Service [Clark & Wroclawski 97] Defied i terms of user profile, how much assured traffic is a user allowed to iject ito the etwork Network: provides a lower loss rate tha best-effort I case of cogestio best-effort packets are dropped first User: seds o more assured traffic tha its profile If it seds more, the excess traffic is coverted to besteffort Sprig Sprig
7 Assured Service Large spatial graularity service Theoretically, user profile is defied irrespective of destiatio All other services we leart are ed-to-ed, i.e., we kow destiatio(s) apriori This makes service very useful, but hard to provisio (why?) Traffic profile Igress Premium Service [Jacobso 97] Provides the abstractio of a virtual pipe betwee a igress ad a egress router Network: guaratees that premium packets are ot dropped ad they experiece low delay User: does ot sed more tha the size of the pipe If it seds more, excess traffic is delayed, ad dropped whe buffer overflows Sprig Sprig Cotrol Path Each domai is assiged a Badwidth Broker (BB) Usually, used to perform igress-egress badwidth allocatio BB is resposible to perform admissio cotrol i the etire domai BB ot easy to implemet Require complete kowledge about domai Sigle poit of failure, may be performace bottleeck Desigig BB still a research problem Example Achieve ed-to-ed badwidth guaratee seder 1 9 BB BB 5 BB 8 profile 6 profile 4 profile receiver Sprig Sprig
8 Compariso to Best-Effort ad Itserv Service Service scope Complexity Scalability Best-Effort Coectivity No isolatio No guaratees Ed-to-ed No setup Highly scalable (odes maitai oly routig state) Diffserv Per aggregate isolatio Per aggregate guaratee Domai Log term setup Scalable (edge routers maitais per aggregate state; core routers per class state) Itserv Per flow isolatio Per flow guaratee Ed-to-ed Per flow steup Not scalable (each router maitais per flow state) Summary Diffserv more scalable tha Itserv Edge routers maitai per aggregate state Core routers maitai state oly for a few traffic classes But, provides weaker services tha Itserv, e.g., Per aggregate badwidth guaratees (premium service) vs. per flow badwidth ad delay guaratees BB is ot a etirely solved problem Sigle poit of failure Hadle oly log term reservatios (hours, days) Sprig Sprig What is the Problem? Iteret has limited resources ad maagemet capabilities Proe to cogestio, ad deial of service Caot provide guaratees Existig solutios Stateless scalable ad robust, but weak etwork services Stateful powerful services, but much less scalable ad robust Stateless vs. Stateful Solutios Stateless solutios routers maitai o fie graied state about traffic + scalable, robust - weak services Stateful solutios routers maitai per-flow state + powerful services guarateed services + high resource utilizatio fie graied differetiatio Protectio - much less scalable ad robust Sprig Sprig
9 Existig Solutios QoS Network support for cogestio cotrol Teet [Ferrari & Verma 89] Itserv [Clark et al 91] ATM [late 80s] Stateful Roud Robi [Nagle 85] Fair Queueig [Demers et al 89] Flow Radom Early Drop (FRED) [Li & Morris 97] Diffserv - [Clark & DecBit [Ramkrisha & Jai 88] Stateless Wroclawski 97] - [Nichols et al 97] Radom Early Detectio (RED) [Floyd & Jacobso 93] BLUE [Feg et al 99] Questio Ca we achieve the best of two worlds, i.e., provide services implemeted by stateful etworks while maitaiig advatages of stateless architectures? Sprig Sprig Scalable Core (SCORE) A trusted ad cotiguous regio of etwork i which edge odes perform per flow maagemet core odes do ot perform per flow maagemet The Approach 1. Defie a referece stateful etwork that implemets the desired service 2. Emulate the fuctioality of the referece etwork i a SCORE etwork edge odes core odes edge odes Referece Stateful Network SCORE Network Sprig Sprig
10 The Idea Istead of havig core routers maitaiig per-flow state have packets carry per-flow state The Techique: Dyamic Packet State (DPS) Igress ode: compute ad isert flow state i packet s header Referece Stateful Network SCORE Network Sprig Sprig The Techique: Dyamic Packet State (DPS) Igress ode: compute ad isert flow state i packet s header The Techique: Dyamic Packet State (DPS) Core ode: process packet based o state it carries ad ode s state update both packet ad ode s state Sprig Sprig
11 The Techique: Dyamic Packet State (DPS) Egress ode: remove state from packet s header Why Guarateed Service Example? Illustrate power ad flexibility of our solutio guarateed service - strogest sematic service proposed i cotext of stateful etworks best-effort cogestio cotrol support differetiated services statistical services guarateed services worse service quality better Sprig Sprig Example: Guarateed Services Goal: provide per-flow delay ad badwidth guaratees How: emulate ideal model i which each flow traverses dedicated liks of capacity r Guarateed Services Defie referece etwork to implemet service cotrol path: per-flow admissio cotrol, reserve capacity r o each lik data path: eforce ideal model, by usig Jitter Virtual Clock (Jitter-VC) scheduler flow (reservatio = r ) r r r Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Per-hop packet service time = (packet legth) / r Sprig Referece Stateful Network Sprig
12 Guarateed Services Use DPS to elimiate per-flow state i core cotrol path: emulate per-flow admissio cotrol data path: emulate Jitter-VC by Core-Jitter Virtual Clock (CJVC) Data Path Ideal Model Jitter-VC Jitter-VC Jitter-VC Jitter-VC CJVC CJVC CJVC Stateful solutio: Jitter Virtual Clock Jitter-VC Jitter-VC Jitter-VC CJVC CJVC Stateless solutio: Core-Jitter Virtual Clock Referece Stateful Network CJVC SCORE Network Sprig Sprig Ideal Model: Example legth(p1) / r p1 arrival p2 arrival legth(p2) / r packet arrival time packet trasmissio time (service) i ideal model Sprig time Stateful Solutio: Jitter Virtual Clock (Jitter-VC) With each packet associate eligible time start time of servig packet i ideal model deadlie fiish time of servig packet i ideal model eligible times deadlies Sprig time
13 Jitter-VC Algorithm: schedule eligible packets i icreasig order of their deadlies Property: guaratees that all packets meet their deadlies deadlies Jitter-VC: Eligible Time Computatio Miimum betwee arrival time deadlie at previous ode + propagatio delay deadlie of previous packet eligible time = arrival time eligible times Sprig time eligible time = packet deadlie at previous ode Sprig time Jitter-VC: Eligible Time Computatio Miimum betwee arrival time deadlie at previous ode + propagatio delay deadlie of previous packet eligible time = arrival time Stateless Solutio: Core-Jitter Virtual Clock (CJVC) Goal: elimiate per-flow state elimiate depedecy o previous packet deadlie eligible time = packet deadlie at prev. ode eligible time = prev. packet deadlie usig previous packet s Sprig 2004 deadlie Ë per flow state51time Sprig time
14 Core-Jitter Virtual Clock (CJVC) Solutio: make eligible time greater or equal to previous packet deadlie Sprig time Core-Jitter Virtual Clock (CJVC) How: associate to each packet a slack variable s Delay eligible time at each ode by s eligible time = packet deadlie at prev. ode + s Sprig s time CJVC Properties Theorem: CJVC ad Jitter-VC provide the same edto-ed delay bouds s ca be computed at igress: depeds o curret ad previous packet eligible times (e ad e p ) curret ad previous packet legths (l p ad l) slack variable associated to previous packet (s p ) flow reservatio (r) umber of hops (h) computed at admissio time s = max 0, s p l + p l e + r p e + l h 1 / r Sprig p CJVC Algorithm Each packet carries i its header three variable slack variable s (computed ad iserted by igress) flow s reserved rate r (iserted by igress) ahead of schedule a (iserted by previous ode) Eligible time = arrival time + a + s Deadlie = eligible time + (packet legth) / r NOTE: usig a istead of the deadlie at previous ode Ë o eed for sychroized clocks Sprig
15 Jitter-VC: Core Router CJVC: Core Router Data path Per-flow classificatio Per-flow buffer maagemet Per-flow schedulig Cotrol path istall ad maitai per-flow state for data ad cotrol paths Classifier Per flowl State flow 1 flow 2 flow Buffer maagemet Scheduler Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per-flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler Sprig Sprig Cotrol Path: Admissio Cotrol Goal: reserve resources (badwidth) for each flow alog its path Approach: light-weight protocol that does ot require core odes to maitai per-flow state yes yes yes yes Per-hop Admissio Cotrol A ode admits a reservatio r, if C output lik capacity R = r i r C R i R aggregate reservatio: Need: maitai aggregate reservatio R Problem: it requires per flow state to hadle partial reservatio failures ad message loss Sprig Sprig
16 Solutio 1. Estimate aggregate reservatio R est 2. Accout for approximatios ad compute a upper boud R boud, i.e., R boud >= R 3. Use R boud, istead of R, to perform admissio cotrol, i.e., admit a reservatio r if r C R boud Estimatig Aggregate Reservatio (R est ) Observatio: If all flows were sedig at their reserved rates, computig R est is trivial: just measure the traffic throughput, e.g., R est = i S ( a, a+ T ) legth( i) T where S(a, a+t) cotais all packets of all flows received durig [a, a+t) R est 5 Mbps r = 1 2 Mbps r = 2 3Mbps Sprig Sprig Virtual Legth Problem: What if flows do ot sed at their reserved rates? Virtual Legth Problem: What if flows do ot sed at their reserved rates? Solutio: associate to each packet a virtual legth such that if legths of all packets of a flow were equal to their virtual legths, the flow seds at its reserved rate The, use virtual legths istead of actual packet legths to compute R est Sprig Sprig
17 Virtual Legth Defiitio: virtuallegth = r ( crt _ time prev _ time) r flow reserved rate crt_time trasmissio time of curret packet prev_time trasmissio time of previous packet Example: assume a flow with reservatio r = 1 Mbps sedig 1000 bit packets 1.9 ms 1.3 ms 1.2 ms legth Sprig virtual legth Estimatig Aggregate Reservatio (R est ) Use Dyamic Packet State (DPS) Igress ode: upo each packet departure computes the virtual legth ad iserts it i the packet header Core ode: Estimate R est o each output lik as R est = i S ( a, a+ T ) virtuallegth( i) T where S(a, a+t) cotais of all packets of all flows received durig [a, a+t) Sprig Aggregate Reservatio Estimatio: Discussio Core Router The estimatio algorithm is robust i presece of cotrol message loss ad duplicatio their effect is forgotte after oe estimatio iterval If o packet of a flow departs durig a predefied iterval (i.e., maximum iterdeparture time), igress ode geerates a dummy packet Utilizatio <= 1 f, where f = (max. iter-departure time) / (estimatio it.) e.g.: max. iter-departure time = 5s; estimatio it. = 30s Ë utilizatio <= 0.83 Sprig Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler Sprig
18 Core Router Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler o eed to maitai cosistecy of per-flow state Implemetatio: State Ecodig Problem: Where to isert the state? Possible solutios: betwee lik layer ad etwork layer headers as a IP optio (IP optio 23 allocated by IANA) fid room i IP header Sprig Sprig Implemetatio: State Ecodig Curret solutio 4 bits i DS field (belog to former TOS) 13 bits by reusig fragmet offset Ecodig techiques Take advatage of implicit depedecies betwee state values Temporal multiplexig: use oe field to ecode two states, if these states do ot eed to be simultaeously preseted i each packet Implemetatio FreeBSD Petium II 400 MHz ZNYX etwork cards 10/100 Mbps Etheret Fully implemets cotrol ad data path fuctioalities Maagemet ad moitorig ifrastructure Sprig Sprig
19 Moitorig Ifrastructure Light weight mechaism that allows cotiuous moitorig at packet level Implemetatio Record each packet (28 bytes) IP header ad port umbers arrival, departure or drop times Use raw IP to sed this iformatio to a moitorig site A Simple Experimet Three flows sharig a 10 Mbps lik Flow 1: 1 Mbps reservatio Flow 2: 3 Mbps reservatio with ON/OFF traffic Flow 3: best-effort UDP sedig at > 8 Mbps Moitorig machie aruba (igress) cozumel (core) Sprig Sprig Aggregate Reservatio Computatio 0.5 Mbps reservatio active durig etire iterval 0.5 Mbps reservatio startig at 18 sec; edig at 39 sec 1.2 Rate (Mbps) accept reservatio (0.5 Mbps) termiate reservatio (0.5 Mbps) Aggregate Time (sec) 35 Sprig 45 Sprig Rboud R
20 Coclusios SCORE ad DPS bridge the gap betwee stateless ad stateful solutios Key ideas Istead of core routers maitai per-flow state have packets carry this state Use state to coordiate edge ad core router actios Coclusios (cot d) SCORE architecture ca provide: Service guaratees Network support for cogestio cotrol Service differetiatio DPS compatible with Diffserv: ca greatly ehace the fuctioality while requirig miimal chages Referece Stateful Network SCORE Network Sprig Sprig
Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationTraffic Models and QoS
Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright
More informationTraditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]
Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table
More informationEE 122: Differentiated Services
What is the Problem? EE 122: Differentiated Services Ion Stoica Nov 18, 2002 Goal: provide support for wide variety of applications: - Interactive TV, IP telephony, on-line gamming (distributed simulations),
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationQoS Services with Dynamic Packet State
QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.
More informationSwitch Construction CS
Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationProblems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)
Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationn Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers
EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm
More informationMulti-Threading. Hyper-, Multi-, and Simultaneous Thread Execution
Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationA New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*
A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationOverview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service
Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Today s Topic: Vacatios Sa Fracisco Moterey
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationCMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago
CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW Prof. Yajig Li Uiversity of Chicago Admiistrative Stuff Lab2 due toight Exam I: covers lectures 1-9 Ope book, ope otes, close device
More informationCourse Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks
Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a
More informationGreedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling
Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationIntroduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationCMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationComputational Geometry
Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationTCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1
TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016
More informationOperating System Concepts. Operating System Concepts
Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the
More informationUnwanted Traffic: Denial of Service Attacks
CS 155 Uwated Traffic: Deial of Service Attacks Da Boeh 1 What is etwork DoS? Goal: take out a large site with little computig work How: Amplificatio Small umber of packets big effect Two types of amplificatio
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationPriority Queuing Technique Promoting Deadline Sensitive Data Transfers in Router based Heterogeneous Networks
Priority Queuig Techique Promotig Deadlie Sesitive Data Trasfers i Router based Heterogeeous Networks Jyothish K Joh 1 ad R.V.Siva Bala 2 1 Research Scholar at Noorul Islam Uiversity, Tamil Nadu, Idia.
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationTU Dortmund Chair Computer Science 3. BeeJamA. Honey Bee Inspired Traffic Jam Avoidance
TU Dortmud Chair Computer Sciece 3 Operatig Systems & System Architecture BeeJamA Hoey Bee pired Traffic Jam Avoidace Highly Dyamic ad Adaptive Traffic Cogestio Avoidace i Real-Time pired by Hoey Bee Behavior
More informationCMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,
More informationEECS 122, Lecture 24 Introduction to the Telephone Network. Kevin Fall Jean Walrand
EECS 122, Lecture 24 Itroductio to the Telephoe Network Kevi Fall kfall@cs.berkeley.edu Jea Walrad wlr@eecs.berkeley.edu Outlie Overview Cocepts Recet History Structure Hierarchical Addressig Ed Systems
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationNext generation IP- based multimedia services on cable TV networks
Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications
More informationL I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW
it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationInformation Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST
Iformatio Network 1 Trasport layer: TCP Youki Kadobayashi Doudou Fall NAIST Trasport layer: a birds-eye view Hosts maitai state for each trasport-layer edpoit Routers do t maitai per-host state H R R R
More informationOracle Server. What s New in this Release? Release Notes
Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationAn upper bound model for TCP and UDP throughput in IPv4 and IPv6
ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity
More informationGuaranteeing Hard Real Time End-to-End Communications Deadlines
Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationCourse Site: Copyright 2012, Elsevier Inc. All rights reserved.
Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationA Study on the Performance of Cholesky-Factorization using MPI
A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio
More informationRelay Placement Based on Divide-and-Conquer
Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationTHE deployment of router-based IP multicast has been
88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More informationPerformance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach
Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationWindows Server 2008 R2 networking
Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced
More informationIPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks
IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More informationPrivate Key Cryptography. TELE3119: Week2
Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More information