Performance Analysis of IEEE MAC Protocol with Different ACK Polices

Size: px
Start display at page:

Download "Performance Analysis of IEEE MAC Protocol with Different ACK Polices"

Transcription

1 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics S. Mhta and K.S. Kwak Wirlss Communications Rsarch Cntr, Inha Univrsity, Kora Abstract. h wirlss prsonal ara ntwork (WPAN is an mrging wirlss tchnology for futur short rang indoor and outdoor communication applications. h IEEE mdium accss control (MAC is proposd, spcially, for short rang high data rats applications, to coordinat th accss to th wirlss mdium among th compting dvics. his papr uss analytical modl to study th prformanc analysis of WPAN (IEEE MAC in trms of throughput, fficint bandwidth utilization, and dlay with various acknowldgmnt schms undr diffrnt paramtrs. Also, som important obsrvations ar obtaind, which can b vry usful to th protocol architcturs. Finally, w com up with som important rsarch issus to furthr invstigat th possibl improvmnts in th WPAN MAC. Kywords: Analytical Modling, Prformanc Analysis, MAC Protocol, IEEE Introduction h IEEE standard MAC layr [1] is basd on a cntralizd, connction orintd topology which divids a larg ntwork into svral smallr ons trmd piconts. A picont consists of a Picont Ntwork Controllr (PNC and DEVs (DEVics. h DEV is dsignd to b low powr and low cost. On DEV is rquird to prform th rol of PNC (Picont Coordinator, which provids th basic timing for th picont as wll as othr picont managmnt functions, such as powr managmnt, Quality of Srvic (QoS schduling, scurity, and so on. h standard also allows for th formation of child piconts and nighbor piconts. h original picont is calld th parnt picont and th child/nighbor piconts ar calld th dpndnt piconts. hs piconts diffr in th way thy associat thmslvs to th parnt picont. IEEE standard supports multipl powr saving mods and multipl acknowldgmnt ( policis (NO, Imm-, and Dly-,. It is vry robust and supports coxistnc with th othr WLAN tchnologis such as IEEE In IEEE MAC protocol, although communications ar connction basd undr th control of th PNC, connctions and data transfr can b mad with pr to pr connctions. In IEEE MAC protocol, th channl tim is dividd into suprframs, which ach suprfram bginning with a bacon. h suprfram is composd of th thr major parts: th bacon, th optional contntion accss J. Wozniak t al. (Eds.: WMNC 9, IFIP AIC 38, pp , 9. IFIP Intrnational Fdration for Information Procssing 9

2 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics 141 priod (CAP, and th channl tim allocation priod (P or channl allocation tim (. Wirlss channl is usually vulnrabl to rrors. Error control mchanisms should b dsignd in MAC protocol to provid a crtin lvl of rliability for th highr ntwork layrs. In accordanc with that, IEEE dfins thr typs of acknowldgmnt mchanisms for s: th No-, Imm-, and Dly- mchanisms. For th Imm- and Dly- mchanisms, rtransmission is adoptd to rcovr corruptd frams in prvious transmissions. For th No- mchanism, is not snt aftr a rcption. In th Imm- mchanism, ach fram is individually d following th rcption of th fram. h Dly- mchanism allows th sourc to snd multipl frams without waiting for individual s. Instad, th s of th individual frams ar groupd into a singl rspons fram to b snt to th sourc DEV. In [2] and som othr litratur proposd implid-acknowldgmnt (Imp- for bidirctional communication. Implid acknowldgmnt (Imp- prmits a to b usd bi-dirctionally within a limitd scop. Implid policy is not allowd in th CAP to avoid ambiguitis btwn a fram that is transmittd in rspons to a fram with an implid rqust and a fram that is transmittd indpndntly whn th original fram was missd. o rduc th ovrhad of th IEEE MAC, w combin th fram aggrgation concpt [3] and Dly- mchanism with diffrnt burst sizs, and w dfin this nw mchanism as Dly--AGG. h ida of fram aggrgation is to aggrgat multipl MAC frams into a singl (or approximatly singl transmission. All ths policis hav a larg impact on th throughput, dlay, and channl utilization of th ntwork and rquird a dtaild study to find ovrall prformanc of th ntwork. In this papr, w prsnt th prformanc analysis of IEEE from protocol architctur s point of viw. Furthrmor, w show th ffct of aggrgation with Dly-, i.. Dly--AGG, on th ntwork prformanc. 2 Rlatd Works o th bst of our knowldg, thr is littl work on th prformanc or channl analysis of IEEE MAC with rspct to diffrnt policis, undr diffrnt paramtrs. Howvr, a larg amount of litratur is availabl on IEEE MAC schduling, optimization of suprfram siz, various traffic analyss and so on. Som of th important rlatd works ar as follow. In [4] authors, prsnts th implmntation of IEEE modul in ns-2 and discuss various xprimntal scnario rsults including various schduling tchniqus. Spcially, to invstigat th prformanc of ral-tim and bst-ffort traffic with various supr fram lngths and diffrnt policis. In [5] authors, prsnts a novl sharing protocol, calld VBR-M that nabls th sharing of s blonging to strams with th sam group idntity. his fatur allows th proposd protocol to xploit th statistical charactristics of variabl bit rat (VBR strams by giving unusd tim units to a flow that rquirs pak rat allocation. And thy prsnts two optimizations to VBR-M, namly VBR-Blind and VBR-oknBus, as wll. In [6, 7], th authors proposd an adaptiv Dly- schm for both CP and UDP traffic. h first on is to rqust th Dly- fram adaptivly or chang th

3 142 S. Mhta and K.S. Kwak burst siz of Dly- according to th transmittr quu status. h scond is a rtransmission countr to nabl th dstination DEV to dlivr th MAC data frams to uppr layr timly and ordrly. Whil latr is mor focusd on optimization of channl capacity. Both paprs laid a good foundation in simulation and analytical works of IEEE MAC protocol. Similarly, in [8] authors, formulat a throughput optimization problm undr rror channl condition and driv a closd form solution for th optimal throughput. h work prsntd in [8] is clos to our work but thir analysis scop is limitd only in trms of throughput analysis. Whil our work span covrs th dlay, throughput, and channl utilization with diffrnt policis undr fram aggrgation and rror channl condition. h papr is outlind as follows. In sction 3 w prsnt th prformanc analysis from protocol architctur s point of viw and finally, conclusions and futur work ar drawn in sction 4. 3 Prformanc Analysis of IEEE MAC Protocol In this sction, w prsnt th prformanc analysis of IEEE MAC to answr svral qustions lik optimization of payload, optimization of policis, ffct of aggrgation tc., undr various paramtrs. 3.1 Analytical Modl W us ground works of Bianchis s modl [9] and [8] to prsnt our analysis work. W divid our analysis in two parts; analysis and CAP analysis. abl 1 shows th notations that w usd for th analytical modl. abl 1. Paramtrs notations Short Intr Fram Spac (SIFS tim SIFS Distributd Coordinat Function Intr Fram Spac (DIFS DIFS tim Minimum Intr Fram Spac (MIFS tim MIFS CW Minimum back-off window siz min ransmission tim of th physical prambl pr. ransmission tim of th PHY hadr PHY L MAC ovrhad in byts MAC H L siz in byts L Payload siz in byts Data ransmission tim of MAC ovrhad MAC H transmission tim ransmission tim for th payload Data f h tim for a transmission considrd faild during CAP CAP s h tim for a transmission considrd succssful during CAP CAP f h tim for a transmission considrd faild during CA s h tim for a transmission considrd succssful during CA h tim-out valu waiting for an O h Normalizd throughput during a CAP tim CAP h Normalizd throughput during a tim n Burst siz in packts burst

4 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics 143 h throughput is givn by ransmittd Data h = (1 ransmission Cycl Duration W assum a Gaussian wirlss channl modl. h channl bit rror rat (BER, dnotd as p ( < p < 1, can b calculatd via prvious frams or som othr mchanism. How to obtain p is way out of th scop of this papr. From [9], a fram with a lngth L in bits, th probability that th fram is succssfully transmittd can b calculatd as p s = (1 p L (2 Hr, for th simplicity w assum that a data fram is considrd to b succssfully transmittd if both data fram and ar succssfully transmittd in diffrnt mchanism policis. W us Imm_, No_, D_, and D_AGG_ to dnot th immdiat acknowldgmnt, No acknowldgmnt, dlay acknowldgmnt, and dlay acknowldgmnt with aggrgation, rspctivly. hn w can dfin p for diffrnt mchanisms as follows s p, Imm_=(1 p s ( LData + LMAC H + L Imm *8 ( L + L *8 p Data MAC H,No_=(1 p s p,dly_=(1 p s ( L + L + L *8 Data MAC H Dly (3 p,dly_-agg=(1 p s ( L + L + L + L *8 Data MAC H MAC Hs Dly A succssful transmission tim during a is givn by 1 s = ( + MIFS Data MAC H pr PHY ( 2* + 2* SIFS Data MAC H pr PHY MAC PHY Imm ( ( + MIFS Data MAC H pr PHY SIFS MAC PHY Dly pr ( K * + 2* forno forimm K fordly Data for Dly AGG MAC H MAC HS pr PHY SIFS MAC PHY Dly AGG (4 1 Radrs ar advic to hav a look at tabl 1 whil rfrring quations as w couldn t xplain vry paramtr du to spac limitation.

5 144 S. Mhta and K.S. Kwak from (2, (3 and (4 th normalizd throughput during a is givn by h ps, No _ LData*8 for No s ps, Imm_ LData*8 for Imm s = ps, Dly_ KLData*8 for Dly s ps, Dly_ AGGKLData*8 for Dly AGG s o dmonstrat th ffct of n-dly- and n-dly--agg on bandwidth utilization, w dfin a mtric namd maximum ffctiv bandwidth (MEB basd on [1], which is a fraction of tim th channl is usd to succssfully transmit data frams vrsus th total channl tim. h maximum ffctiv bandwidth utilization during a /CAP slot is givn by MEB MEB CAP LData ps, Dly_ nburst. fordly s = LData ps, Dly_ AGG nburst. for Dly AGG s n 1 LData nψ(1 ψ ps,dly_, nburst. fordly scap = n 1 LData nψ(1 ψ ps, Dly_ AGG nburst. fordly AGG scap During th CAP, w us th analytical modl similar with CSMA/CA mchanism of IEEE Also, w study how to optimiz th channl throughput using diffrnt policis undr rror channl condition. Whn th Imm- mchanism is usd in CAP, ach nod adopts CSMA/CA with binary xponntial backoff. Whn NO- mchanism is usd, ach nod will us a fixd backoff window as it has no knowldg whthr or not th transmittd data fram is succssfully rcivd. If th Dly- mchanism is usd, as long as th backoff timr of a nod rachs zro, th nod will first snd a numbr (K of data frams ach sparatd by an MIFS and a dlay-rqust fram sparatd by an MIFS, and wait for th. If a burst transmission (of K data frams is considrd succssful, th sndr will rst th backoff window to th initial valu; othrwis, th backoff window will b doubld. Dly--AGG follows th (5 (6

6 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics 145 sam backoff procdur as Dly-. From [9], th failur probability of a transmission during a CAP is givn by 1 (1 p ps, Imm_ forimm_ pf = 1 (1 p ps, Dly_, fordly_ 1 (1 p ps, Dly _ AGG, for Dly _ AGG For n numbr of stations, th probability of a transmittd fram collision is givn by p ψ (7 1 = 1 (1 n (8 ψ, probability of a station to transmit during a gnric slot tim is also dpnds on numbr of rtry limit. hn, th probability of th busy channl is givn by pb = 1 (1 ψ n (9 From (8 and (9, th probability of a succss transmission occurs in a slot tim is givn by n 1 n ψ(1 ψ p s, No _, forno n 1 nψ(1 ψ ps, Imm _, forimm _ ps = n 1 nψ(1 ψ ps, Dly_, fordly_ n 1 nψ(1 ψ ps, Dly_ AGG, fordly_ AGG A succssful transmission tim during a CAP is givn by scap = ( + MIFS Data MAC H pr PHY ( 2* + 2* SIFS Data MAC H pr PHY MAC PHY Imm ( ( + MIFS Data MAC H pr PHY SIFS MAC PHY Dly pr ( * 2* Data MAC H MAC HS pr PHY SIFS MAC PHY Dly AGG CW for No CW for Imm CW+ K fordly AC K CW+ K fordly AGG (1 (11 whr CW rprsnts th avrag back-off tim. h avrag back-off dfins th back-off duration for light loadd ntworks, i.. whn ach station has accss to th channl aftr th first back-off attmpt and is givn by CW. min slot CW = (12 2

7 146 S. Mhta and K.S. Kwak A failur transmission tim during a is givn by f = ( + MIFS Data MAC H pr PHY ( + SIFS Data MAC H pr PHY o ( ( + MIFS Data MAC H pr PHY o SIFS ( * forno forimm K fordly K fordly AGG Data MAC H MAC HS pr PHY o SIFS from (1, (11, and (13, th normalizd throughput during a CAP is givn by h CAP PL S Data*8 (1 p δ + P + ( p P PL S Data*8 (1 p δ + P + ( p P = PKL S Data*8 (1 p δ + P + ( p P PKL S Data*8 (1 p δ + P + ( p P b S s CAP b S f CAP b S s CAP b S f CAP b S s CAP b S f CAP b S s CAP b S f CAP for No for No for Dly for Dly AGG from (1, w can also calculat th avrag accss dlay during a /CAP. (13 ( Prformanc Evaluation For th prformanc valuation, w adopt th following paramtrs from [11] as shown in tabl 2. Paramtrs SIFS MIFS Prambl and PLCP Hadr abl 2. Paramtrs valus Valus 2.5 usc 1 usc 9 usc CW min 8 Payload Siz Policy Data Rat Control Signal Rat 1~5 KB 3 basic +Dly--AGG policis 1~2 Gbps 48 Mbps Analysis Figurs 1 and 2 show th normalizd throughput for diffrnt payload sizs with diffrnt polics with and without aggrgation, rspctivly. W assum an idal channl conditions for ths rsults. Hr, w can obsrv that No- givs th

8 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics 147 suprior rsults as most of th tim is utilizd for data transfr. Howvr, No- policy is not suitabl for vry application and channl condition. h Dly-- AGG policy can achiv somwhat clos rsults to No- policy, as it rducs th unncssary intr-fram tim as wll as th hadr siz. Figurs 1 and 2 giv us th normalizd valu of throughput at diffrnt payload sizs but can t answr for optimum payload siz. So, w produc th sam rsults with Gaussian wirlss channl modl with a givn BER rat. Diffrnt schms without aggrgation Mthod Diffrnt schms with aggrgation mthod hroughput (Mbps hroughput (No--1 Gbps hroughput (Imm--1 Gbps hroughput (2-Dly--1 Gbps hroughput (4-Dly--2 Gbps hroughput (No--2 Gbps hroughput (Imm--2 Gbps hroughput (2-Dly--2 Gbps hroughput (4-Dly--2 Gbps Data Packt Payload (KB Fig. 1. hroughput vrsus payload siz with diffrnt policis hroughput (Mbps hroughput ( No- 1 Gbps hroughput ( 2-Dly- 1 Gbps hroughput ( 4-Dly- 1 Gbps hroughput ( No- 2 Gbps hroughput ( 2-Dly- 2 Gbps hroughput ( 4-Dly- 2 Gbps Data Packt Payload (KB Fig. 2. hroughput vrsus payload siz with diffrnt policis hroughput (Mbps Diffrnt Schms without aggrgation Mthod (BER=.2 hroughput (No--1Gbps hroughput (Imm--1Gbps hroughput (2-Dly--1Gbps hroughput (4-Dly--1Gbps hroughput (No--2Gbps hroughput (Imm--2Gbps hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps Data Packt Payload (KB Fig. 3. hroughput vrsus payload siz with diffrnt policis hroughput (Mbps Diffrnt Schms with aggrgation Mthod (BER=.2 18 hroughput (No--1Gbps hroughput (2-Dly--1Gbps hroughput (4-Dly--1Gbps hroughput (No--2Gbps hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps Data Packt Payload (KB Fig. 4. hroughput vrsus payload siz with diffrnt policis Figurs 3 and 4 show th throughput for diffrnt payload sizs undr a givn BER valu. It can b sn that an optimal payload siz xists for a givn BER valu. As shown in th mntiond figurs th throughput first incrass, and thn dcrass with incrasing payload siz (vn with th aggrgation in rror pron channls. his is bcaus without th protction of FCS in individual payload fram, a singl bit rror may corrupt th whol fram which will wast lots of mdium tim usag and countract th fficincy producd by an incrasd payload siz. Figur 5 shows th normalizd throughput for diffrnt BER valus with diffrnt policis whn payload siz is st to 1KB. As th BER valu incrass th throughput dcrass. h No-

9 148 S. Mhta and K.S. Kwak policy with aggrgation has largr throughput ovr larg rang of BER valus than any othr policis. o find th ffct of n-dly- on bandwidth utilization as wll as to find th optimal valu of burst siz for n-dly- policy, w dfin th MEB mtric in (6. Figurs 6 and 7 show th MEB with diffrnt burst valus undr a givn BER valu. From ths figur w can obsrv that burst siz = 4 givs good rsults in fairly all givn payload valus. Figur 8 shows th accss dlay prformanc for diffrnt burst sizs with th aggrgation mthod. Hr, w only analyzd n-dly-- AGG policy to gt th uppr bound on th dlay prformanc Gbps and Payload=1KB No- ( Without Aggrgation Imm- 2-Dly- ( Without Aggrgation 4-Dly- ( Without Aggrgation No- (With Aggrgation.25.2 Without aggrgation mthod (BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps 2-Dly- ( With Aggrgation hroughput Dly- ( With Aggrgation MEB BER Burst Siz n Fig. 5. hroughput vrsus BER valu with diffrnt policis Fig. 6. MEB vrsus burst siz With aggrgation mthod (BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps (Data Rat=1Gbps, BER=, n-dly- Payload = 1KB Payload = 2KB Payload = 3KB Payload = 4KB Payload = 5KB MEB.2.15 Dlay (usc Burst Siz n Burst Siz n Fig. 7. MEB vrsus burst siz Fig. 8. Accss dlay vrsus burst siz CAP Analysis Figurs 9 and 1 show th normalizd throughput ovr diffrnt payload sizs with diffrnt policis. Hr, w assum no comptition btwn activ nods, as our main focus is to gt maximum normalizd throughput for ach payload siz. Figurs 11 and 12 show th normalizd throughput for diffrnt payload sizs with diffrnt policis undr a givn BER valu. For ach policis, with th incras of th payload siz, th throughput first incrass, thn dcrass aftr th maximal point. his can b xplaind as follows. In CAP, th tim to transmit th payload is only a

10 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics 149 small portion of th total tim usd. hrfor, whn th payload siz incrass, th transmission fficincy can b incras, but th rror probability also incrass. h incras of th curvs in figurs 11 and 12 is bcaus th ffct of incrasd transmission fficincy is mor significant than th ffct of incrasd fram rror probability, and th dcras of th curvs is du to dominant ffct of incrasd fram rror probability whn payload siz furthr incrass. From th abov mntiond figurs w can find out th optimum payload siz valu for a givn BER valu. Hr, it is worth to not that normalizd throughput prformanc dpnds on th numbr of activ stations and backoff window siz during a CAP tim. Figur 13 shows th normalizd throughput for diffrnt BER valus whn payload siz is st to 1KB. Diffrnt schms without aggrgation mthod (During CAP tim 1 hroughput (No--1 Gbps 11 hroughput ( Imm--1 Gbps hroughput (2-Dly--1 Gbps 1 hroughput (4-Dly--1 Gbps hroughput (No-- 2 Gbps 9 hroughput (Imm--2 Gbps hroughput (2-Dly--2 Gbps 8 hroughput (4-Dly--2 Gbps hroughput (Mbps Data Packt Payload (KB hroughput (Mbps Diffrnt schms with aggrgation mthod ( During CAP im hroughput (No- 1 Gbps hroughput (2-Dly- Gbps hroughput (4-Dly- 1 Gbps hroughput (No- 2 Gbps hroughput (2-Dly- 2 Gbps hroughput (4-Dly- 2 Gbps Data Packt Payload (KB Fig. 9. hroughput vrsus payload siz Fig. 1. hroughput vrsus payload siz Diffrnt Schms without aggrgation mthod (During CAP tim, BER=.2 7 hroughput (No--1Gbps hroughput (Imm--1Gbps hroughput (2-Dly--1Gbps 6 hroughput (4-Dly--1Gbps hroughput (No--2Gbps hroughput (Imm--2Gbps 5 hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps 3 hroughput (Mbps hroughput (Mbps Diffrnt Schms with aggrgation mthod (During CAP tim, BER=.2 hroughput (No--1Gbps 1 hroughput (2-Dly--1Gbps hroughput (4-Dly--1Gbps hroughput (No--2Gbps 1 hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps Data Packt Payload (KB Data Packt Payload (KB Fig. 11. hroughput vrsus payload siz Fig. 12. hroughput vrsus payload siz Similar to duration analysis, Figur 14 and 15 shows th MEB for diffrnt burst valus undr a givn BER valu. Figur 16 shows th accss dlay prformanc for diffrnt burst sizs undr a givn BER valu. h accss dlay prformanc with diffrnt policis is vry snsitiv to backoff window siz and numbr of activ nods. In this papr, w focusd only on n-dly--agg policy to gt th uppr bound on th dlay prformanc.

11 15 S. Mhta and K.S. Kwak hroughput Gbps and Payload = 1 KB ( During CAP im No- ( Without Aggrgation Imm- 2-Dly- ( Without Aggrgation 4-Dly- ( Without Aggrgation No- (With Aggrgation 2-Dly- ( With Aggrgation 4-Dly- ( With Aggrgation MEB Without aggrgation mthod (During CAP BER=.2.2 Payload = 1KB- 1Gbps.18 Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps.16 Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps BER Burst Siz n Fig. 13. hroughput vrsus BER valu with diffrnt policis Fig. 14. MEB vrsus burst siz.25.2 With aggrgation mthod (During CAP, BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps (During CAP, Data Rat = 1Gbps, BER=, n-dly- Payload = 1KB Payload = 2KB Payload = 3KB Payload = 4KB Payload = 5KB 3.5 MEB.15.1 Dlay (msc Burst Siz n Burst Siz n Fig. 15. MEB vrsus burst siz Fig. 16. Accss dlay vrsus burst siz 4 Conclusions and Futur Work In this papr, w prsntd a prformanc analysis of WPAN (IEEE MAC for wirlss snsor ntworks. W hav xtnsivly studid th diffrnt policis in and CAP undr a givn BER valu. h optimal payload siz as wll as optimal burst siz can b dtrmind analytically from th prsntd analysis. For futur work, w want to study th impact of backoff window siz on channl utilization and accss dlay. W hop that th rsults of this papr will hlp snsor ntwork dsignrs to asily and corrctly provision systms basd on IEEE MAC tchnology. Rfrncs 1. P /D17: (C/LM Standard for lcommunications and Information Exchang Btwn Systms - LAN/MAN Spcific Rquirmnts - Part 15.3: Wirlss Mdium Accss Control (MAC and Physical Layr (PHY Spcifications for High Rat Wirlss Prsonal Ara Ntworks (Fbruary 3

12 Prformanc Analysis of IEEE MAC Protocol with Diffrnt Polics Part 15.3: Wirlss Mdium Accss Control (MAC and Physical Layr (PHY Spcifications for High Rat Wirlss Prsonal Ara Ntworks. Amndmnt 1: MAC Sub layr, IEEE Std b (Fbruary 5 3. Xiao, Y.: IEEE 82.11n: Enhancmnts for highr throughput in wirlss LANs. IEEE Wirlss Communications, (Dcmbr 5 4. Chin, K.-W., Low, D.: Simulation study of th IEEE MAC. In: Proc., Australian lcommunications and Ntwork Applications Confrnc (ANAC, Sydny, Australia (4 5. Chin, K.W., Low, D.: A Novl IEEE Sharing Protocol for Supporting VBR Strams. In: Proc. of IEEE ICCCN (5 6. Chn, H., Guo, Z., Yao, R., Li, Y.: Improvd Prformanc with Adaptiv Dly- for IEEE WPAN ovr UWB PHY. IEICE rans. Fundamntals E88-A(9 (Sptmbr 5 7. sng, Y.H., Wu, E.H., Chn, G.H.: Maximum raffic Schduling and Capacity Analysis for IEEE High Data Rat MAC Protocol. In: Proc. of IEEE VC (3 8. Xiao, Y., Shn, X., Jiang, H.: Optimal Mchanisms of th IEEE MAC for Ultra-Widband Systms. IEEE JSAC 24(4 (April 6 9. Bianchi, G.: Prformanc analysis of th IEEE distributd coordination function. IEEE JSAC 18(3, ( 1. Chn, H., Guo, Z., Yao, R.Y., Shn, X., Li, Y.: Prfoamnc Analyis of dlyd Acknowldgmnt Schm in UWB-Basd High-Rat WPAN. IEEE transaction on vhicular tchnology 55(2 (March IEEE P82.15 Working Group for Wirlss Prsonal Ara Ntworks (WPANs.: Unifid and flxibl millimtr wav WPAN systms supportd by common mod. DOC: IEEE c (July 9

Performance Analysis of IEEE MAC Protocol with Different ACK Polices

Performance Analysis of IEEE MAC Protocol with Different ACK Polices Performance Analysis of IEEE 82.15.3 MAC Protocol with Different Polices S. Mehta and K.S. Kwak Wireless Communications Research Center, Inha University, Korea suryanand.m@gmail.com Abstract. he wireless

More information

Problem Set 1 (Due: Friday, Sept. 29, 2017)

Problem Set 1 (Due: Friday, Sept. 29, 2017) Elctrical and Computr Enginring Mmorial Univrsity of Nwfoundland ENGI 9876 - Advancd Data Ntworks Fall 2017 Problm St 1 (Du: Friday, Spt. 29, 2017) Qustion 1 Considr a communications path through a packt

More information

TCP Congestion Control. Congestion Avoidance

TCP Congestion Control. Congestion Avoidance TCP Congstion Control TCP sourcs chang th snding rat by modifying th window siz: Window = min {Advrtisd window, Congstion Window} Rcivr Transmittr ( cwnd ) In othr words, snd at th rat of th slowst componnt:

More information

Call Admission Control in IEEE e EDCA-based WLANs (Initial Steps)

Call Admission Control in IEEE e EDCA-based WLANs (Initial Steps) Call Admission Control in IEEE 8. EDCA-basd WLANs (Initial Stps) Boris Bllalta, Michla Mo, Miqul Olivr () Univrsitat Pompu Fabra P. Circumval lació, 8, 8 Barclona, Spain Tl: + 9 5 8 95 Email: boris.bllalta@upf.du

More information

The Design and Evaluation of a Scalable Wireless MAC Protocol

The Design and Evaluation of a Scalable Wireless MAC Protocol Th Dsign and Evaluation of a Scalabl Wirlss MAC Protocol Tchnical Rport UIUCDCS-R--793 Chun-chng Chn, Eunsoo So, and Haiyun Luo Dpt. of Computr Scinc Univ. of Illinois at Urbana-Champaign Urbana, IL 181-3

More information

CSE 272 Assignment 1

CSE 272 Assignment 1 CSE 7 Assignmnt 1 Kui-Chun Hsu Task 1: Comput th irradianc at A analytically (point light) For point light, first th nrgy rachd A was calculatd, thn th nrgy was rducd by a factor according to th angl btwn

More information

Multihop MIMO Relay Networks with ARQ

Multihop MIMO Relay Networks with ARQ Multihop MIMO Rlay Ntworks with ARQ Yao Xi Dniz Gündüz Andra Goldsmith Dpartmnt of Elctrical Enginring Stanford Univrsity Stanford CA Dpartmnt of Elctrical Enginring Princton Univrsity Princton NJ Email:

More information

A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks

A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks 437 A Multilvl Schduling MAC rotocol for Undrwatr Acoustic Snsor Ntworks Sri Lkha Sampath 1, S. Subashini 2 1 School of Elctronics Enginring, Vllor Institut of Tchnology, Chnnai (TN), India 2 School of

More information

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline PS 6 Ntwork Programming Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du http://www.cs.clmson.du/~mwigl/courss/cpsc6 Th Ntwork Layr: Routing & ddrssing

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy PS Intrntworking Th Ntwork Layr: Routing & ddrssing Outlin Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du Novmbr, Ntwork layr functions Routr architctur

More information

An Agent-Based Architecture for Service Discovery and Negotiation in Wireless Networks

An Agent-Based Architecture for Service Discovery and Negotiation in Wireless Networks An Agnt-Basd Architctur for Srvic Discovry and Ngotiation in Wirlss Ntworks Abstract Erich Birchr and Torstn Braun Univrsity of Brn, Nubrückstrass 10, 3012 Brn, Switzrland Email: braun@iam.unib.ch This

More information

Extending z/tpf using IBM API Management (APIM)

Extending z/tpf using IBM API Management (APIM) Extnding using API Managmnt (APIM) Mark Gambino, TPF Dvlopmnt Lab March 23, 2015 TPFUG Dallas, TX Th Big Pictur Goal Mobil Applications Cloud APIs Cloud-basd Srvics On-Prmis Entrpris APIs E n t r p r I

More information

Managing Trust Relationships in Peer 2 Peer Systems

Managing Trust Relationships in Peer 2 Peer Systems Managing Trust Rlationships in Pr 2 Pr Systms R.S.SINJU PG STUDENT, DEPARTMENT OF COMPUTER SCIENCE, PONJESLY COLLEGE OF ENGINEERING NAGERCOIL, TAMILNADU, INDIA C.FELSY ASST.PROF, DEPARTMENT OF COMPUTER

More information

Energy-Efficient Method to Improve TCP Performance for MANETs

Energy-Efficient Method to Improve TCP Performance for MANETs nrgy-fficint Mthod to Improv TCP Prformanc for MANTs Chaoyu Xiong, Jagol Yim, Jason Ligh and Tadao Murata Computr Scinc Dpartmnt, Univrsity of Illinois at Chicago Chicago, IL 60607, USA ABSTRACT Th currnt

More information

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point.

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point. 3-5 Systms in Thr Variabls TEKS FOCUS VOCABULARY TEKS (3)(B) Solv systms of thr linar quations in thr variabls by using Gaussian limination, tchnology with matrics, and substitution. Rprsntation a way

More information

Throughput Parameter Optimization of Adaptive ARQ/HARQ Scheme

Throughput Parameter Optimization of Adaptive ARQ/HARQ Scheme 89 Throughput Paramtr Optimization of Adaptiv ARQ/HARQ Schm Ján Poctavk, Kvtoslava Kotuliaková, Jaroslav Polc, Michal Osadský, Sandra Ondrušová Dpt. of Tlcommunications, Slovak Univrsity of Tchnology Bratislava,

More information

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1 Advancd Computr Graphics (Fall 200) CS 283, Lctur 5: Msh Data Structurs Ravi Ramamoorthi http://inst.cs.brkly.du/~cs283/fa0 To Do Assignmnt, Du Oct 7. Start rading and working on it now. Som parts you

More information

Adaptive subband selection in OFDM-based cognitive radios for better system coexistence

Adaptive subband selection in OFDM-based cognitive radios for better system coexistence Univrsity of Wollongong Rsarch Onlin Faculty of Informatics - Paprs (Archiv) Faculty of Enginring and Information Scincs 28 Adaptiv subband slction in OFDM-basd cognitiv radios for bttr systm coxistnc

More information

8.3 INTEGRATION BY PARTS

8.3 INTEGRATION BY PARTS 8.3 Intgration By Parts Contmporary Calculus 8.3 INTEGRATION BY PARTS Intgration by parts is an intgration mthod which nabls us to find antidrivativs of som nw functions such as ln(x) and arctan(x) as

More information

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1 Advancd Computr Graphics CSE 63 [Spring 207], Lctur 7 Ravi Ramamoorthi http://www.cs.ucsd.du/~ravir To Do Assignmnt, Du Apr 28 Any last minut issus or difficultis? Starting Gomtry Procssing Assignmnt 2

More information

Dynamic Light Trail Routing and Protection Issues in WDM Optical Networks

Dynamic Light Trail Routing and Protection Issues in WDM Optical Networks This full txt papr was pr rviwd at th dirction of IEEE Communications Socity subjct mattr xprts for publication in th IEEE GLOBECOM 2005 procdings. Dynamic Light Trail Routing and Protction Issus in WDM

More information

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight Availabl at http://pvamudu/aam Appl Appl Math ISSN: 193-9466 Vol 6, Issu (Dcmbr 011), pp 60 619 Applications and Applid Mathmatics: An Intrnational Journal (AAM) A Nw Algorithm for Solving Shortst Path

More information

NASPI Work Group meeting April 24-26, 2018 Albuquerque, NM

NASPI Work Group meeting April 24-26, 2018 Albuquerque, NM NASPI Work Group mting April 24-26, 2018 Albuqurqu, NM Pavl Kovalnko Viktor Litvinov from Data to Action Prmium Information Srvics from Data to Action Dsign, Dvlop and Dploy - digital transformation solutions

More information

Receiver-assisted cellular/wifi handover management for efficient multipath multimedia delivery in heterogeneous wireless networks

Receiver-assisted cellular/wifi handover management for efficient multipath multimedia delivery in heterogeneous wireless networks Cao t al. EURASIP Journal on Wirlss Communications and Ntworking (016) 016:9 DOI 10.1186/s13638-016-078-8 RESEARCH Rcivr-assistd cllular/wifi handovr managmnt for fficint multipath multimdia dlivry in

More information

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol.

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol. ISSN : 2355-9365 -Procding of Enginring : Vol.5, No.1 Mart 2018 Pag 1112 Analysis of Influnc AS Path Prpnding to th Instability of BGP Routing Protocol. Hirwandi Agusnam 1, Rndy Munadi 2, Istikmal 3 1,2,3,

More information

SPECKLE NOISE REDUCTION IN SAR IMAGING USING 2-D LATTICE FILTERS BASED SUBBAND DECOMPOSITION

SPECKLE NOISE REDUCTION IN SAR IMAGING USING 2-D LATTICE FILTERS BASED SUBBAND DECOMPOSITION 7th Europan Signal Procssing Confrnc EUSIPCO 9 Glasgow Scotland August 4-8 9 SPECKLE REDUCTION IN SAR IMAGING USING -D LATTICE FILTERS ASED SUAND DECOMPOSITION Göhan Karasaal N.. Kaplan I. Err Informatics

More information

Evolutionary Clustering and Analysis of Bibliographic Networks

Evolutionary Clustering and Analysis of Bibliographic Networks Evolutionary Clustring and Analysis of Bibliographic Ntworks Manish Gupta Univrsity of Illinois at Urbana-Champaign gupta58@illinois.du Charu C. Aggarwal IBM T. J. Watson Rsarch Cntr charu@us.ibm.com Jiawi

More information

Forward and Inverse Kinematic Analysis of Robotic Manipulators

Forward and Inverse Kinematic Analysis of Robotic Manipulators Forward and Invrs Kinmatic Analysis of Robotic Manipulators Tarun Pratap Singh 1, Dr. P. Sursh 2, Dr. Swt Chandan 3 1 M.TECH Scholar, School Of Mchanical Enginring, GALGOTIAS UNIVERSITY, GREATER NOIDA,

More information

FSP Synthesis of an off-set five bar-slider mechanism with variable topology

FSP Synthesis of an off-set five bar-slider mechanism with variable topology FSP Synthsis of an off-st fiv bar-slidr mchanism with variabl topology Umsh. M. Daivagna 1*, Shrinivas. S. Balli 2 1 Dpartmnt of Mchanical Enginring, S.T.J.Institut of Tchnology, Ranbnnur, India 2 Dpt.

More information

Interfacing the DP8420A 21A 22A to the AN-538

Interfacing the DP8420A 21A 22A to the AN-538 Intrfacing th DP8420A 21A 22A to th 68000 008 010 INTRODUCTION This application not xplains intrfacing th DP8420A 21A 22A DRAM controllr to th 68000 Thr diffrnt dsigns ar shown and xplaind It is assumd

More information

Terrain Mapping and Analysis

Terrain Mapping and Analysis Trrain Mapping and Analysis Data for Trrain Mapping and Analysis Digital Trrain Modl (DEM) DEM rprsnts an array of lvation points. Th quality of DEM influncs th accuracy of trrain masurs such as slop and

More information

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network Prformanc Analysis of Improvd ODMRP with Motion Dtction (IOMD) in Mobil Ad Hoc Ntwork S. Vasundra, Prof. A. Damodaram Dr. B. Sathyanarayana Associat Profssor, Profssor of CSE and Profssor & Chairman BOS,

More information

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison Contnts Tchnology Nwly Dvlopd Cllo Tchnology Cllo Tchnology : Improvd Absorption of Light Doubl-sidd Cll Structur Cllo Tchnology : Lss Powr Gnration Loss Extrmly Low LID Clls 3 3 4 4 4 Advantag Installation

More information

Dynamic modelling of multi-physical domain system by bond graph approach and its control using flatness based controller with MATLAB Simulink

Dynamic modelling of multi-physical domain system by bond graph approach and its control using flatness based controller with MATLAB Simulink Dnamic modlling of multi-phsical domain sstm b bond graph approach and its control using flatnss basd controllr with MATLAB Simulink Sauma Ranjan Sahoo Rsarch Scholar Robotics Lab Dr. Shital S. Chiddarwar

More information

2 Mega Pixel. HD-SDI Bullet Camera. User Manual

2 Mega Pixel. HD-SDI Bullet Camera. User Manual 2 Mga Pixl HD-SDI Bullt Camra Usr Manual Thank you for purchasing our product. This manual is only applicabl to SDI bullt camras. Thr may b svral tchnically incorrct placs or printing rrors in this manual.

More information

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis Intrsction-fr Dual Contouring on Uniform Grids: An Approach Basd on Convx/Concav Analysis Charli C. L. Wang Dpartmnt of Mchanical and Automation Enginring, Th Chins Univrsity of Hong Kong E-mail: cwang@ma.cuhk.du.hk

More information

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S isto C o C or Co r op ra p a py ag yr g ri g g gh ht S S S V V K r V K r M K v M r v M rn v MW n W S r W Sa r W K af r: W K f : a H a M r T H r M rn w T H r Mo ns w T i o S ww c ig on a w c g nd af ww

More information

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1 Advancd Computr Graphics CSE 63 [Spring 208], Lctur 7 Ravi Ramamoorthi http://www.cs.ucsd.du/~ravir To Do Assignmnt, Du Apr 27 Any last minut issus or difficultis? Starting Gomtry Procssing Assignmnt 2

More information

Review and analysis of Cloud Computing Quality of Experience

Review and analysis of Cloud Computing Quality of Experience Rviw and analysis of Cloud Computing Quality of Exprinc Fash Safdari 1, Victor Chang 1 1 School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR {F.Safdari;

More information

Fequent Pattern Recognization From Stream Data Using Compact Data Structure

Fequent Pattern Recognization From Stream Data Using Compact Data Structure Fqunt Pattrn Rcognization From Stram Data Using Compact Data Structur Fabin M Christian 1, Narndra C.Chauhan 2, Nilsh B. Prajapati 3 1 PG Scholar, CE Dpartmnt, BVM Engg. Collg, V.V.Nagar, fabin.christian@gmail.com

More information

Understanding Patterns of TCP Connection Usage with Statistical Clustering

Understanding Patterns of TCP Connection Usage with Statistical Clustering Th UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Undrstanding Pattrns of TCP Connction Usag with Statistical Clustring Félix Hrnándz-Campos Kvin Jffay Don Smith Dpartmnt of Computr Scinc Andrw Nobl Dpartmnt

More information

REVIEW ON MANET- APPLICATIONS AND ROUTING PROTOCOLS WITH THE DETECTION AND PREVENTION OF BLACK HOLE ATTACK

REVIEW ON MANET- APPLICATIONS AND ROUTING PROTOCOLS WITH THE DETECTION AND PREVENTION OF BLACK HOLE ATTACK REVIEW ON MANET- APPLICATIONS AND ROUTING PROTOCOLS WITH THE DETECTION AND PREVENTION OF BLACK HOLE ATTACK Saurabh Kumar Rsarch Scholar (CSE) Gurukul Vidyapth, Punjab Abstract MANET (Mobil Ad-Hoc Ntwork)

More information

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias Robust and Fault Tolrant Clock Synchronization Nikolaus Krö, Organo Systms Anq Mahmood, ZISS Thomas Krnn, Cisco Flix Ring, ZISS Tobias Müllr, Organo Systms Thomas Biglr, ZISS Rational Common notion of

More information

The Size of the 3D Visibility Skeleton: Analysis and Application

The Size of the 3D Visibility Skeleton: Analysis and Application Th Siz of th 3D Visibility Sklton: Analysis and Application Ph.D. thsis proposal Linqiao Zhang lzhang15@cs.mcgill.ca School of Computr Scinc, McGill Univrsity March 20, 2008 thsis proposal: Th Siz of th

More information

An Optimized Bandwidth Allocation in Broadband Digital Economy

An Optimized Bandwidth Allocation in Broadband Digital Economy 6 8th Intrnational Symposium on Tlcommunications (IST'6) An Optimizd Bandwidth Allocation in Broadband Digital Economy Lila Mansourifar Rsarch Institut for ICT ( ITRC ) Thran, Iran Mansourifar@itrc.ac.ir

More information

Dual-mode Operation of the Finger-type Manipulator Based on Distributed Actuation Mechanism

Dual-mode Operation of the Finger-type Manipulator Based on Distributed Actuation Mechanism 11 th World Congrss on Structural and Multidisciplinary Optimisation 07 th -1 th, Jun 015, Sydny Australia Dual-mod Opration of th Fingr-typ Manipulator Basd on Distributd Actuation Mchanism Jong Ho Kim

More information

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU An Auto-tund Mthod for Solving Larg Tridiagonal Systms on th GPU Andrw Davidson Univrsity of California, Davis aaldavidson@ucdavis.du Yao Zhang Univrsity of California, Davis yaozhang@ucdavis.du John D.

More information

Misbehavior in Nash Bargaining Solution Allocation

Misbehavior in Nash Bargaining Solution Allocation Misbhavior in Nash Bargaining Solution Allocation Ilya Nikolavskiy, Andry Lukyannko, Andri Gurtov Aalto Univrsity, Finland, firstnam.lastnam@aalto.fi Hlsinki Institut for Information Tchnology, Finland,

More information

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues Chaptr 24 Implmnting Lists, Stacks, Quus, and Priority Quus CS2: Data Structurs and Algorithms Colorado Stat Univrsity Original slids by Danil Liang Modifid slids by Chris Wilcox Objctivs q To dsign common

More information

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e LAB1: DMVPN Thory Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

Maxwell s unification: From Last Time. Energy of light. Modern Physics. Unusual experimental results. The photoelectric effect

Maxwell s unification: From Last Time. Energy of light. Modern Physics. Unusual experimental results. The photoelectric effect From Last Tim Enrgy and powr in an EM wav Maxwll s unification: 1873 Intimat connction btwn lctricity and magntism Exprimntally vrifid by Hlmholtz and othrs, 1888 Polarization of an EM wav: oscillation

More information

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux A Loadabl Task Excution Rcordr for Hirarchical Schduling in Linux Mikal Åsbrg and Thomas Nolt MRTC/Mälardaln Univrsity PO Box 883, SE-721 23, Västrås, Swdn {mikalasbrg,thomasnolt@mdhs Shinpi Kato Carngi

More information

Transaction-level Modeling of MPEG-2 Video Decode Application in SystemC 2.0.1

Transaction-level Modeling of MPEG-2 Video Decode Application in SystemC 2.0.1 Transaction-lvl Modling of MPEG-2 Vido Dcod Application in SystmC 2.0.1 Samvit Kaul, Srkanth M, Junhyung Um, Eui-young Chung, Kyu-Myung Choi, Jong-Tak Kong, Soo-Kwan Eo CAE Cntr, Systm LSI Dvision, Dvic

More information

GSM on the Net. Background. System concept. Olle Granberg

GSM on the Net. Background. System concept. Olle Granberg GSM on th Nt Oll Granbrg GSM on th Nt introducs an ntirly nw concpt for businss communications, offring voic, data and multimdia srvics ovr corporat intrants. Th voic srvic can b ithr fixd or mobil (in

More information

Review of Different Histogram Equalization Based Contrast Enhancement Techniques

Review of Different Histogram Equalization Based Contrast Enhancement Techniques Intrnational Journal of Advancd Rsarch in Computr and Communication Enginring Vol. 3, Issu 7, July 24 ISSN (Onlin) : 2278-2 Rviw of Diffrnt Histogram Equalization Basd Contrast Enhancmnt Tchniqus Er. Shfali

More information

Parser Self-Training for Syntax-Based Machine Translation

Parser Self-Training for Syntax-Based Machine Translation arsr Slf-Training for Syntax-Basd Machin Translation Makoto Morishita, Koichi Akab, Yuto Hatakoshi Graham ubig, Koichiro Yoshino, Satoshi akamrua Graduat School of Information Scinc ara Institut of Scinc

More information

Using Traces for TCP/IP Throughput Performance Problems

Using Traces for TCP/IP Throughput Performance Problems Using Tracs for TCP/IP Throughput Prformanc Problms Using Tracs for TCPIP Throughput Prformanc Problms.PRZ - 05-10-07-10:22 - Pag 1 How do w dtrmin if w hav a throughput prformanc problm? Ways in z/os

More information

Gernot Hoffmann Sphere Tessellation by Icosahedron Subdivision. Contents

Gernot Hoffmann Sphere Tessellation by Icosahedron Subdivision. Contents Grnot Hoffmann Sphr Tssllation by Icosahdron Subdivision Contnts 1. Vrtx Coordinats. Edg Subdivision 3 3. Triangl Subdivision 4 4. Edg lngths 5 5. Normal Vctors 6 6. Subdividd Icosahdrons 7 7. Txtur Mapping

More information

An Architecture for Hierarchical Collision Detection

An Architecture for Hierarchical Collision Detection An Architctur for Hirarchical Collision Dtction Gabril Zachmann Computr Graphics, Informatik II Univrsity of Bonn mail: zach@cs.uni-bonn.d Güntr Knittl WSI/GRIS Univrsity of Tübingn mail: knittl@gris.uni-tubingn.d

More information

On Some Maximum Area Problems I

On Some Maximum Area Problems I On Som Maximum Ara Problms I 1. Introdution Whn th lngths of th thr sids of a triangl ar givn as I 1, I and I 3, thn its ara A is uniquly dtrmind, and A=s(s-I 1 )(s-i )(s-i 3 ), whr sis th smi-primtr t{i

More information

Spectral sensitivity and color formats

Spectral sensitivity and color formats FirWir camras Spctral snsitivity and color formats At th "input" of a camra, w hav a CCD chip. It transforms photons into lctrons. Th spctral snsitivity of this transformation is an important charactristic

More information

Lec 20 Error and Loss Control I: Network Coding & Coding for Storage

Lec 20 Error and Loss Control I: Network Coding & Coding for Storage CS/EE 5590 / ENG 40 Spcial Topics 7804, 785, 7803 Lc 20 Error and Loss Control I: Ntwork Coding & Coding for Storag Zhu Li Cours Wb: http://l.wb.umkc.du/lizhu/taching/206sp.vido-communication/main.html

More information

RFC Java Class Library (BC-FES-AIT)

RFC Java Class Library (BC-FES-AIT) RFC Java Class Library (BC-FES-AIT) HELP.BCFESDEG Rlas 4.6C SAP AG Copyright Copyright 2001 SAP AG. All Rcht vorbhaltn. Witrgab und Vrvilfältigung disr Publikation odr von Tiln daraus sind, zu wlchm Zwck

More information

AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES

AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES 1 Bassm HAIDAR, 2 Bilal CHEBARO, 3 Hassan WEHBI 1 Asstt Prof., Dpartmnt of Computr Scincs, Faculty

More information

Lec 20 Error and Loss Control II: Network Coding & Coding for Storage

Lec 20 Error and Loss Control II: Network Coding & Coding for Storage Multimdia Communication Lc 20 Error and Loss Control II: Ntwork Coding & Coding for Storag Zhu Li Cours Wb: http://l.wb.umkc.du/lizhu/ Z. Li, Multimdia Communciation, Spring 207 p. Outlin RCap Lctur 9

More information

Acceleration of the Smith-Waterman Algorithm using Single and Multiple Graphics Processors

Acceleration of the Smith-Waterman Algorithm using Single and Multiple Graphics Processors Acclration of th Smith-Watrman Algorithm using Singl and Multipl Graphics Procssors Ali Khah-Sad, Stphn Pool and J. Blair Prot Abstract Finding rgions of similarity btwn two vry long data strams is a computationally

More information

Vignette to package samplingdatacrt

Vignette to package samplingdatacrt Vigntt to packag samplingdatacrt Diana Trutschl Contnts 1 Introduction 1 11 Objctiv 1 1 Diffrnt study typs 1 Multivariat normal distributd data for multilvl data 1 Fixd ffcts part Random part 9 3 Manual

More information

Register Allocation. Register Allocation

Register Allocation. Register Allocation Rgistr Allocation Jingk Li Portlan Stat Univrsity Jingk Li (Portlan Stat Univrsity) CS322 Rgistr Allocation 1 / 28 Rgistr Allocation Assign an unboun numbr of tmporaris to a fix numbr of rgistrs. Exampl:

More information

FALSE DYNAMIC EIV MODEL IDENTIFICATION IN THE PRESENCE OF NON-PARAMETRIC DYNAMIC UNCERTAINTY

FALSE DYNAMIC EIV MODEL IDENTIFICATION IN THE PRESENCE OF NON-PARAMETRIC DYNAMIC UNCERTAINTY Intrnational Journal of Application or Innovation in Enginring & Managmnt (IJAIEM) Wb Sit: www.ijaim.org Email: ditor@ijaim.org Volum 3, Issu, May 4 ISSN 39-4847 FALSE DYNAMIC EIV MODEL IDENTIFICATION

More information

Heading-determination using the sensor-fusion based maritime PNT Unit

Heading-determination using the sensor-fusion based maritime PNT Unit Hading-dtrmination using th snsor-fusion basd maritim PN Unit Zhn Dai, Ralf Zibold, Alxandr Born, Evlin Englr Grman Arospac Cntr (DLR) Nustrlitz, Grmany Abstract his papr prsnts th hading dtrmination tchniqu

More information

Midterm 2 - Solutions 1

Midterm 2 - Solutions 1 COS 26 Gnral Computr Scinc Spring 999 Midtrm 2 - Solutions. Writ a C function int count(char s[ ]) that taks as input a \ trminatd string and outputs th numbr of charactrs in th string (not including th

More information

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select Low-Powr Dsign of Pag-Basd Intllignt Mmory Mark Oskin, Frdric T. Chong, Aamir Farooqui, Timothy Shrwood, and Justin Hnsly Univrsity of California at Davis Abstract Advancs in DRAM tchnology hav ld many

More information

running at 133 MHz bus. A Pentium III 1.26GHz with 512K cache running at 133 MHz bus is an available option. Fits Your Needs

running at 133 MHz bus. A Pentium III 1.26GHz with 512K cache running at 133 MHz bus is an available option. Fits Your Needs 3715 Industrial PCs 15.0" LCD Flat Panl Display DS-371500(E) Xycom Automation's nwst gnration of Industrial PCs is dsignd and tstd for th tough nvironmnts rquird for plant floor us. Our standard PC configurations

More information

About Notes And Symbols

About Notes And Symbols About Nots And Symbols by Batric Wildr Contnts Sht 1 Sht 2 Sht 3 Sht 4 Sht 5 Sht 6 Sht 7 Sht 8 Sht 9 Sht 10 Sht 11 Sht 12 Sht 13 Sht 14 Sht 15 Sht 16 Sht 17 Sht 18 Sht 19 Sht 20 Sht 21 Sht 22 Sht 23 Sht

More information

Virtual Target Algorithm in Cooperative Control of Marine Vessels

Virtual Target Algorithm in Cooperative Control of Marine Vessels Virtual Targt Algorithm in Cooprativ Control of Marin Vssls Zoran Triska, Nikola Mišković, Đula Nađ and Zoran Vukić Laboratory for Undrwatr Systms and Tchnologis Faculty of Elctrical Enginring and Computing

More information

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8.

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8. Rviw: Shift-Rduc Parsing Bottom-up parsing uss two actions: Bottom-Up Parsing II Lctur 8 Shift ABC xyz ABCx yz Rduc Cbxy ijk CbA ijk Prof. Aikn CS 13 Lctur 8 1 Prof. Aikn CS 13 Lctur 8 2 Rcall: h Stack

More information

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Efficint Obstacl-Avoiding Rctilinar Stinr Tr Construction Chung-Wi Lin, Szu-Yu Chn, Chi-Fng Li, Yao-Wn Chang, and Chia-Lin Yang Graduat Institut of Elctronics Enginring Dpartmnt of Elctrical Enginring

More information

HEAD DETECTION AND TRACKING SYSTEM

HEAD DETECTION AND TRACKING SYSTEM HEAD DETECTION AND TRACKING SYSTEM Akshay Prabhu 1, Nagacharan G Tamhankar 2,Ashutosh Tiwari 3, Rajsh N(Assistant Profssor) 4 1,2,3,4 Dpartmnt of Information Scinc and Enginring,Th National Institut of

More information

Mutual Learning to Adapt for Joint Human Parsing and Pose Estimation

Mutual Learning to Adapt for Joint Human Parsing and Pose Estimation Mutual Larning to Adapt for oint Human Parsing and Pos Estimation Xuchng Ni 1[0000 0003 2433 5983], iashi Fng 1, and huichng Yan 1,2 1 ECE Dpartmnt, National Univrsity of ingapor, ingapor nixuchng@u.nus.du,

More information

Proceedings of the 5 th Annual Linux Showcase & Conference

Proceedings of the 5 th Annual Linux Showcase & Conference USENIX Association Procdings of th 5 th Annual Linux Showcas & Confrnc Oakland, California, USA Novmbr 5 10, 2001 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION 2001 by Th USENIX Association All Rights Rsrvd

More information

2018 How to Apply. Application Guide. BrandAdvantage

2018 How to Apply. Application Guide. BrandAdvantage 2018 How to Apply Application Guid BrandAdvantag Contnts Accssing th Grant Sit... 3 Wlcom pag... 3 Logging in To Pub Charity... 4 Rgistration for Nw Applicants ( rgistr now )... 5 Organisation Rgistration...

More information

Principles of Programming Languages Topic: Formal Languages II

Principles of Programming Languages Topic: Formal Languages II Principls of Programming Languags Topic: Formal Languags II CS 34,LS, LTM, BR: Formal Languags II Rviw A grammar can b ambiguous i.. mor than on pars tr for sam string of trminals in a PL w want to bas

More information

PROSPECTS IN APPLICATION OF THE TECHNOLOGY FOR OF RECEPTION AND TRANSMISSION OF STREAMING DATA IN WEB BROWSER

PROSPECTS IN APPLICATION OF THE TECHNOLOGY FOR OF RECEPTION AND TRANSMISSION OF STREAMING DATA IN WEB BROWSER PROSPECTS IN APPLICATION OF THE TECHNOLOGY FOR OF RECEPTION AND TRANSMISSION OF STREAMING DATA IN WEB BROWSER ANTON PAVLOVICH TEYKHRIB Company NAUMEN (Nau-), Tatishchva Strt, 49a, 4th Floor, Ekatrinburg,

More information

Android Graphic System Acceleration Based on DirectFB

Android Graphic System Acceleration Based on DirectFB Rsarch Journal of Applid Scincs, Enginring and Tchnology 5(18): 4438-4443, 2013 ISSN: 2040-7459; -ISSN: 2040-7467 Maxwll Scintific Organization, 2013 Submittd: July 27, 2012 Accptd: Sptmbr 17, 2012 Publishd:

More information

Combining Intra- and Multi-sentential Rhetorical Parsing for Document-level Discourse Analysis

Combining Intra- and Multi-sentential Rhetorical Parsing for Document-level Discourse Analysis Combining Intra- and Multi-sntntial htorical Parsing for Documnt-lvl Discours Analysis hafiq Joty Giuspp Carnini, aymond T. Ng, Yashar Mhdad sjoty@qf.org.qa {carnini, rng, mhdad}@cs.ubc.ca Qatar Computing

More information

Reliability Coordinator Base Schedule Aggregation Portal (RC BSAP) Interface Specification for RC BSAP Services

Reliability Coordinator Base Schedule Aggregation Portal (RC BSAP) Interface Specification for RC BSAP Services Rliability Coordinator Bas Schdul Aggrgation Portal (RC BSAP) Intrfac Spcification for RC BSAP Srvics (Businss Ruls v 10.x(Spring 2019) or latr) Vrsion: 1.1 vmbr 6, 2018 Rvision History Dat Vrsion By Dscription

More information

Reimbursement Requests in WORKS

Reimbursement Requests in WORKS Rimbursmnt Rqusts in WORKS Important points about Rimbursmnts in Works Rimbursmnt Rqust is th procss by which UD mploys will b rimbursd for businss xpnss paid using prsonal funds. Rimbursmnt Rqust can

More information

SPECIFIC CRITERIA FOR THE GENERAL MOTORS GLOBAL TRADING PARTNER LABEL TEMPLATE:

SPECIFIC CRITERIA FOR THE GENERAL MOTORS GLOBAL TRADING PARTNER LABEL TEMPLATE: SPCIFIC CRITRIA FOR TH GNRAL MOTORS GLOBAL TRADING PARTNR LABL TMPLAT: TH TMPLAT IDNTIFIS HOW AND WHR DATA IS TO B PLACD ON TH LABL WHN IT IS RQUIRD AS PART OF A GM BUSINSS RQUIRMNT FONT SIZS AR SPCIFID

More information

A Vision-based Navigation System of Mobile Tracking Robot

A Vision-based Navigation System of Mobile Tracking Robot A Vision-basd Navigation Systm of Mobil Tracking Robot Ji Wu Vac1av Snasl Dpt. Computr Scinc FCS VSB - Tchnical Univrsity of Ostrava Ostrava Czch Rpublic dfrmat2008 @hotmail.com vaclav. snasl @vsb.cz Ajith

More information

Type & Media Page 1. January 2014 Libby Clarke

Type & Media Page 1. January 2014 Libby Clarke Nam: 1 In ordr to hlp you s your progrss at th nd of this ntir xrcis, you nd to provid som vidnc of your starting point. To start, draw th a on th lft into th box to th right, dpicting th sam siz and placmnt.

More information

Utilization a Courseware WEB Portal for Virtual University Requirements

Utilization a Courseware WEB Portal for Virtual University Requirements Utilization a Courswar WEB Portal for Virtual Univrsity Rquirmnts SMUTNÝ P., SMUTNÝ L., FARANA R. & SMUTNÁ J. Dpartmnt of Control Systms & Instrumntation VŠB Tchnical Univrsity Ostrava Av. 17. listopadu

More information

Keywords-- Digital FIR filter, Differential Evolution algorithm, Magnitude response, Pass band ripples and Stop band ripples.

Keywords-- Digital FIR filter, Differential Evolution algorithm, Magnitude response, Pass band ripples and Stop band ripples. Volum 5, Issu 6, Jun 2015 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: www.iarcss.com High Pass Digital FIR Filtr Dsign Using

More information

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O.

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O. Workbook for Dsigning Distributd Control Applications using Rockwll Automation s HOLOBLOC Prototyping Softwar John Fischr and Thomas O. Bouchr Working Papr No. 05-017 Introduction A nw paradigm for crating

More information

Design Methodologies and Tools

Design Methodologies and Tools Dsign Mthodologis and Tools Dsign styls Full-custom dsign Standard-cll dsign Programmabl logic Gat arrays and fild-programmabl gat arrays (FPGAs) Sa of gats Systm-on-a-chip (mbddd cors) Dsign tools 1 Full-Custom

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lctur #15: Clustring-2 Soul National Univrsity 1 In Tis Lctur Larn t motivation and advantag of BFR, an xtnsion of K-mans to vry larg data Larn t motivation and advantag of

More information

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model

More information

Lesson Focus: Finding Equivalent Fractions

Lesson Focus: Finding Equivalent Fractions Lsson Plans: Wk of 1-26-15 M o n Bindrs: /Math;; complt on own, thn chck togthr Basic Fact Practic Topic #10 Lsson #5 Lsson Focus: Finding Equivalnt Fractions *Intractiv Larning/Guidd Practic-togthr in

More information

Base Schedule Aggregation Portal (BSAP) Interface Specification for BSAP Services

Base Schedule Aggregation Portal (BSAP) Interface Specification for BSAP Services Bas Schdul Aggrgation Portal (BSAP) Intrfac Spcification for BSAP Srvics (Businss Ruls v 9.x(Fall 2017) or latr) Vrsion: 1.3 Dcmbr 19, 2017 Rvision History Dat Vrsion By Dscription 12/19/2017 1.3 WT Additional

More information

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012 XML Publishr with connctd qury: A Primr Sssion #30459 March 19, 2012 Agnda/ Contnts Introduction Ovrviw of XMLP Gtting Startd Bst practics for building a basic XMLP rport Connctd Qury Basics Building a

More information

Diverse Routing in Multi-Domain Optical Networks With Correlated and Probabilistic Multi-Failures

Diverse Routing in Multi-Domain Optical Networks With Correlated and Probabilistic Multi-Failures Divrs Routing in Multi-Domain Optical Ntworks With Corrlatd and Probabilistic Multi-Failurs F. Xu 1, N. Min-Allah, S. Khan 3, N. Ghani 1 1 Univrsity of Nw Mxico, COMSATS Institut of Information Tchnology,

More information