A Key Management Solution for Secure Routing in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "A Key Management Solution for Secure Routing in Mobile Ad Hoc Networks"

Transcription

1 A Key Maagemet Solutio for Secure Routig i Mobile Ad Hoc Networks Sulaima ASHRAPH asulaima@ur.ac.rw Natioal Uiversity of Rwada Butare, Rwada ad Dawoud S DAWOUD dsheouda@ur.ac.rw Natioal Uiversity of Rwada Butare, Rwada ad Adrois NIYONKURU aiyokuru@ur.ac.rw Natioal Uiversity of Rwada Butare, Rwada ABSTRACT This paper ivestigates the eed for security ad more specifically key maagemet for secure routig i mobile ad hoc etworks. A key maagemet protocol is proposed for o-demad ad hoc routig protocols. The proposal provides key distributio ad security evaluatio to allow the most secure path to be selected durig route discovery. Simulatios modeled i s-2 ivestigate the success of the key distributio mechaism ad security scheme. Keywords: Ad hoc etworks, Trust chai, O-demad routig protocol, Secure Routig. 1. INTRODUCTION With recet wireless techology advaces mobile ad hoc etworks have foud icreasig applicatio i the military ad commercial domai. However the uique characteristics of mobile ad hoc etwork make them difficult to secure. Such characteristics iclude the lack of etwork ifrastructure, o prior relatioships, ureliable multi-hop commuicatio chaels, resource limitatio ad ode mobility. Before these dyamic etworks ca be deployed ito the commercial ad military area they must be secured agaist malicious attackers. We idetify that most of the security attacks target the etwork layer ad more specifically the routig protocol. Such attacks iclude blackhole attacks, wormhole attacks, eavesdroppig attacks, byzatie attacks, resource cosumptio attacks ad routig table poisoig. The etwork layer provides a critical service to the mobile ad hoc etwork, called the routig protocol. I the cotext of trust ad security the provisio of secure routes is oe of the most vital elemets for trust establishmet. Adversaries target the routig protocol specifically ad a secure routig solutio is eeded for a secure implemetatio ad deploymet of ad hoc etworks. Secure ad hoc routig protocols exist but their operatioal assumptios typically iclude a existig key maagemet system. The followig sectio ivestigates the operatioal requiremets for existig secure ad hoc routig protocols. Secure ad hoc routig protocols are divided ito three categories: symmetric cryptography, asymmetric cryptography, ad reputatio based protocols. Although symmetric cryptographic approaches do ot rely o a public key ifrastructure they still require some kid of key maagemet i a ad hoc etwork. The SEAD protocol [1] desiged for the table-drive DSDV routig protocol requires a key maagemet mechaism to distribute a autheticated iitial hash elemet. SEAD uses a oe-way hash fuctio to provide hop-by-hop autheticatio for routig packets hop cout ad sequece umbers. Ariade [2] proposed a DSR based o-demad protocol uses TESLA autheticatio [3] to provide ed-to-ed autheticatio. A key maagemet system is assumed preset to distribute the TESLA keys. TESLA autheticatio also requires clock sychroizatio betwee participatig odes which is difficult without the presece of a olie TTP. ARAN [4], SAODV [5] ad SLSP [6] use asymmetric cryptography ad key maagemet is simply assumed for each of these protocols. ARAN assumes that a olie TTP is preset that acts as a certificate authority (CA) to provide edto-ed autheticatio i a o-demad eviromet. Prior shared secrets are assumed betwee all participatig odes ad the CA. The SAODV protocol is based o the AODV odemad routig protocol ad provides ed-to-ed autheticatio by autheticatig the routig packets mutable fields with a hash chai ad immutable fields with a digital sigature [5]. SAODV assumes the presece of a key maagemet system to distribute keys ad iitial hash elemets. SLSP secures a table drive lik state routig protocol (OLSR) by providig secure eighbor discovery ad autheticated lik state updates [6]. SLSP uses digital sigatures ad assumes that odes eter the etwork with asymmetric key pairs ad a key maagemet scheme is preset to certify the keys i the etwork. ODSBR [7] is based o the o-demad DSR routig protocol. ODSBR autheticates its routig packets with digital sigatures

2 ad a public key ifrastructure is assumed to maage the keys. ODSBR employs a reputatio based mechaism to moitor data packets ad maitai a path specific ratig list. Shared keys are assumed to allow for autheticated ackowledgemet messages to be trasmitted betwee a source ad probe odes which provide the evidece for path ratig. CONFIDANT [8] is aother reputatio based solutio which does ot use ay cryptographic techiques ad therefore does ot require a key maagemet system. CONFIDANT does assume pre-exitig relatioships betwee a small umber of odes called frieds. The CONFIDANT is a o-demad solutio which provides a ode specific reputatio list to help selectig secure paths durig route discovery. The observatio is made that most secure ad hoc routig protocols assume the existece of a key maagemet system to certify, autheticate, ad distribute keyig iformatio. Pure mobile ad hoc etworks caot assume the existece of a trusted third party (TTP) ad must address the problem of key maagemet. 2. OUR APPROACH a. System Model We view the trust problem i ad hoc etworks as a weighted trust graph G(V,E) where the vertex V represet odes ad the edges E represet paths. There is o TTP preset durig commuicatio. The routig eviromet is o-demad. Each ode is assumed to have a asymmetric key pair before eterig the etwork. We desig a key maagemet system to provide key maagemet for secure o-demad routig protocols. The system operatio is as follows. A key distributio scheme is proposed which is divided ito two compoets: localized key exchages ad remote ed-to-ed key exchages. A local autheticatio is performed by exchagig keys betwee close proximity eighbours over a locatio-limited chael. Remote ed-to-ed key exchage uses the established localized relatioships to share keys remotely across multiple hops. The security evidece provided by certificates is allowed to ifluece the selectio of routes durig the route discovery phase. We propose a security evaluatio metric which aggregates trust alog a path based o a security metric ad path distace. Similar to [14], we cosider a fully distributed etwork of wireless odes with geeric medium access cotrol (such as IEEE ) ad secure o- demad routig mechaisms. Nodes ca be statioary or move with low to high mobility speeds (0m/s -20m/s). We assume that there are o pre-existig ifrastructure ad o form of olie trusted authority to assist the key distributio mechaism. Sice we are cosiderig authority-based MANETs as defied i [14], there exists a offlie authority to bootstrap the system; before users joi the etwork they have to acquire a certificate from the offlie trusted authority. The trusted authority thus oly provides each ode with its ow certificate ad ot with the certificates of ay other odes. This requiremet is fudametal to esurig scalability ad o-demad etwork formatio. Each ode is also issued with the authetic public key of the trusted authority ad a uiversal set of system parameters. The certificate must cotai the offlie authority s idetity, the ode s public key ad idetity/etwork address, a uique sequece umber, certificate geeratio date ad expiry date b. Key distributio scheme 1) Localized key exchage: Neighbourig odes ca securely exchage keyig material without the presece of a TTP. Nodes i close proximity first exchage preautheticatio iformatio across a locatio-limited chael. Locatio-limited chaels iclude ifrared, physical cotact, audio, etc. Because of the ature ad characteristics of a locatio-limited chael like ifrared the eighbors ca be assured that the pre- autheticatio is legitimately from the seder. After users exchage pre-autheticatio iformatio a group certificate exchage scheme is implemeted over the mai wireless chael. Certificates bidig a ode s uique ID ad public key are exchaged ad autheticated usig the previously acquired pre- autheticated iformatio. Followig the routig protocol the localized key exchage has two approaches. Firstly followig a route request immediate odes perform a localized key exchage. Alteratively localized key exchage would follow a hello packet broadcast of a odemad routig protocol like AODV. 2) Remote ed-to-ed key exchage: The certificate of the source ode A is forwarded alog the request route packet RREQ idepedet of the routig packets. At each hop the itermediate ode is iquired if it possesses the source s certificate. If ot a separate uicast message is set back to the previous hop requestig the sources certificate. This procedure follows the RREQ util it reaches its target. The destiatio ode B caches the sources certificate ad replies with a route reply message RREP. The RREP is forwarded alog the reverse path ad at each itermediate ode the local certificate repository is checked if it cotais the destiatio s certificate. If the certificate is ot foud a uicast certificate exchage similar to the forward path oe is performed. All the certificates are verified o the REPP route. This approach miimizes uecessary certificate verificatios o paths which will ot be selected. Whe a ode (RN) receives a routig cotrol packet it checks i its certificate database if it has the certificates of the packet origiator (ON) ad the previous hop ode (PN) o the forward route. If RN has both the certificates of ON ad PN (CertON ad CertPN), it ca process the cotrol packet as ormal. If ot, it requests both the certificates from PN. If RN does ot have the certificate of PN, the it also seds its ow certificate with the request to the previous- hop. Figure 1: Certificate distributio mai procedure

3 Note that if RN is the first-hop o the route, the the previoushop ode ad the cotrol packet origiator ode will be the same etity. The routig messages thus effectively chai odes together ad allow them to relay all keyig material, as required, alog the virtual chais. The proposed key distributio scheme, works as follows: Whe ay ode i the etwork receives a RCP it first determies if the origiator of the message (ON) has the same etwork address as the previous hop ode (PN) o the forward route, that is, RN has to determie if ON is the first-hop. I case whe the addresses of ON ad PN are the same, the RN rus: Protocol 1: RN searches its certificate repository for ON certificate If foud, Process the routig message RCP ON ad RN Exchage Certificate (Peer-to- Peer) CertRN ON, ON CertON Process the routig message RCP If the ON address ad the previous-hop ode (PN) address are ot equal, RN rues protocol 2. The RN will search its certificate repository for CertON ad CertPN. Protocol 2: RN searches its repository for CertPN If Foud, Search for CertON If Foud No actio, process routig packet as ormal Peer-to-Peer certificate exchage CertRN PN, CertPN RN Search for CertON If Foud Cert PN, CertPN RN Peer-to-Peer certificate exchage CertRN Cert PN CertPN CertON RN Process routig packet as ormal c. Security Evaluatio Scheme The key distributio scheme follows the route discovery phase exchagig keys locally ad remotely. The security evaluatio scheme ehaced the route discovery phase. This compoet s core approach is to provide trust path selectio based o both distace ad a security metric. The ad hoc etwork is modeled as a weighted trust graph G(V,E) where the edges E are odes with a weighted trust metric t. This trust metric is assumed to be available based o either public key certificates or a reputatiobased moitorig system. The vertexes V represet the weighted paths or routes i the etwork. We propose a evaluatio metric for these weighted paths. We propose the use of the semirig mathematical operators ad to aggregatio trust alog a multi-hop path of the ad hoc o-demad protocol. The distace semirig approach uses the operator to aggregate metrics alog a path like parallel resistors would be summed ie The aggregated value will decrease alog RT R1 R2 R a path ad the total is always less tha the summatios smallest compoet. This descriptio aligs with our desig specificatios. The aggregated value will be low for routes with high hop couts. Secodly it will reflect the trust characteristics of a trust chai which states that a chai is oly as strog as its weakest lik. Followig the route discovery phase, at each hop of a RREQ the curret path weight is calculated ad compared to a implicit path revocatio threshold. If the aggregated trust is more tha the threshold value the path ad associated weight are stored i the routig table correspodig to the reverse route ad the RREQ is forwarded. Similarly at each hop of a RREP the curret path weight is calculated ad stored i the routig table matchig the forward route. Multiple replies to a sigle RREQ are filtered by the hop cout metric i stadard AODV ad DSR o- demad routig protocols. We propose that routes are filtered based o their sequece umber ad their semirig based weighted path metric. This filters the most recet routes ad based o the ature of the weighted path metric, hop cout ad trust are both accouted for. 3. RELATED WORK Key maagemet solutios are preseted i [9-11]. The self issuig certificate chai approach i [12] proposes a self orgaized key maagemet solutio that treats the etwork as a weighted direct graph. This proposal is a proactive methods desiged for applicatio layer security. Proximity based key agreemet is ivestigated i [13] ad agai by Capku i [14] where security relies upo odes mobility to provide multiple close proximity key exchages. This proposal is limited by its reliace o mobility. A proactive reputatio-based solutio is proposed i [15] which operates o the applicatio layer. Semi- rig mathematics [16] is used to realize the proactive geeric-sigle-source-shortestdistace algorithm. The majority of literature metioed fuctios i a proactive maer for applicatio layer solutios. We propose a reactive approach for the etwork layer 4. EVALUATION Our approach is simulated as a C++ etwork layer applicatio i s-2. It is plaed for ad hoc o- demad routig protocols ad desiged o the AODV routig protocol but our solutio is ot protocol specific. The key distributio scheme is simulated ad test i large ode eviromet with varyig mobility ad load. The packet delivery ratio is examied to ivestigate how the security mechaism affects the success of the routig protocol. The ormalised routig load is ivestigated to show the overhead of the key exchage compoets. The security evaluatio scheme is difficult to evaluate usig simulatios. The scearios is established where the assumed weighted ode edges carry a security metric

4 which idetifies fault detectio or data trasmissio errors carried out by odes for example i [7, 8]. This allows the proposal to protect agaist black hole attacks. Simulatios are set up which ivestigate the packet delivery ratio with a chagig umber of adversary odes. i) Performace Metric The followig quatitative metrics are used to aalyze the performace of the routig protocols i mobile ad hoc etworks. (a) Packet Delivery Ratio: The packet delivery ratio (PDR) represets the percetage of data packets that are successfully received by their iteded destiatio. This metric is also kow as throughput ad is cosidered a measuremet of the effectiveess of a routig protocol. The equatio for PDR is: 1 CBRrec PDR% = CBRset where 1 CBRrec ad 1 CBRrec are the umber of CBR data packets received ad set respectively. (b) Routig Overhead: A routig protocol uses cotrol packets to establish routes o which data packets are trasmitted. Cotrol packets are separate from data packets but share the same commuicatio chael. Due to the lack of chael capacity i mobile ad hoc etworks a large umber of cotrol packets ca result i poor etwork performace. Key maagemet would require additioal cotrol packets to achieve key maagemet fuctioality this will be reflected i the simulatios. The routig overhead is also kow as a routig protocol s iteral efficiecy ad will represet the umber of cotrol packets used for a give protocol. (c) Average Ed-to-Ed Delay: This is a qualitative measuremet of the delay of data packets. The average ed-toed delay of a data packet is the time from which it is created at the source ad whe it arrives at the iteded destiatio. The delay icludes propagatio ad queuig delay. Delay ca be caused by a high umber of cotrol packets propagatig i the etwork or a high computatioal overhead for the give protocol. The average ed-to-ed delay is calculated as follows, 1 CBRsedtime CBRrecvtime Ed to Ed Delay = 1 CBRrec where CBRsedtime ad CBRrecvtime represet the record times that a CBR data packet was set ad received ii) Simulatio Model A routig protocol was desiged i C++ based o the AODV routig protocol available i the s-2.31 package. The routig protocol is programmed as a routig aget class. The routig aget hadles the establishmet of routes ad certificate distributio. Modificatios are made to the AODV routig aget at the RecvRequest, SedRequest, RecvReply, ad SedReply fuctios. These modificatios allow for the distributio of separate certificate packets, triggered by the routig packets. The routig aget s packet header was modified to iclude a certificate cotrol packet CertS. The size of the certificate icluded is 450 bytes. The size of the certificate cotrol packets is icreased resultig i a effective delay i commuicatio simulatig the trasfer of actual certificates. A certificate table is icluded at each ode CertTable which is updated by certificate cotrol packets. The certificate table is liked to the routig table ad each ode is resposible for maagig its ow certificate table. A simulatio tcl file is writte to setup the mobile ad hoc etwork s desired simulatio sceario, traffic ad mobility model. The trace support files i s-2.31 were modified to support the routig aget allowig the iclusio of certificate cotrol packets ad trust iformatio. As a result the output trace ad am files reflect the operatio of the routig aget. Figure 2 shows a sample output of the am simulatio file. Figure 2: Sample am simulatio file illustratig typical etwork topology iii) Packet Delivery The packet delivery results for the AODV routig protocol is preseted i Figure 3 & 4. Figure 3 represets a simulatio eviromet with a pause time of 0 secods. This represets a etwork of odes that are cotiually movig, while Figure 4 represets a partially stable etwork. The observatio is made that as the speed icreases both protocols throughput decreases. At high speeds the etwork topology chages rapidly causig breakages i routig liks. The reductio i packet delivery at high speeds is because both protocols will drop data packets as a result of icreased routig breakages. The stable etwork i Figure 4 shows better performace at higher speeds because the umber of route lik breakages is reduced as a result of a larger pause time. A large pause time represets a etwork that will move at a give speed the pause i a fixed locatio for a set amout of time. Durig this time routig lik breakages are ot expected util movemet commeces agai. A certificate distributio scheme would expect a severe reductio i performace due to a excessive umber of packets beig trasmitted i the etwork or the additioal size of the cotrol packet. A covetioal certificate distributio scheme, suggested as a possible solutio i [8], simply icludes the source certificate i the request packets RREQ ad the destiatios certificate i the reply packets RREP. This method was implemeted as a separate routig aget AODVcert i s2. A similar method is suggested i [6]. Implemetatio icludes icreasig the packet size of the routig cotrol packets to iclude a 450 byte certificate. This effectively icreased the regular 56 byte AODV route cotrol packets to 506 bytes. Such a approach would result i the simplest method of certificate distributio but trasmittig 450 bytes more data per cotrol packet would severely reduce the etwork performace. 5. CONCLUSION It is cocluded from ivestigatio of existig secure ad hoc routig protocols that the majority assume the existece of a key

5 PDR % PDR % maagemet system to distribute ad maage the asymmetric or symmetric keys. We propose a key maagemet solutio that provides a key exchage scheme ad a security evaluatio scheme. The proposal is desig for a o-demad ad hoc routig protocol. Simulatios i s-2 ivestigate the packet delivery ratio of the solutio s key exchage scheme compared at varyig load ad mobility. The security evaluatio scheme allows for the most trusted route to be selected durig the route discovery phase. A available security metric is assumed ad simulatios ivestigate the success of prevetig black hole attacks Speed (m/s) AODV: pausetime = 0s AODVcert: pausetime = 0s Figure 3: Packet Delivery Ratio for highly mobile etwork (0 secod pause time) Speed (m/s) AODV: pausetime = 250s AODVcert: pausetime = 250s Figure 4: Packet Delivery Ratio for partially stable etwork (250 secod pause time) 5. REFERENCES [1] Y.-C. Hu, D. B. Johso, ad A. Perrig, "SEAD: Secure Efficiet Distace Vector Routig for Mobile Wireless Ad Hoc Networks", i Proceedigs of the Fourth IEEE Workshop o Mobile Computig Systems ad Applicatios: IEEE Computer Society, [2] Y.-C. Hu, A. Perrig, ad D. B. Johso, "Ariade: a secure o-demad routig protocol for ad hoc etworks", Wireless Networks, vol. 11, pp , [3] A. Perrig, R. Caetti, D. Sog, ad D. Tygar, "Efficiet ad Secure Source Autheticatio for Multicast", Network ad Distributed System Security Symposium (NDSS'01), [4] K. Sazgiri, B. Dahill, B. N. Levie, C. Shields, ad E. M. Beldig-Royer, "A Secure Routig Protocol for Ad Hoc Networks" i Proceedigs of the 10th IEEE Iteratioal Coferece o Network Protocols: IEEE Computer Society, [5] M. G. Zapata, "Secure ad hoc o-demad distace vector routig," SIGMOBILE Mob. Comput. Commu. Rev., vol. 6, pp , [6] P. Papadimitratos ad Z. J. Haas, "Secure Lik State Routig for Mobile Ad Hoc Networks," i Proceedigs of the 2003 Symposium o Applicatios ad the Iteret Workshops (SAINT'03 Workshops): IEEE Computer Society, [7] B. Awerbuch, R. Curtmola, D. Holmer, C.Nita- Rotaru, ad H. Rubes, "ODSBR: A o-demad secure Byzatie resiliet routig protocol for wireless ad hoc etworks," ACM Tras. If. Syst. Secur., vol. 10, pp. 1-35, [8] S. Buchegger ad J.-Y. L. Boudec, "Performace aalysis of the CONFIDANT protocol," i Proceedigs of the 3 rd ACM iteratioal symposium o Mobile ad h oc etworkig & computig, Lausae, Switzerlad: ACM, [9] S. Basagi, K. Herri, D. Bruschi, ad E. Rosti, "Secure pebbleets," i Proceedigs of the 2d ACM iteratioal symposium o Mobile ad hoc etworkig & computig, Log Beach, CA, USA: ACM,2001. [10] L. Zhou ad Z. J. Haas, "Securig Ad Hoc Networks," IEEE Network: special issue o etwork security, vol. 13, pp , [11] D. B. Smetters, D. Balfaz, D. K. Smetters, P. Stewart, ad H. C. Wog, "Talkig To Stragers: Autheticatio i Ad-Hoc Wireless Networks," [12] S. Capku, L. Butty, ad J.-P. Hubaux, "Self- Orgaized Public-Key Maagemet for Mobile Ad Hoc Networks," IEEE Trasactios o Mobile Computig, vol. 2, pp , [13] A. Scaell, A. Varshavsky, A. LaMarca, ad E. D. Lara, "Proximity-based autheticatio of mobile devices," Iteratioal Joural Secure Networks, vol. 4, pp. 4-16, [14] S. Capku, L. Buttya, ad J.-P. Hubaux, "Mobility Helps Peer-to-Peer Security," IEEE Trasactios o Mobile Computig,vol. 5, pp , [15] G. Theodorakopoulos ad J. S. Baras, "O Trust Models ad Trust Evaluatio Metrics for Ad-Hoc Networks," IEEE Joural o Selected Areas i Commuicatios, vol. 24, pp , [16] M. Mohri, "Semirig frameworks ad algorithms for shortest-distace problems," Joural o Autom. Lag. Comb., vol. 7, pp ,2002.

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Rushig Attacks ad Defese i Wireless Ad Hoc Network Routig Protocols Yih-Chu Hu Caregie Mello Uiversity yihchu@cs.cmu.edu Adria Perrig Caregie Mello Uiversity perrig@cmu.edu David B. Johso Rice Uiversity

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2010 Itake Semester 7 Examiatio CS4532 CONCURRENT PROGRAMMING Time allowed: 2 Hours September 2014

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de

More information

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Randomized and Quantum Protocols in Distributed Computation

Randomized and Quantum Protocols in Distributed Computation Radomized ad Quatum Protocols i Distributed Computatio Michael Be-Or The Hebrew Uiversity Michael Rabi s Birthday Celebratio Radomized Protocols Power of Radomizatio Expoetial speedup for kow algorithms

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, Aalysis of the various key maagemet algorithms ad ew proposal i the secure multicast commuicatios Joe Prathap P M. Departmet of Iformatio

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Quorum Based Data Replication in Grid Environment

Quorum Based Data Replication in Grid Environment Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Statistical Performance Analysis Routing Algorithms for Wimax - Wi-Fi Integrated Heterogeneous Network

Statistical Performance Analysis Routing Algorithms for Wimax - Wi-Fi Integrated Heterogeneous Network Vol.3, Issue.2, March-April. 2013 pp-1032-1037 ISSN: 2249-6645 Statistical Performace Aalysis Routig Algorithms for Wimax - Wi-Fi Itegrated Heterogeeous Network Poulomi Das, 1 Aridam Baerjee, 2 Prof. Siladitya

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic. Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

IPv6 Routing Protocols. ISP Training Workshops

IPv6 Routing Protocols. ISP Training Workshops IPv6 Routig Protocols ISP Traiig Workshops 1 Iitial IPv6 Cofiguratio for Cisco IOS 2 IPv6 Cofiguratio o Cisco IOS p To eable IPv6 the followig global commads are required: Router(cofig)# ipv6 uicast-routig

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Simulation based Analysis of TCP Variants over MANET Routing Protocols using NS2

Simulation based Analysis of TCP Variants over MANET Routing Protocols using NS2 Simulatio based Aalysis of TCP Variats over MANET Routig Protocols usig NS2 Navreet Kaur M.Tech CSE Studet MMU Mullaa(Ambala) Sadhya Umrao Research Scholar,CSE Dept. MMU Mullaa (Ambala) Rajeesh Kumar Gujral,

More information