Mobility Support for a QoS Aggregation Protocol

Size: px
Start display at page:

Download "Mobility Support for a QoS Aggregation Protocol"

Transcription

1 Mobility Support for QoS Aggregtion Protocol A. Kloxylos^, D. Vli*, S. Psklis+, G. Pngiotou^, I. Goninkis^, E. Zervs # ^ Deprtment of Telecommunictions Science n Technology, University of Peloponnese, Greece * OTE Reserch, ellenic Telecommunictions Orgniztion - OTE S.A,, Greece + Deprtment of Informtics n Telecommunictions, University of Athens, Greece #Deprtment of Electronics, TEI Athens, Greece Abstrct - The en-to-en QoS support for multimei pplictions is n importnt issue. owever, existing proposls either en up in corse-grine QoS support or they re simply not sclble. To ress this issue, ynmic ggregtion of iniviul reserve sessions into common clsses is recommene. In en-to-en communictions it is importnt to crefully select the strting n ening point for n ggregtion. The gol is to minimize stte informtion n processing lo in the routers. Moreover, the cpbility of the users to switch their ctive connections/sessions from one point to nother, n even from one opertor to nother, plces extr requirements in the mngement of the ggregte informtion. Our work iscusses the performnce of existing protocols n buils upon BGRP, sclble protocol tht is esigne to efficiently ggregte resources. We propose the ition of mobility extensions to BGRP n ssess their performnce through some simple metrics. I. INTRODUCTION QoS support is well-stuie issue n severl proposls n stnrs hve been issue uring the pst yers. A number of protocols re propose to hnle QoS in locl networks or even en-to-en ([], []). The IETF Next Steps in Signling working group ([3]) is currently working to stnrize IP signling protocols with QoS signling s the first use cse. In [4], protocol for the routing n trnsport of per-flow signling messges is presente, while in [5] the NSIS Signling yer Protocol (NSP) for signling QoS reservtions in the Internet is escribe. These protocols o not follow the corsegrine QoS support of Diffserv [7], but provie similr functionlity to RSVP [6]. Obviously, specil cre hs been tken to support itionl fetures such s sener bse reservtion s well s receiver bse reservtions. From these efforts it is cler tht in orer to ynmiclly control en-to-en QoS schemes, signling hs to trvel from one en to the other ech time new session is to be estblishe. owever, this my rise scling issues, especilly for the core network routers. To meliorte this buren, ggregtion of signling informtion is require. The scheme tht one shoul use to minimize the processing lo n the signling informtion store in the routers remins s n open issue. Another chllenge is to stuy how these ggregtion schemes will perform with mobile terminls. Future scenrios expect users to be ble to verticlly hnoff their connections from one rio ccess technology to nother or even ynmiclly select to switch from one Opertor, or Internet Service Provier, to nother (e.g., hnover from/to WAN to/from WiMAX, UMTS etc). In these cses it is possible tht the new en-to-en pth, lthough shring lrge segment with the ol one, will not inclue the previous ggregtion point. Thus, resources nee to be re-estblishe in n en-to-en fshion, espite the fct tht portion of the previously estblishe pth coul be re-use. To tckle this issue our proposl buils on BGRP [8], n existing inter-omin protocol for ggregting resources. With minor moifictions we hve esigne n extene version of it, clle Mobile BGRP (MBGRP) tht efficiently hnles the movement of terminls. This pper is orgnize s follows. In Section II, we iscuss existing protocols esigne to ggregte reservtions. In Section III, we exmine more closely ggregtion schemes sclbility issues n iscuss the reson why we nee mobility support for these protocols. In Section IV, we present the etils of MBGRP n perform simple quntittive evlution of the new protocol. We conclue the pper in Section V. II. REATED WORK There re severl lterntives for ggregting informtion. The first one is escribe in [9] n suggests the use of single RSVP reservtion to ggregte other RSVP reservtions cross trnsit routing region. With this technique, n ggregtion region is efine s contiguous set of systems tht cn perform ggregtions long ny possible route throughout this region. Obviously, this solution mnges to reuce the number of sttes n signling exchnge insie these res. owever, it oes not specify selection mechnism for the pproprite plcement of ggregtors n e-ggregtors in the en-to-en pth. It merely specifies s pproprite selections the ingress n the egress routers of the ggregtion region. Thus, we believe tht if use in ento-en schemes this solution will result in significnt number of ggregtes for the noes locte insie the core network. Another proposl is escribe in [0]. The DARIS (Dynmic Aggregtion of Reservtions for Internet Services) rchitecture ssumes the existence of centrl resource mngement entity (similr to the bnwith broker pproch) insie ech DiffServ omin tht hs complete knowlege n control of the resources insie the omin. It lso vils the inter-omin BGP routing tble. DARIS enbles the cretion of n ggregte between two rbitrry omins s soon s threshol of ctive common reservtions between the two omins is exceee. In this cse, ll intermeite ege routers cn substitute the respective per-flow sttes with single ggregte stte. The DARIS ggregtion pproch reuces store sttes n signling messges when compre to per-flow protocol tht oes not perform ggregtion. owever, the penlty to py is the nee for this centrl entity n the mechnisms to keep it upte with routing

2 n QoS informtion. Also, the support of neste ggregtes s to the complexity of the protocol. A QoS signling protocol specificlly esigne for inter-omin usge between heterogeneous omins (AS - Autonomous Systems) is the Borer Gtewy Reservtion Protocol (BGRP) [8]. BGRP opertes in en-to-en moe only between omin borer routers. It ims minly t ggregting reservtions between ministrtion omins improving thus, sclbility. BGRP uses the sink-tree ggregtion pproch n performs reservtion ggregtion by builing sink tree for ech estintion omin. Reservtions from ifferent source omins tht re trgete towrs the sme estintion omin re ggregte long the pth forming sink-tree. The root of this tree is the estintion s omin ege router. BGRP s bsic functionlity inclues messge sent by the source omin towrs the receiver to etermine resource vilbility n to recor the reservtion pth. The estintion omin ege router termintes the n sens bck messge long the reverse pth. This messge performs the ctul inter-omin reservtion n triggers the intr-omin QoS mechnisms in trnsit omins. The messges follow the sme pth with messge since recor route informtion is gthere uring the probing phse. The estintion omin ege router is the e-ggregtion point for the reservtion ggregte, while the source omin ege routers re the ggregtion points. By performing sink tree bse ggregtion of reservtions towrs ech estintion omin, BGRP results in storing perestintion omin QoS sttes in borer routers. This is significnt contribution to sclbility when compre to the per-flow RSVP. Anlysis results presente in [8] show tht BGRP mintins fewer reservtion sttes thn RSVP n tht the BGRP messge rte is significnt lower thn the respective RSVP messge rte, resulting in lower messge processing, storge buren n link bnwith. The Shre-segment bse Inter-omin Control Aggregtion Protocol (SICAP) ([]) is nother pproch for supporting ggregte inter-omin reservtions between Autonomous Systems (ASs). SICAP combines the shre-segment ggregtion n the tree-bse ggregtion pproches to crete tree-bse reservtion ggregtes tht o not necessrily exten up to the estintion omins. Aprt from the estintion omin e-ggregtor point, Intermeite De-ggregtion octions re iscovere n crete long the pth, so tht reservtion requests tht shre common pth segment but o not en-up to the sme estintion omin re ggregte up to one of their common routers long the pth. SICAP, similrly to BGRP, performs receiverbse reservtions n uses two-phse setup mechnism for their estblishment. Simultion results support tht SICAP mintins fewer ggregte sttes thn BGRP. owever, SICAP is more complex protocol thn BGRP since n lgorithm to elect the most suitble intermeite e-ggregtion points is neee. Moreover, the choice of using these points my en up in situtions where core routers will hve to e-ggregte n ggregte from scrtch significnt number of ctive sessions. III. SCAABIITY ISSUES To provie clerer picture bout the stte informtion neee when ggregting resources, we provie short nlysis for [8] n [9]. Aggregte RSVP is currently supporte on the ongoing work of NSIS. BGRP is, in our opinion, not only sclble but lso the simplest from the existing lterntives. Thus, it is more likely to be consiere for option in the future. BGRP cn be more sclble thn ggregte RSVP n moreover it cn be esily extene to work in mobile environments. S S S3 S4 S5 S6 S7 S8 T T T3 T4 300 T5 300 T T7 T8 Figure : BGRP n RSVP ggregtion As n exmple consier fig. where simplifie topology in the form of binry tree structure is rwn. Every circle represents n AS. From every source AS (S- S8) N uniirectionl sessions re ctive n re eqully istribute in every one of the trget AS (D-D8). As n exmple N equls in fig. Insie every circle in the trnsit networks we hve lso mrke the number of connections they serve. Without ggregtion we cn observe the sclbility issue insie the core network. Suppose tht we use ggregte RSVP n efine n ggregtion region, with T, T, T3, T4 s the ggregtors n T, T3, T4, T5 s the e-ggregtors. Then the lrge number of sttes tht h to be store in T7,T8,T9 is minimize. Ech of these noes will now only to hve 6 reservtion sttes, while T5, T6, T0, T only 8. owever, T-T4 n T-T5 will still hve lrge number of sttes to support. In orer to fin the number of signling sttes tht we cn summrize in the whole network if [9] is use, we efine s the tree length. n re the ggregtor s n the e-ggregtor s level in the hierrchy. Ech lef of the tree is consiere to be in level. V i () is the number of connections pssing through noe (i.e., AS) in level i n is given by V i () = c* i-. c is the number of connections in ech lef of the network (e.g., in the exmple of Figure ). i () is the number of noes in the binry tree t level n is given by i () = -i. In the exmple given, (=5)=6, hlf of which ply the role of source omins n the others ct s estintion omins. T9 RSVP Aggregtion Region 300 T0 300 T T T3 T4 T5 D D D3 D4 D5 D6 D7 D8 BGRP Sink Tree Aggregte to D

3 In generl cse the totl gin from the number of sttes tht cn be eliminte ue to ggregtion is given from (): + 0,5* V + + 0,5* V * 0,5* * ( ) 0,5* * ( ) () The first two terms clculte the number of sttes in the levels between the ggregtor n the e-ggregtor tht will be replce by ggregte sttes. The lst two terms represent the number of the new ggregte sttes tht will be instlle in ll noes from the ggregtor to the eggregtor. Note tht the incentive for one to ct s n ggregtor/e-ggregtor is smll since this noe will hve ll sttes of the ctive connections n in ition the new ggregte sttes, i.e., it will suffer n ggregtion penlty. Eqution () hols lso if the ggregtors n e-ggregtors re plce in ifferent tree levels. Stuying () we see tht in orer to mximize the gin (i.e., minimize the totl number of sttes in the network) we nee to buil the longest possible ggregtes. owever, in this cse the core network noes will hve more ggregtes sttes, the number of which is equl to the number of noes in the ggregtors level multiplie by the number of noes in the e-ggregtors level (e.g., 6 sttes for T8 in the exmple of Figure ). In the cse of BGRP the corresponing eqution for the sme topology is given by (): 0,5* V + 0,5* V * + i ( ) 0,5* ( )* i 0,5 * ( )* i () From () we cn see tht the first two terms re equl to the ones of eqution () when = n =. owever, the number of the ggregte sttes is t most equl to the number of estintion omins (8 sttes in the exmple of fig ). Obviously this fct plces n upper boun to the lst two terms of (). Using BGRP, one cn expect tht the source ASs will choose to ct s ggregtors if they wnt their users session to enjoy n en-to en QoS. In this cse, the ggregtion penlty is unconitionlly impose to ll the ege omin borer routers. From the bove elements it is cler tht in n en-to-en communiction BGRP behves more efficiently thn Aggregte RSVP. owever, wht both protocols (i.e., [8] n [9]) o not offer is the support for the cses where terminl moves from one re to nother such tht the new brnch of the en-to-en pth bypsses the ggregtor. For exmple, in cse terminl locte in AS S performs hnover (e.g., from UMTS opertor to wireless ISP) to the S3 system then neither BGRP nor ggregte RSVP will hve ny mens to etect tht. Thus, en-to-en signling will be issue to reserve resources tht re lrey reserve. In this cse, the moving terminl will fce unnecessry ely n the opertors will en up with n mount of oublereserve resources ue to moving terminls. MT S3 NSP_QUERY (Flow Is, RR) NSP_RESERVE NSP_RESPONSE T (RR, RESERVE Info) T5 (RR, RESERVEInfo) T (RR,RESERVEInfo) Figure : MBGRP opertion in source movement IV. MBGRP DESCRIPTION S (RR, RESERVEInfo) MBGRP is n extension of BGRP tht tkes into consiertion the terminls mobility. It is esigne to cooperte with the protocols esigne in NSIS. For this, we ssume tht MBGRP uses GIST [4] to trnsfer its messges. We lso ssume tht the borer routers in the stub omins (i.e., S i, D i, where i =..8 in fig ) support both NSP [5] n MBGRP. As with BGRP, MBGRP nees to be plce only in the borer routers of the ASs. In ition to BGRP, MBGRP requires tht the recor route informtion be communicte to the en terminls, through, for exmple, NSP. This informtion is neee in cse of hnover, n is use by the mobile terminl to notify MBGRP routers tht resources hve lrey been reserve for certin pth. The informtion is lso use by the MBGRP routers to check if they re crossover routers or not. Another extension to BGRP is the ition of two messges, clle R_ n NOTIFY. These messges re neee when terminls locte t the root of the MBGRP sink tree chnge their loction. When new session nees to reserve resources (receiver initite moe), then n NSP QUERY messge is issue. This messge reches the borer router of the AS (e.g., S). This router will issue MBGRP messge tht inclues the QUERY s messge informtion. The messge will eventully rech the borer router of the estintion AS (e.g., D). The e-ggregtion point will issue NSP QUERY messge towrs the estintion host. The estintion host will issue NSP RESERVE messge tht will eventully rech the source host. This informtion will be trnsferre with messges through the MBGRP enble routers. Finlly, NSP messges will be trnsferre by GIST, trnsprently through the MBGRP routers, to the estintion host. This wy, resources re reserve in n en-to-en fshion but lso, the inter-omin signling sttes n resources re utomticlly ggregte s escribe in [8]. n messges contin the recor route of the pth. This informtion is use in orer to fin the crossover MBGRP noe when terminl chnges ASs. For exmple, suppose tht terminl moves from S to S3. In the BGRP cse, en-to-en n messges nee to be exchnge. Wht tkes plce in the cse of MBGRP is shown in fig.

4 MT D3 T3 T0 T D NSP_RESERVE R_ (RR,RESERVEInfo) R_ (RR, ReserveInfo) (RR, ReserveInfo) (RR, ReserveInfo) In the secon cse, terminl locte in the root of sink tree chnges its loction n the relte cost is given by: Cost= 3* Distnce(crossover, new loction) + Distnce (crossover, ol loction) + Distnce (Crossover, src loction) =5, source move =5 trget move =0 source move =0 trget move Upte messges to ll Routers inclue in RR BGRP-MBGRP NSP_RESPONSE NOTIFY Figure 3: MBGRP opertion in estintion movement Firstly, NSP QUERY messge will be issue (receiver bse reservtion). The messge contins the recor route of the ctive sessions. The first MBGRP router sens messge tht will rech the crossover MBGRP router. This router will recognize tht it is crossover router (its ress is in the recor route list) n will initite two new messges: to relese resources in the ol brnch, n to the new loction of the terminl. A slightly ifferent proceure tkes plce when the moving terminl is t the root of sink tree. Consier the cse where the terminl chnges its loction from D to D3. Since it is receiver-initite reservtion, NSP RESERVE will be issue for its ctive sessions. The first MBGRP router nees to initite the reservtion n ggregtion of resources on the new brnch. Thus, it sens reverse (R_) messge tht eventully reches the crossover MBGRP router. This will ter the resources in the ol pth n will initite / exchnge for the new pth. Upon successful completion of this proceure it will notify the borer MBGRP router of the new AS to sen NSP RESPONSE bck to the terminl. The crossover router hs to upte in the upstrem irection (i.e., towrs the source omins) the informtion store in the MBGRP routers bout the reltion of reserve bnwith n the roots of the sink trees. The number of signling exchnges n processing for BGRP in cse terminl moves from one plce to nother is lwys: Cost = 3 * Distnce (src loction, st loction) This is becuse en-to-en / n messges hve to be issue. For the cost in MBGRP we istinguish two cses. In the first cse, terminl is moving from one source AS to nother: Cost = *Distnce (crossover, new loction) + Distnce(crossover, ol loction) The first term is relte to the exchnge of / messges n the secon one to the isptch of messges Distnce between Crossover n new/ol plce Figure 4: BGRP Vs MBGRP This cost is higher, since prt from the, n messges, R_s nee to be issue n UPDATE messges must trvel ll the wy bck to the communicting terminls in source ASs. In fig 4 we present, for illustrtive resons, some simple exmples of the cost ifference between BGRP n MBGRP, for binry tree topology where the tree length =5 for the first exmple n =0 for the secon. In these exmples, we hve ssume tht the moving terminl hs ctive sessions n it cn move only from one lef to nother. As we cn observe, MBGRP nees to exchnge fr less messges even in the cses where terminl moves from the first lef of the tree to the lst (e.g., from S to S8), or when terminl locte t the root of the sink tree chnges its loction. V. CONCUSIONS In this pper we hve presente rguments on necessity n merits of ggregtion signling, n exmine more eeply the sclbility issues of two ggregtion protocols. After selecting BGRP, bse on its performnce n its potentil to operte in mobile environments, we presente n extene version tht cn work more efficiently when terminl s movement obsoletes the ol ggregtors loction. By mens of simple nlysis we hve shown tht MBGRP results in fewer messges, minimiztion of the lo in core routers s well s the time neee to reestblish the en-to-en QoS supporting pth.

5 REFERENCES [] J. Mnner, X. Fu, Anlysis of Existing Qulity of Service Signlling Protocols, RFC 4094, My 005. [] D. Vli, S. Psklis, A. Kloxylos,. Merkos, A survey of Internet QoS Signlling, IEEE Communictions Surveys n Tutorils, Fourth Qurter 004, Vol6, No 4. [3] IETF Working group, Next Steps in Signlling, [4]. Schulzrinne, R. ncock, GIST: Generl Internet Signling Trnsport, Internet Drft rft-ietf-nsis-ntlp-08.txt [5] J. Mnner, et l., NSP for Qulity-of-Service signlling, Internet Drft, rft-ietf-nsis-qos-nslp-09.txt. [6] Bren, R., Zhng,., Berson, S., erzog, S. n S. Jmin, Resource Reservtion Protocol (RSVP) Version Functionl Specifiction, RFC 05, September 997. [7] S. Blke et l., An Architecture for Differentite Services, IETF RFC 475, December 998. [8] P. Pn, E. hne n. Schulzrinne, BGRP: A Tree-Bse Aggregtion Protocol for inter-domin Reservtions, Journl of Communictions n Networks, Vol.., No., June 000. [9] F. Bker, C. Iturrle, F. e Fucher, B. Dvie, Aggregtion of RSVP for IPv4 n IPv6 Reservtions, IETF RFC 375, September 00. [0] R. Bless, Dynmic Aggregtion of Reservtions for Internet Services, ICTSM 0, Oct. 00. [] R. Sofi, R. Guerin, n P. Veig, SICAP, Shre-segment Interomin Control Aggregtion Protocol, Technicl Report, ESE, University of Pennsylvni, October 00

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

DYNAMIC ROUTING ALGORITHMS IN VP-BASED ATM NETWORKS

DYNAMIC ROUTING ALGORITHMS IN VP-BASED ATM NETWORKS DYNAMIC ROUTING ALGORITHMS IN VP-BASED ATM NETWORKS Hon-Wi Chu n Dnny H K Tsng Deprtment of Electricl & Electronic Engineering The Hong Kong University of Science & Technology, Cler Wter By, Kowloon, Hong

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Bruce McCarl's GAMS Newsletter Number 37

Bruce McCarl's GAMS Newsletter Number 37 Bruce McCrl's GAMS Newsletter Number 37 This newsletter covers 1 Uptes to Expne GAMS User Guie by McCrl et l.... 1 2 YouTube vieos... 1 3 Explntory text for tuple set elements... 1 4 Reing sets using GDXXRW...

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

Overview. Making the Fast Case Common and the Uncommon Case Simple in Unbounded Transactional Memory. Running Example. Background

Overview. Making the Fast Case Common and the Uncommon Case Simple in Unbounded Transactional Memory. Running Example. Background Overview king the Fst Cse Common n the Uncommon Cse imple in Unoune Trnsctionl Colin Blunell (University of Pennsylvni) Joe Devietti (University of Pennsylvni) E Christopher Lewis (Vwre, Inc.) ilo. K.

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Pipeline Example: Cycle 1. Pipeline Example: Cycle 2. Pipeline Example: Cycle 4. Pipeline Example: Cycle 3. 3 instructions. 3 instructions.

Pipeline Example: Cycle 1. Pipeline Example: Cycle 2. Pipeline Example: Cycle 4. Pipeline Example: Cycle 3. 3 instructions. 3 instructions. ipeline Exmple: Cycle 1 ipeline Exmple: Cycle X X/ /W X X/ /W $3,$,$1 lw $,0($5) $3,$,$1 3 instructions 8 9 ipeline Exmple: Cycle 3 ipeline Exmple: Cycle X X/ /W X X/ /W sw $6,($7) lw $,0($5) $3,$,$1 sw

More information

Many analog implementations of CPG exist, typically using operational amplifier or

Many analog implementations of CPG exist, typically using operational amplifier or FPGA Implementtion of Centrl Pttern Genertor By Jmes J Lin Introuction: Mny nlog implementtions of CPG exist, typiclly using opertionl mplifier or trnsistor level circuits. These types of circuits hve

More information

This Unit: Processor Design. What Is Control? Example: Control for sw. Example: Control for add

This Unit: Processor Design. What Is Control? Example: Control for sw. Example: Control for add This Unit: rocessor Design Appliction O ompiler U ory Firmwre I/O Digitl ircuits Gtes & Trnsistors pth components n timing s n register files ories (RAMs) locking strtegies Mpping n IA to tpth ontrol Exceptions

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions

Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions Extening Finite Automt to Efficiently Mtch Perl-Comptible Regulr Expressions Michel Becchi Wshington University Computer Science n Engineering St. Louis, MO 63130-4899 mbecchi@cse.wustl.eu ABSTRACT Regulr

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

How to Design REST API? Written Date : March 23, 2015

How to Design REST API? Written Date : March 23, 2015 Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Efficient Subcubic Alias Analysis for C

Efficient Subcubic Alias Analysis for C Efficient Subcubic Alis Anlysis for C Qirun Zhng Xio Xio Chrles Zhng Ho Yun Zhenong Su The Hong Kong University of Science n Technology BOPU Technologies University of Cliforni, Dvis {qrzhng, richrxx,

More information

Lighting Analysis and Texture Modification of 3D Human Face Scans

Lighting Analysis and Texture Modification of 3D Human Face Scans Digitl Imge Computing Techniques n Applictions Lighting Anlysis n Texture Moifiction of 3D Humn Fce Scns Xiozheng Zhng, Snqing Zho n Yongsheng Go Computer Vision n Imge Processing Lbortory, Griffith School

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

Internet Routing. Reminder: Routing. CPSC Network Programming

Internet Routing. Reminder: Routing. CPSC Network Programming PS 360 - Network Progrmming Internet Routing Mihele Weigle eprtment of omputer Siene lemson University mweigle@s.lemson.eu pril, 00 http://www.s.lemson.eu/~mweigle/ourses/ps360 Reminer: Routing Internet

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018 Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest

More information

Information regarding

Information regarding Informtion regrding LANCOM Advnced VPN Client 3.13 Copyright (c) 2002-2017 LANCOM Systems GmbH, Wuerselen (Germny) LANCOM Systems GmbH does not tke ny gurntee nd libility for softwre not developed, mnufctured

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

Some necessary and sufficient conditions for two variable orthogonal designs in order 44

Some necessary and sufficient conditions for two variable orthogonal designs in order 44 University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering n Informtion Sciences 1998 Some necessry n sufficient conitions for two vrile orthogonl esigns in orer

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Outdoor IEEE Cellular Networks: MAC Protocol Design and Performance

Outdoor IEEE Cellular Networks: MAC Protocol Design and Performance Outoor IEEE 802.11 Cellulr Networks: MAC Protocol Design n Performnce Kin K. eung, Bruce McNir, eonr J. Cimini, Jr., n Jck H. Winters AT&T bs - Reserch Miletown, NJ 07748 Abstrct We explore the fesibility

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

An Integrated Simulation System for Human Factors Study

An Integrated Simulation System for Human Factors Study An Integrted Simultion System for Humn Fctors Study Ying Wng, Wei Zhng Deprtment of Industril Engineering, Tsinghu University, Beijing 100084, Chin Foud Bennis, Dmien Chblt IRCCyN, Ecole Centrle de Nntes,

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

Release Notes for. LANCOM Advanced VPN Client 4.10 Rel

Release Notes for. LANCOM Advanced VPN Client 4.10 Rel Relese Notes for LANCOM Advnced VPN Client 4.10 Rel Copyright (c) 2002-2018 LANCOM Systems GmbH, Wuerselen (Germny) LANCOM Systems GmbH does not tke ny gurntee nd libility for softwre not developed, mnufctured

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Reducing Costs with Duck Typing. Structural

Reducing Costs with Duck Typing. Structural Reducing Costs with Duck Typing Structurl 1 Duck Typing In computer progrmming with object-oriented progrmming lnguges, duck typing is lyer of progrmming lnguge nd design rules on top of typing. Typing

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-232 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Questions About Numbers. Number Systems and Arithmetic. Introduction to Binary Numbers. Negative Numbers?

Questions About Numbers. Number Systems and Arithmetic. Introduction to Binary Numbers. Negative Numbers? Questions About Numbers Number Systems nd Arithmetic or Computers go to elementry school How do you represent negtive numbers? frctions? relly lrge numbers? relly smll numbers? How do you do rithmetic?

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions - The Reciprocl Function Fmil Objectives To grph reciprocl functions To grph trnsltions of reciprocl functions Content Stndrds F.BF.3 Identif the effect on the grph of replcing f () b f() k, kf(), f(k),

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information