A MAC layer protocol for wireless networks with asymmetric links

Size: px
Start display at page:

Download "A MAC layer protocol for wireless networks with asymmetric links"

Transcription

1 A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of Cenral Florida Orlando, FL Absrac We inroduce AsyMAC, a MAC layer proocol for wireless neworks wih asymmeric links and sudy a proocol sack consising of AsyMAC and he A 4 LP rouing proocol. The wo proocols are able o mainain conneciviy where he sandard IEEE MAC proocol coupled wih eiher AODV or OLSR rouing proocols may loose conneciviy. A comparaive sudy shows ha AsyMAC improves on wo previously proposed proocols accuracy in deermining he nodes o be silenced o preven collisions. Key words: Asymmeric link, AsyMAC, heerogeneous MANET 1 Inroducion Asymmeric links are presen in wireless neworks for a variey of physical, logical, operaional, and legal reasons: (a) The ransmission range is limied by he node hardware. The hardware properies of he node (for insance, he anenna or he RF circuis) deermine he maximum ransmission range. The differen ransmission ranges of he nodes lead o asymmeric links, which canno be avoided excep by physically changing he nodes hardware componens, for insance by insalling a differen anenna. (b) Power limiaion. Differen nodes may have differen power consrains. For insance, node A may have sufficien power reserves and a ransmission range enabling i o reach node B; however, node B has limied power, and eiher (i) canno reach node A, or (ii) may choose no o reach node A o save Preprin submied o Elsevier Science 13 April 2007

2 power. The wo scenarios influence he design of he proocols in differen ways. In he second scenario, node B is capable o reach node A and we could exploi his capabiliy for shor ransmissions when necessary, e.g., during a nework seup phase. (c) Inerference. Node A can reach node B and node B can reach node A, bu if node B would ransmi a a power level sufficien o reach node A, i would inerfere wih node C who migh be a licensed user of he specrum. This scenario is criical for ransmiers which aemp o opporunisically exploi unused pars of he licensed specrum (such as unused elevision channels). Even if operaing in he unlicensed bands, dynamic specrum managemen arrangemens migh have given he prioriy o node C, hus node B needs o refrain from sending a a power level above a given hreshold. (d) Sealh consideraions. Node A and node B aemp o communicae and hey wish o hide he exisence or he exac locaion of node B from node O. One way o achieve his is o resric he ransmission power of node B o he minimum and/or ransmi on frequencies which make locaion deecion more difficul. This is especially imporan in miliary/balefield applicaions where low probabiliy of deecion (LPD) is an imporan consideraion [20, 21]. (e) Dynamic specrum managemen. In he emerging field of sofware defined radios, he nodes can ransmi virually in any band across he specrum, bu hey need o share he specrum wih devices belonging o licensed operaors as well as devices wih limied flexibiliy. Once any of he reasons discussed previously force a link o be unidirecional addiional consrains, e.g., he need for a reverse pah beween some pairs of nodes may cause oher links o change heir saus and operae in a unidirecional mode, even when here is no oher reason for unidirecionaliy. Inabiliy of some MAC proocols o exploi he asymmery of some of he communicaion channels could lead o an inefficien bandwidh uilizaion, or, in he wors case, o inabiliy o connec some of he nodes. To exploi he asymmeric links, he proocols mus be able o deliver he acknowledgemens back o he sender in a direcion opposie o he direcion of he asymmeric link. Furhermore, he problem of hidden nodes appears more ofen and in more complex forms han in he case of symmeric links. Depending wheher he rouing proocol of he wireless ad hoc nework is able o handle asymmeric links, he MAC proocol migh need o hide he exisence of asymmeric links wih a symmeric overlay. The challenge for a MAC layer proocol able o exploi asymmeric links is o solve he hard problems menioned above, while keeping he cos incurred lower han he benefis obained from he uilizaion of he asymmeric links. MAC proocols for asymmeric links were previously proposed by Poojary e 2

3 al. [15], Fujii e al. [6] and ohers. In his paper, we inroduce a new proocol, AsyMAC (asymmeric MAC) ha uses a geomeric analysis of he hidden node problem in he presence of asymmeric links for a more precise deerminaion of he nodes which need o be silenced during a ransmission. Informally, a hidden node is one ha can inerfere wih he recepion of a daa packe wihou he knowledge of he sender. As a noe, here is a difference beween he concep of a proocol, as he collecion of feaures necessary o implemen neworking a a cerain layer, and algorihm, which refers o he implemenaion of a specific funcionaliy. In his paper, when we refer o a proocol, we concenrae on he subse of funcionaliy necessary o implemen he asymmeric links, hus he erms algorihm and proocol will be used inerchangeably. The paper is organized as follows. Relaed work is presened in Secion 2. Secion 3 presens AsyMAC proocol in every aspecs. Secion 4 describes he simulaion environmen and presens he resuls of he simulaion sudy of he effec of nework load, nework mobiliy and number of nodes. We conclude in Secion 5. 2 Relaed Work MAC layer proocols allow a group of users o share a communicaion medium in a fair, sable, and efficien way. A MAC layer proocol for wireless ad hoc neworks mus address several specific problems: (1) Mobiliy - he connecion beween nodes can become unsable because of he independen movemen of he nodes; (2) Higher error raes - a wireless channel has a higher Bi Error Rae (BER) han a wired nework; (3) Inabiliy o deec collisions during some periods of ime - wireless ransceivers work in a half-duplex mode; nodes do no lisen when alk and do no alk when lisen. The sender is unable o deec he collision and he receiver is unable o noify he sender of he collision during he ransmission of a packe. Collision avoidance is almos mandaory. Carrier Sensing Muliple Access (CSMA) [10], requires every node o sense he channel before ransmiing, and if he channel is busy, refrain from ransmiing a packe. CSMA reduces he possibiliy of collisions in he viciniy of he sender. Muliple Access Collision Avoidance (MACA) [9] and is varian MACAW [2] are alernaive medium access conrol schemes for wireless ad hoc neworks ha aim o solve he hidden node problem by reducing he possibiliy of collisions in he viciniy of he receiver. 3

4 The Floor Acquisiion Muliple Access (FAMA) [7] proocol consiss of boh carrier sensing and a collision avoidance handshake beween sender and receiver of a packe. Once he conrol of he channel is assigned o one node, all oher nodes in he nework should become silen. Carrier Sensing Muliple Access based on Collision Avoidance (CSMA/CA), he combinaion of CSMA and MACA, is considered a varian of FAMA proocols. The IEEE sandard [8] is he bes-known insance of CSMA/CA. In a wireless nework wih symmeric links, a hidden node is one ou of range of he sender, bu in he range of he receiver. The soluion provided by he MAC o he hidden node problem is he RTS/CTS handshake mechanism. [11] analyzes he effeciveness of RTS/CTS handshake mechanism, and indicaes ha some of he hidden nodes may no be covered by he receiver due o he fac ha i requires much lower power o inerrup a packe recepion han o successfully deliver a packe. RTS DATA CTS ACK CTS s r k RTS DATA CTS XCTS CTS s r k ACK j (a) (b) Fig. 1. (a) Hidden node problem in a classical wireless nework wih mobile nodes. All links are assumed o be bidirecional. A hidden node is a node ou of he range of he source and in he range of he receiver node. k is a hidden node for a ransmission from node s o node r. (b) Hidden node problem in a heerogeneous wireless nework wih mobile nodes. A hidden node is a node ou of he range of he sender and whose range covers he receiver. k is a hidden node for ransmission from node s o node r. We can define a hidden node in wireless ad hoc neworks wih asymmeric links as a node ou of he range of he sender and whose range covers he receiver (See Figure 1(b)). Thus, a hidden node is hidden from he sender and possibly from he receiver as well. The RTS/CTS handshake mechanism is no a soluion for such neworks since a CTS packe may no be able o reach hidden nodes. Several soluions o he hidden node problem in wireless ad hoc neworks wih asymmeric links are discussed in he lieraure. Poojary e al. [15] propose ha a node rebroadcass a CTS packe if i is received from a low-power node. To decrease he probabiliy of collisions, each node wais a random number (1... 6) of SIFS (Shor Iner-Frame Spacing) periods before ransmiing a CTS packe. Fujii e al. [6] made several improvemens relaive o [15]: (i) no only 4

5 CTS bu also RTS packes are rebroadcased; (ii) nodes wih a CTS packe o rebroadcas, firs sense he channel and ransmi only if he channel is no busy; and (iii) only high-power nodes rebroadcas RTS or CTS packes. The soluions proposed by [15] and [6] can lead o inefficien use of he channel if nodes are misclassified as hidden nodes. In such siuaions, nodes ha could have been acive are silenced due o misclassificaion, severely degrading he channel uilizaion. [15] and [6] rouinely assume rouing over symmeric links so ha he sender is able o receive boh CTS and ACK packes. In he presence of asymmeric links, however, he sender migh no receive he CTS or ACK packes, hus he sender canno rigger he ransmission of DATA packes, and does no know wheher a ransmission was successful or no. Bao e al. [1] propose a collision-free dynamic channel access scheduling algorihm PANAMA. Two scheduling algorihms are proposed for neworks wih unidirecional links, NAMA-UN ha is node acivaion oriened and suppors broadcas raffic efficienly, and PAMA-UN ha is link acivaion oriened and is more suiable for relaying unicas raffic. The channel access is allocaed for NAMA-UN and PAMA-UN alernaively, wih each scheduling algorihm lasing for a fixed amoun of ime. In PANAMA, he sender node is able o deec he hidden node ha also aemps o relay raffic o he receiver. The winner of a conenion is he node wih higher prioriy. When he link from he hidden node o he receiver is unidirecional, he hidden node may no be aware of he sender. In hese cases, he hidden node is auomaically considered as having a higher prioriy. The proocols considered previously are based on he modificaion of he MAC proocol. In conras, he Sub Rouing Layer (SRL) projec [17, 16] handles asymmeric neworks by adding an inermediary layer beween he MAC and nework layers. This layer parially isolaes he rouing proocol from he MAC layer, alhough i sill allows he rouing proocol o direcly conac he MAC layer. For unidirecional links, reverse pahs are compued using he Reverse Disribued Bellman-Ford algorihm. The SRL implemenaion also signals he deecion of new neighbors and he loss of (unidirecional) links. A MAC layer proocol able o uilize asymmeric links should be sacked ogeher wih rouing proocols ha can uilize asymmeric links as well. A 4 LP [19] is a locaion-aware and power-aware rouing proocol designed for ad hoc neworks wih asymmeric links. In A 4 LP, neighbors are re-classified as In-bound, Ou-bound, and In/Ou-bound neighbors due o he asymmery of links. A 4 LP is composed by a neighbor discovery proocol, a pah discovery proocol, and a pah mainenance mechanism. A 4 LP proposes an advanced flooding echnique - m-limied forwarding. Receivers can re-broadcas a packe only if is finess value exceeds a predefined hreshold, specified by he sender. The finess funcion used by m-limied forwarding can be uned o minimize he power consumpion, maximize he sabiliy of he roues, minimize he 5

6 error raes or he number of reransmissions. By avoiding a full broadcas, m- limied forwarding reduces he cos of pah discovery. A 4 LP is a hybrid ad hoc rouing proocol, combining feaures of boh pro-acive and on-demand proocols. The roues o In-, Ou-, and In/Ou-bound neighbors are mainained by periodic neighbor updae and immediaely available upon reques, while he roues o oher nodes in he nework are obained by a pah discovery proocol. In he following secions, we inroduce a new MAC layer proocol for ad hoc neworks wih asymmeric links (AsyMAC). AsyMAC currenly works wih A 4 LP, since hey share he process of neighbor discovery and neighbor mainenance. 3 The asymmeric MAC (AsyMAC) proocol 3.1 Topological consideraions The handling of he hidden nodes is an essenial problem for wireless MAC proocols operaing in he presence of asymmeric links. We inroduce opological conceps necessary o define a hidden node of a nework wih asymmeric links. The connecion beween wo nodes is described by he Boolean reachabiliy funcion R(i, j, ) which can be inerpreed as follows: a node i can send a packe o node j a ime if and only if R(i, j, ) = rue. A link beween wo nodes is symmeric if R(i, j, ) = R(j, i, ) = rue. Noe, ha he reachabiliy is a ime varying funcion; he connecion can be affeced by various channel condiions, fading, he mobiliy of he node or he mobiliy of he obsacles in he field. We assume ha every node is aware of he curren values of he reachabiliy funcion beween iself and he neighboring nodes (in boh direcion). In he A 4 LP/AsyMAC proocol sack, i is he role of he neighbor discovery proocol of A 4 LP o find hese values and keep hem up-o-dae. Alhough neighbor discovery is a common feaure of ad hoc rouing proocols, mos proocols will no deec oubound neighbors, because he confirmaion message will no reach back o he originaing node. Asymmeric rouing proocols, such as A 4 LP have a provision o roue back he confirmaion messages even in he absence of a direc link, hus allowing he discovery of he full asymmeric reachabiliy marix. In he following definiions we omi he ime parameer even hough all he ses are variable in ime, a fac which needs o be considered by he proocols relying on hem. 6

7 We define a series of opological conceps relaed o communicaion in he presence of asymmeric links and illusrae for he simple scenario in Figure 2; a sender node s sends a packe o he receiver node r in he viciniy of nodes The circles cenered a s and r show he ransmission ranges of he sender and he receiver, respecively. The reachabiliy informaion of oher nodes is shown by direced lines; o avoid cluering he figure we do no include he links no relevan o he scenario. In his simple scenario we assume ha he asymmeric links are caused by he nodes having differen ransmission ranges and he ransmission range is a disk; his is no necessarily rue in real life scenarios, and our definiions do no assume a uni disk model s 1 r Fig. 2. An illusraion for opology conceps. The ransmission ranges of he sender s and he receiver r are refleced by he circles cenered a hem. The parial reachabiliy informaion of oher nodes is shown by direced lines. Definiion 1 A se of m nodes i 1, i 2,... i m N are in an m-pary proxy se if each node can reach he oher m 1 nodes eiher direcly or hrough a subse of he oher m 2 members. For insance, in he scenario in Figure 2 he hree pary proxy ses are {r, 1, 6}, {r, 2, 6}, {r, 2, 7}, {r, 3, 7}, {r, 3, 8}, {r, 4, 8}, and {r, 4, 9}. Definiion 2 Call he viciniy of node i, V i he se of all nodes ha could be reached from node i. V i = {j R(i, j)} (1) In our scenario, he viciniy of he receiver node r is V r = {1, 2, 3, 4, 5}. Definiion 3 Call H sr he se of hidden nodes of a ransmission T sr. H sr includes nodes ha are no reachable from he sender, bu from which he receiver is reachable: H sr = {k R(s, k) R(k, r)} (2) 7

8 Noe ha H sr are he hidden nodes for he ransmission of he DATA packes, while H rs are he hidden nodes for he ransmission of ACK packes. In our scenario, he hidden nodes of he ransmission from source node s o receiver node r are H sr = {2, 3, 4, 6, 7, 8, 9}. Definiion 4 Call P 3 i he hree-pary proxy se coverage of node i. P 3 i is he se of nodes which are eiher reachable by node i direcly or paricipae in a hree-pary proxy se wih node i and a hird node. P 3 i = {k R(i, k) j (R(i, j) R(j, k) R(k, i))} (3) In he scenario of Figure 2 he hree-pary proxy se coverage of node r is P 3 r = {1, 2, 3, 4, 5, 6, 7, 8, 9}. Definiion 5 Call H3 sr he hidden nodes of a ransmission T sr in he hreepary proxy se coverage of node r. The se H3 sr includes hidden nodes covered by P 3 r. H3 sr = H sr P 3 r (4) In our scenario, he hidden nodes in he hree-pary proxy se coverage of r are H3 sr = {2, 3, 4, 6, 7, 8, 9}. Definiion 6 Call XH3 sr he exended hidden nodes of a ransmission T sr in hree-pary proxy se coverage of node r. The se XH3 sr includes nodes in H3 sr no covered by V r. XH3 sr = H3 sr V r (5) In he scenario of Figure 2, he exended hidden nodes of he ransmission from source node s o receiver node r are XH3 sr = {6, 7, 8, 9}. Definiion 7 Call XHR3 sr he exended hidden nodes relay se of a ransmission T sr in hree-pary proxy se coverage of node r. XHR3 sr includes all nodes in P 3 r ha could relay raffic from node r o nodes belonging o XH3 sr. XHR3 sr = {j j V r k XH3sr (R(j, k))} (6) The exended hidden nodes relay se of he ransmission from s o r on he example scenario is XHR3 sr = {1, 2, 3, 4}. Definiion 8 Call mxhr3 sr a minimal exended hidden nodes relay se of a ransmission T sr in hree-pary proxy se coverage of node r. mxhr3 sr includes a subse of nodes from XHR3 r (mxhr3 r XHR3 r ) such ha (i) he node r can relay raffic o any node in XH3 sr hrough some nodes from 8

9 mxhr3 sr and (ii) he removal of any node from mxhr3 sr makes some nodes in XH3 sr unreacheable from r. k XH3sr j mxhr3sr (R(j, k)) (7) and j mxhr3sr k XH3sr j mxhr3sr {j }(R(j, k)) (8) Noe ha mxhr3 sr may no be unique, and differen minimal exended hidden nodes relay ses could conain a differen number of nodes. Call {mxhr3 sr } he se ha conains all possible ses of mxhr3 sr. For insance, in our scenario here are wo possible minimal exended hidden nodes relay ses: mxhr3 sr = {2, 4} and mxhr3 sr = {1, 3, 4}. Also noe ha he wo ses have a differen number of nodes. Definiion 9 Call MXHR3 sr he minimum exended hidden nodes relay se of a ransmission T sr in hree-pary proxy se coverage of node r. MXHR3 sr is he insance of mxhr3 sr wih he smalles number of nodes. Call {MXHR3 sr } he se ha conains all possible ses of MXHR3 sr. In our scenario, we need o simply pick he smalles of he possible mxhr3 sr ses, which in our case will be MXHR3 sr = {2, 4}. We noe ha all he definiions provided above are consrucive, providing heir own implemenaion mehodology. Every se is defined based on he cascade of definiions preceding i, and all of hem can be reduced o he reachabiliy marix R(i, j). 3.2 Deerminaion of he ses in AsyMAC The ses V r and P 3 r of node r are he direc resuls of he neighbor discovery proocol of A 4 LP. Based on which, we can deermine he ses in AsyMAC. (1) H sr includes all he hidden nodes of a ransmission T sr, which migh be ouside of he hree-pary proxy coverage of node r (P 3 r ), hus he complee se of nodes of H sr may no be found and is no mainained. (2) The members of H3 sr can be found by removing from he se P 3 r he nodes ha can be reached by he oher peer of he ransmission. Noe ha in A 4 LP/AsyMAC, he reachabiliy informaion of wo neighbors of a node can be calculaed based on heir locaions and ransmission ranges. (3) XH3 sr is obained by XH3 sr = H3 sr V r. 9

10 (4) XHR3 sr includes all nodes in V r ha can reach a node in se XH3 sr. (5) The calculaion of {mxhr3 sr } is described in Algorihm 1. Algorihm 1 Calculaion of {mxhr3 sr } 1: {mxhr3 sr } = Φ; 2: Lis he complee permuaion of XHR3 sr, call i P. 3: 4: /* Find mxhr3 sr for each permuaion P i P. */ 5: for all permuaions P i P do 6: mxhr3 sr = Φ; 7: T = XH3 sr ; 8: found = false; 9: while P i Φ found = false do 10: remove he nex node p from P i, P i = P i {p}; 11: mxhr3 sr = mxhr3 sr {p}; 12: for all nodes T do 13: if R(p, ) hen 14: T = T {}; 15: end if 16: if T = Φ hen 17: found = rue; 18: break; 19: end if 20: end for 21: end while 22: add mxhr3 sr o {mxhr3 sr }; 23: end for 24: 25: /* Remove all ses M from {mxhr3 sr } if here exiss M {mxhr3 sr } such ha M M. */ 26: for all M {mxhr3 sr } do 27: for all M {mxhr3 sr } do 28: if M M hen 29: remove M from {mxhr3 sr }; 30: break; 31: end if 32: end for 33: end for 34: 35: reurn {mxhr3 sr }; (6) {MXHR3 sr } includes he se(s) in {mxhr3 sr } wih he smalles cardinaliy. During he process of consrucing {MXHR3 sr }, we can ignore he minimal exended hidden nodes se whose cardinaliy already exceeds he 10

11 achieved minimum value, which becomes our incenive o improve he algorihm. The calculaion of {MXHR3 sr } is described in Algorihm 2. Algorihm 2 Calculaion of {MXHR3 sr } 1: {MXHR3 sr } = Φ; 2: Lis he complee permuaion of XHR3 sr, call i P. 3: min cardinaliy = MAX; 4: 5: /* Find mxhr3 sr for each permuaion P i P. */ 6: for all permuaions P i P do 7: mxhr3 sr = Φ; 8: T = XH3 sr ; 9: found = false; 10: while P i Φ found = false mxhr3 sr < min cardinaliy do 11: 12: remove he nex node p from P i, P i = P i {p}; mxhr3 sr = mxhr3 sr {p}; 13: for all nodes T do 14: if R(p, ) hen 15: T = T {}; 16: end if 17: if T = Φ hen 18: found = rue; 19: break; 20: end if 21: end for 22: end while 23: 24: /* if mxhr3 sr is less han he curren achieved minimum cardinaliy, updae min cardinaliy and remove all elemens from {MXHR3 sr }. 25: if found = rue hen 26: if mxhr3 sr < min cardinaliy hen 27: min cardinaliy = mxhr3 sr ; 28: {MXHR3 sr } = Φ; 29: end if 30: add mxhr3 sr o {MXHR3 sr }; 31: end if 32: end for 33: 34: reurn {MXHR3 sr }; 11

12 3.3 Accuracy merics for node classificaion We inroduce a se of merics characerizing he abiliy of a MAC proocol o silence nodes which could cause collisions. Ideally, an algorihm should silence all nodes ha have he poenial o be hidden nodes, as well as nodes ha could poenially be affeced by he ransmission T sr. Assume here exiss an algorihm I which consrucs he se of all he nodes ha should be silenced during a ransmission T sr : S sr (I) = H sr H rs V s V r (9) In pracice, he se of nodes silenced by an algorihm F, S sr (F), migh conain nodes ha are silenced unnecessarily (misclassified) and migh lack nodes which should have been silenced (missed nodes). Call Misc sr (F) he misclassificaion raio of an algorihm F for a ransmission T sr. Misc sr (F) measures he raio of nodes ha are incorrecly silenced by F. Misc sr (F) = S sr(f) S sr (I) S sr (I) (10) Call Miss sr (F) he miss raio of an algorihm F for a ransmission T sr. Miss sr (F) measures he raio of nodes which are no silenced by he algorihm F, alhough hey should have been. Miss sr (F) = S sr(i) S sr (F) S sr (I) (11) Le M isc(f) and M iss(f) be he average misclassificaion raio and average miss raio of an algorihm F, respecively. The averages are compued over a nework N. Misc(F) = s,r N R(s,r) S sr (F) S sr (I), (12) s,r N R(s,r) S sr (I) and Miss(F) = s,r N R(s,r) S sr (I) S sr (F) s,r N R(s,r) S sr (I) (13) 3.4 A soluion o he hidden node problem In a wireless ad hoc nework wih asymmeric links, he sender may no be able o receive he CTS or ACK packes from he receiver. In such a case a 12

13 DATA packe, or he nex frame canno be sen. The IEEE proocol assumes ha all he connecions are symmeric. Our proocol relaxes his assumpion, asymmeric links can be used provided ha hey are par of a hree-pary proxy se [19]. Our proocol reains he use of RTS, CTS, DATA and ACK frames defined in IEEE sandard. In addiion, we inroduce four new frames: XRTS (Exended RTS), XCTS (Exended CTS), TCTS (Tunneled CTS), and TACK (Tunneled ACK). An ideal MAC layer proocol should be based upon a scheme ha delivers he RTS and CTS packes o all hidden nodes in H rs and H sr, respecively. However, such a scheme can be impracical because (i) a node may no have knowledge of all is In-bound neighbors; (ii) he number of hops needed o reach an In-bound neighbor migh be large, hus he ime penaly and he power consumpion required for he RTS/CTS diffusion migh ouweigh he benefis of a reduced probabiliy of collision. Our soluion is o send RTS and CTS packes o he nodes in H3 rs and H3 sr respecively. In his way, a considerable number of nodes ha are misclassified as hidden nodes by [15], referred o as proocol A, and [6], referred o as proocol B, are allowed o ransmi. Noe ha our approach does no idenify all hidden nodes, bu neiher mehods A or B are able o idenify all hidden nodes. 3.5 Node Saus In IEEE , when a node overhears a RTS or a CTS packe, i becomes silen and canno send any packe unil is NAV expires. This way, nodes in he relay se canno send XRTS/XCTS as hey should be in a silen sae afer overhearing he RTS/CTS packe. To resolve his dilemma, we replace he silen sae wih a quasi silen sae, in which a node is allowed o send conrol packes, excep RTS and CTS. The medium access conrol model proposed in his paper classifies a node as eiher idle, acive, quasi silen, or silen. When a node is idle, i is able o send or receive any ype of packes. When a node is acive, i is eiher sending or receiving a packe. When a node is in he quasi silen sae, i can eiher receive packes or send any packe ype excep RTS, CTS, or DATA. When a node is in he silen sae, he node can receive packes bu canno send any packe. 13

14 k 1 XRTS j 1 RTS s TCTS TACK RTS DATA CTS ACK j r CTS j 2 XCTS k 2 Fig. 3. Rouing over asymmeric links in a heerogeneous wireless ad hoc nework. Node s is he sender, r is he receiver, he link from node s o r is asymmeric, and node j is he proxy node ha can relay raffic o s for r. Nodes k 1 and k 2 are hidden nodes for ransmissions T rs and T sr, respecively. Nodes j 1 and j 2 are he proxy nodes ha can relay raffic from s o k 1 and from r o k 2, respecively. 3.6 Medium Access Conrol Model The medium access conrol (MAC) model of our proocol is based upon an exended four-way handshake (Figure 3). For shor daa frames, here is no need o iniiae a RTS/CTS handshake (see Figures 4 (a) and (b)). For long daa frames, we recognize several phases (see Figures 4 (c) and (d)): (1) Sensing. The sender s senses he medium. If i does no deec any raffic for a DIFS period, he sender sars he conenion phase; oherwise, i backs off for a random ime before i senses again. (2) Conenion. The sender s generaes a random γ [0, conenion window] slo ime. The sender s sars a ransmission if i does no deec any raffic for γ ime. (3) RTS ransmission. The sender s sends a RTS packe o he receiver r. The RTS packe specifies he NAV(RTS), link ype of L sr and MXHR3 rs. The link ype field is used o deermine wheher symmeric or asymmeric medium access conrol model is used. (4) CTS ransmission. The receiver r checks wheher he link is symmeric or no. If link L sr is symmeric, node r sends a CTS packe back o node s; oherwise, node r sends a TCTS packe o node s. A TCTS packe specifies boh he proxy node and he receiver r. The proxy node forwards he TCTS packe o he original sender s afer receiving i. A CTS/TCTS packe can be sen only afer sensing a free SIFS period. Insead of MXHR3 sr, MXHR3 rs MXHR3 sr is specified in he CTS/TCTS packe so ha every exended hidden node relay is included 14

15 only once. Thus, he duraion of XCTS/XRTS diffusion phase can be reduced. (5) XRTS/XCTS diffusion. All nodes ha overhear a RTS/CTS/TCTS packe eners a quasi silen sae. Afer he CTS ransmission phase, all exended hidden node relays ha are eiher specified in RTS or CTS/TCTS sars conenion for broadcasing XRTS/XCTS o is neighbors. When a node capures he medium, all oher nodes back-off for a random number of (1...4) SIFS periods, and coninue he conenion unil he XRTS/XCTS diffusion phase finishes. An XRTS/XCTS diffusion phase lass for 6 SIFS periods, afer which all nodes excep he proxy node become silen. (6) Daa ransmission. When he XRTS/XCTS diffusion phase finishes, he sender s sars sending DATA packes o he receiver r afer sensing a free SIFS period. (7) Acknowledgemen. Once he receiver r successfully received he DATA packe from he sender s, i replies wih an ACK if link L sr is symmeric, or a TACK packe if link L sr is asymmeric. An ACK/TACK packe can be sen only afer sensing a free SIFS period. When he sender s receives an ACK/TACK packe, i sars conending he medium for he nex frame. Meanwhile, he NAVs ha are reserved for his ransmission should expire. A any momen, if a node overhears a packe conaining new NAV informaion, i compares i wih he currenly sored NAV, and reains he NAV which expires laer. 4 Simulaion and case sudy We have implemened he AsyMAC proocol in NS-2 [3, 18], an objec-oriened even-driven simulaor developed a he Lawrence Berkeley Naional Laboraory, wih he CMU wireless exensions [13]. As AsyMAC requires a rouing proocol able o handle asymmeric links, we paired i wih A 4 LP rouing proocol o form a complee ad hoc neworking sack. In our experimens, we compare he A 4 LP/AsyMAC pair agains he sandard IEEE proocol coupled wih AODV [14], a widely used on-demand ad hoc rouing proocol and he more recen OLSR [5] proocol. The simulaion resuls reflec he performance of he pair of he corresponding MAC and rouing proocols raher han he performance of he MAC or rouing proocols alone. We had chosen his experimenal seup because i provides he mos informaive comparison of real scenarios. We canno run a rouing proocol which does no suppor asymmeric links on op of Asy- MAC. On he oher hand, A 4 LP can be run on op of MAC proocols which do no suppor asymmeric links. However, A 4 LP has a higher overhead han 15

16 Node s DIFS CW DATA SIFS Node s Node r DIFS CW DATA SIFS ACK SIFS Node r ACK Node j TACK (a) (b) Node s DIFS CW RTS SIFS SIFS DATA SIFS Node r CTS random SIFSs 6SIFS ACK Node j random SIFSs XCTS Node j1 XRTS random SIFSs Node j2 XCTS (c) Node s DIFS CW RTS SIFS SIFS DATA SIFS Node r CTS SIFS 6SIFS random SIFSs ACK SIFS Node j TCTS random SIFSs XCTS TACK Node j1 XRTS random SIFSs Node j2 XCTS (d) Fig. 4. The medium access conrol model for he MAC layer proocol inroduced in his paper for he scenario in Figure 3. (a) The medium access conrol model of proposed MAC proocol for shor daa frames over a symmeric link. (b) The medium access conrol model of proposed MAC proocol for shor daa frames over an asymmeric link. (c) The medium access conrol model of proposed MAC proocol for long daa frames over a symmeric link. (d) The medium access conrol model of proposed MAC proocol for long daa frames over an asymmeric link. rouing proocols which assume symmeric connecions, hus an A 4 LP/ combinaion would always perform somewha worse han combinaion such as OLSR/802.11, because we can ake advanage of he exisence of asymmeric links only if hey are suppored hroughou he sack. Thus, he only reasonable choices are o use eiher all symmeric proocols or all asymmeric-link 16

17 aware ones in he full sack. A possible sudy would involve he comparison of beween asymmeric sacks, by subsiuing for AsyMAC he proocols described by [6] and [15]. In Subsecion 4.3, we have implemened he core decision algorihms of hese proocols for a comparison of he classificaion accuracy. However, here is no publicly available NS-2 implemenaion of hese proocols, and a fully funcional implemenaion of hese proocols is beyond he scope of his paper. Firs, we analyze he benefis of algorihms able o ake advanage of asymmeric links in he mainaining he conneciviy of a nework. Through he sudy of a specific scenario, we show ha a proocol sack composed by Asy- MAC and he A 4 LP rouing proocol is able o mainain conneciviy where he sandard IEEE MAC proocol coupled wih AODV or OLSR loose conneciviy. Second, we perform a simulaion sudy in which we measure he performance of he A 4 LP/AsyMAC sack agains he AODV/ and OLSR/ sacks in a series of randomized mobile ad hoc nework scenarios wih realisic raffic source paerns. Finally, we compare AsyMAC agains wo previously proposed asymmeric MAC proocols in erms of he accuracy of he hidden node classificaion. 4.1 A conneciviy scenario In his secion, we briefly discuss an example illusraes he case when A 4 LP/AsyMAC uses asymmeric links o roue packes from each pair of nodes while boh AODV/ and OLSR/ fail o roue packes. The conneciviy scenario is given in Figure 5. The iniial posiion of nodes is depiced in he graph (a), which shows also he ransmission range and he disance beween he nodes. The graph (b) is a logical view of he above scenario. The nodes do no move during he simulaion. The forward and reverse roues are found and esablished by A 4 LP, and MAC layer acknowledgemens are assured by AsyMAC. For insance, node 5 is a proxy node ha forwards CTS and ACK packes for a unidirecional ransmission from node 1 o node 4 a MAC layer. In his scenario, he wo far-mos nodes 0 and 4 are exchanging packes. The packes are successfully delivered and acknowledged by A 4 LP/AsyMAC, while all packes are los by AODV/ or OLSR/ during he ransmission. 17

18 80 3 (40,120) (0,60) (0,0) (40,0) (110,60) (140,20) 55 (200,60) (a) Physical nework (b) Logical nework Fig. 5. (a) The physical opology of he nework, where node 0 and 4 are exchanging packes. The numbers nex o he nodes indicae he posiion in he (x,y) forma and he ransmission range (underlined). The numbers on he links represen he disance beween he nodes. (b) The logical opology of a nework. 4.2 A sudy of alernaive proocol sacks in a mobile ad hoc nework The previous scenario provided an example when he A 4 LP/AsyMAC proocol mainained conneciviy, while he AODV/ and OLSR/ sacks did no. However, hese exreme cases migh be relaively rare. In he following, we compare hese proocol sacks in a series of simulaions involving an ad hoc nework wih mobile nodes in a more realisic seup. To describe he movemen of nodes in he sysem, we use he random waypoin model [4]. Each node randomly picks a desinaion on he map, moves o he desinaion a a consan speed, and hen pauses for cerain ime, he pause ime. Afer he pause ime, i coninues he movemen following he same paern. The nodes are classified ino four classes C1, C2, C3 and C4 wih differen ransmission ranges. The raffic paerns are generaed by consan bi rae (CBR) sources sending UDP packes. Each CBR source resides a one node and generaes packes for anoher node. Each CBR source is acive for a ime inerval called CBR duraion. Our simulaion allows a seup ime o allow nodes gaher cerain rouing informaion before generaing any raffic. Afer he seup ime, he simulaion ime is divided ino equal ime slices, called swiching inervals. During each swiching inerval, we generae CBR sources for differen pairs of senders and receivers. Table 1 illusraes he defaul seings and he range of he parameers for our simulaion experimens. To consruc 95% confidence inervals, each experimen was repeaed 20 imes for a pair of scenario and raffic paern, he wo elemens affecing he resuls of a performance sudy. This involves 200 individual runs for he each of he 3 sudies. The average simulaion ime for a single experimen was abou 3 hours, for a oal of 1800 hours of compuer ime. By observing he evoluion 18

19 Table 1 The defaul values and he range of he parameers for our simulaion sudies. Field Value Range simulaion area (m 2 ) number of nodes 8(C1), 16(C2), 24(C3), 32(C4) raio of nodes C1:C2:C3:C4 = 1:2:3:4 ransmission ranges 200(C1),150(C2), 100(C3),50(C4)(m) speed 1 (m/s) 1-10 (m/s) pause ime simulaion ime seup ime swiching inerval 15 (s) 300 (s) 20 (s) 10 (s) number of CBR sources CBR packe size CBR sending rae CBR duraion 64 (byes) 512 (bps) 5 (s) of he average values and he calculaed confidence inervals afer 5, 10 and 20 repeiions, we noice ha a 20 repeiions he values reach quiescence, and fuure repeiions would provide only insignifican changes on he overall shape of he graphs. We are concerned wih he impac of node mobiliy, nework load, and nework densiy upon power consumpion, packe loss raio, and laency. For each randomly generaed scenario and raffic paerns, we run simulaion experimens covering AODV wih IEEE , OLSR wih IEEE , A 4 LP using 3-limied forwarding wih disance meric (A 4 LP-M3-F1/AsyMAC) wih AsyMAC, and A 4 LP using 3-limied forwarding wih he meric proposed in [19] (A 4 LP-M3-F2) wih AsyMAC. The influence of nework load The effec of he nework load upon he packe loss raio for wo sandard proocol sacks AODV/IEEE , OLSR/IEEE and for A 4 LP-M3- F1/AsyMAC and A 4 LP-M3-F2/AsyMAC is summarized by he graphs in Figure 6. The raio of he packes los by AODV/ is roughly wice he rae of he packes los by he oher proocols. The major reason is ha flooding, an inefficien broadcas soluion, is used in AODV/ for finding a roue. Among he oher proocols, A 4 LP-M3-F2/AsyMAC performs he 19

20 AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Packe Loss Raio (%) Nework Load (Kbps) Fig. 6. Packe loss raio versus nework load. The raio of packes los by AODV/ is roughly wice he raio of packes los by he oher proocols. Among he oher proocols, A 4 LP-M3-F2/AsyMAC performs he bes, followed by OLSR/802.11, which delivers more packes han A 4 LP-M3-F1/AsyMAC for similar scenarios and raffic paerns. bes, followed by OLSR/802.11, which delivers more packes han A 4 LP-M3- F1/AsyMAC for similar scenarios and raffic paerns. OLSR/ is able o deliver packes only via symmeric links, hus packes are dropped if a leas one asymmeric link is on he criical pah; however, A 4 LP/AsyMAC is able o deliver hose packes. Our experimen also shows he meric we proposed in [19] (A 4 LP-M3-F2), a combined meric wih disance, power level and class informaion, provides beer performance han he disance only meric (A 4 LP-M3-F1) in heerogeneous mobile ad hoc neworks. In our sudy, he measured values have relaively large confidence inervals, and mos of hese confidence inervals overlap. This means ha we do no have 95% confidence ha for any paricular experimenal insance he given proocol will perform beer han he oher proocol. Indeed, if here are no (or very few) asymmeric links, he symmeric proocols will likely ouperform he asymmeric ones, due o he higher overhead of he asymmeric proocol. Unforunaely, he range of he measurable values for merics such as packe loss is very wide in some scenarios here migh be no packe loss, in oher ones, many of packes are los. This variabiliy is refleced in relaively large confidence inervals. We believe ha ofen when he average value of packe loss is lower for one of he proocols, he proocol will perform in average beer han he oher ones. The effec of he nework load upon he average laency for wo sandard proocol sacks AODV/IEEE , OLSR/IEEE and for A 4 LP-M3- F1/AsyMAC and A 4 LP-M3-F2/AsyMAC is summarized by he graphs in Figure 7. The average laency of AODV/ is much higher han ha of he 20

21 2000 AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Average Laency (ms) Nework Load (Kbps) Fig. 7. Average laency versus nework load. The average laency of AODV/ is much higher han he oher proocols. Among he oher proocols, OLSR/ has he shores laency. oher proocols. AODV is a reacive proocol which finds roues only when needed. A 4 LP is a hybrid proocol, roues o non-neighbors are sill discovered when needed, however, roues o cerain In-, Ou-, and In/Ou-bound neighbors are mainained proacively in a rouing able; his fac conribues o he reducion of he average packe delivery laency. OLSR/ has he lowes average packe delivery laency, followed by A 4 LP-M3-F2/AsyMAC, and A 4 LP-M3-F1/AsyMAC. Noe, however, ha he average packe delivery laency is based only on he delivered packes. OLSR/ drops more packes han A 4 LP-M3-F2/AsyMAC; hese are he packes which require a proocol able o deal wih asymmeric links. The packes ha could be delivered by A 4 LP-M3-F2/AsyMAC bu no by OLSR/ generally have higher laency, and his could explain why he average packe delivery laency of A 4 LP-M3-F2/AsyMAC is higher han ha of OLSR/ The influence of nework mobiliy The average packe loss raio versus node mobiliy is summarized in Figure 8. Wih he nework mobiliy increasing, he performances of A 4 LP- M3-F2/AsyMAC and OLSR/ are degraded, while he performance of AODV/ flucuaes beween 35% o 45%. AODV/ performs he wors in case of ad hoc neworks wih low mobiliy, bu i ouperforms he oher proocols for highly mobile ad hoc neworks. The reason for his is ha for ad hoc neworks wih relaively high mobiliy, cached roues and neighbor informaion becomes sale rapidly, which degrades he performance of proacive (OLSR) or hybrid (A 4 LP) proocols bu no reacive (AODV) proo- 21

22 70 60 AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Packe Loss Raio (%) Node Mobiliy (m/s) Fig. 8. Packe loss raio versus node mobiliy. Wih he nework mobiliy increasing, he performances of A 4 LP-M3-F2 and OLSR/ are degraded while he performance of AODV/ flucuaes beween 35% and 45%. AODV/ performs he wors in case of ad hoc neworks wih low mobiliy, bu i ouperforms he oher proocols for highly mobile ad hoc neworks. cols. However, A 4 LP-M3-F2/AsyMAC always ouperforms OLSR/ and A 4 LP-M3-F1/AsyMAC a any nework mobiliy in erms of packe loss raio AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Average Laency (ms) Node Mobiliy (m/s) Fig. 9. Average laency versus node mobiliy. The average laency of AODV/ is much higher han he oher proocols ha perform similarly. Figure 9 presens average packe delivery laency versus nework mobiliy. AODV, which is an on-demand proocol, shows abou he same, relaively long, laency irrespecive of he mobiliy of he nodes. For A 4 LP/AsyMAC and OLSR/ he laency is increasing wih he mobiliy, as he proocols need addiional overhead o keep heir opology informaion up-o-dae. A he mobiliy of abou 10 m/s, AODV/802.11, A 4 LP-M3-F2/AsyMAC and A 4 LP- M3-F1/AsyMAC show abou he same laency. In hese ess, OLSR/

23 ouperforms A 4 LP/AsyMAC because he amoun of opology daa i needs o mainain is lower, being resriced o he symmeric links only. This laency advanage comes a he cos of ignoring asymmeric links and herefore, poenially disconnecing nodes which would mainain conneciviy wih he A 4 LP/AsyMAC soluion. The influence of he number of nodes AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Packe Loss Raio (%) Number of Nodes Fig. 10. Packe loss raio versus number of nodes. A 4 LP-M3-F2/AsyMAC delivers mos packes, followed by OLSR/802.11, A 4 LP-M3-F1/AsyMAC and AODV/ for similar scenarios and raffic paerns. The packe loss raio decreases when he number of nodes increases. In he following se of experimens, we vary he number of nodes moving in he measuremen area. As he nodes have a limied range, when he number of nodes is oo low, some nodes migh loose conneciviy. Figure 10 illusraes he packe loss raio versus he number of nodes. For similar scenarios and raffic paerns, A 4 LP-M3-F2/AsyMAC delivers mos packes, followed by OLSR/802.11, A 4 LP-M3-F1/AsyMAC, and AODV/ As he number of nodes in he nework increases, he nework conneciviy increases as well, hus he packe loss raio decreases. Figure 10 shows ha he packe loss raio decreases from roughly 40% o abou 10% as he number of nodes increases from 30 o 110. Figure 11 shows he average packe delivery laency versus he number of nodes. The average laency of AODV/ is much higher han he oher proocols. For A 4 LP/AsyMAC and OLSR/ he packe laency ends o decrease as he number of nodes increases. As he number of nodes in he nework increases, more neighbors and roues are found during he neighbor informaion exchange process, hus he packe delivery laency decreases. 23

24 AODV / IEEE OLSR / IEEE A4LP M3 F1 / AsyMAC A4LP M3 F2 / AsyMAC Average Laency (ms) Number of Nodes Fig. 11. Average laency versus number of nodes. The average laency of AODV/ is much higher han he oher proocols. The packe laency ends o decrease as he number of nodes increases for A 4 LP/AsyMAC and OLSR/ The accuracy of hidden node classificaion A node is misclassified as hidden if i is silenced by he algorihm while i should no be silenced. Misclassificaion reducing bandwidh uilizaion because i leads o unnecessary silencing of nodes which could have been ransmiing. A node is missed by he algorihm if i was no silenced alhough i should have been. Missed nodes lead o collisions. The more accurae is a proocol in classifying he nodes, he beer he bandwidh uilizaion. A useful measure of he global performance of an algorihm is he number of incorrec silencing decisions per ransmission - defined as he sum of misclassified and missed nodes. We compare he accuracy of he classificaion of our proposed AsyMAC proocol wih he accuracy of wo well known proocols which are performing he same classificaion [6, 15]. As a noe, he basic IEEE proocol does no perform any classificaion of nodes. The simulaion environmen is an area of meers. We populae our environmen wih a heerogeneous collecion of nodes belonging o he four main classes of wireless nodes C1, C2, C3, and C4 (see [12, 19]). The ransmission ranges are normally disribued random variables wih he mean 100, 75, 50, and 25 meers, respecively and he sandard deviaions for each class is 5 meers. The simulaion scenarios are creaed using a se of 40 o 120 nodes including an equal number of nodes for each class, uniformly disribued in he area. For each generaed scenario, we repea he experimen 1000 imes. The displacemen of nodes are disribued around an iniial posiion and he sandard deviaion is 20% of is ransmission range. 24

25 Misclassified nodes / ransmission Proocol A Proocol B AsyMAC Missed nodes / ransmission Proocol A Proocol B AsyMAC Number of nodes Number of nodes (a) Misclassified nodes (b) Missed nodes Incorrec silencing choices / ransmission Proocol A Proocol B AsyMAC Number of nodes (c) Incorrecly classified nodes Fig. 12. (a) The average misclassified nodes / ransmission as a funcion of he number of nodes. The AsyMAC proocol does no misclassify nodes in a saic nework. (b) The average missed nodes / ransmission for proocols A, B, and our approach, as a funcion of he number of nodes. (c) The average number of incorrec silencing decisions per ransmission for proocols A, B, and for our approach. The resuls of he simulaion are shown in Figure 12. The graph (a) shows he number of misclassified nodes per ransmission. The AsyMAC algorihm does no misclassify nodes in a saic nework, because in he process of hree-pary proxy se formaion, he nodes whose ransmission range does no reach he curren node are filered ou. However, misclassified nodes can appear wih he AsyMAC proocol if he nodes are highly mobile and he curren configuraion does no reflec he one deeced when he hree-pary proxy se was esablished. The graph (b) shows he missed nodes per ransmission. Here he AsyMAC proocol performs worse han he oher wo proocols considered, as i is considering only he hree-pary proxy ses, and ignores possible higher order proxy ses. However, he number of missed nodes is very small for all he hree proocols. Graph (c) shows he number of incorrec silencing decisions per ransmission. Here, he AsyMAC proocol emerges wih he lowes number of incorrec decisions, as is beer performance a misclassificaion 25

26 compensaes for he lower performance in regards o missed nodes. 5 Conclusions In his paper, we argue ha asymmery of he ransmission ranges in wireless neworks is a realiy and should be reaed as such. This asymmery makes reliable communicaion more difficul and complicaes medium access conrol, as well as nework layer proocols. The models of radiional muliple access neworks assumes ha all nodes share a single communicaion channel and have access o he feedback (success, idle slo, collision) from any ransmission. In his case, spliing algorihms allow sharing of he communicaion channel in a cooperaive environmen wih reasonable efficiency and fairness. This is no longer he case for wireless neworks wih asymmeric or unidirecional links, where he sender and he receiver do no share he feedback channel and hidden nodes may inerfere wih a ransmission. In case of neworks wih asymmeric links, hidden nodes may be ou of he reach of boh he sender and he receiver, bu heir ransmissions may inerfere wih he recepion of a packe by he inended desinaion. The problem of hidden nodes is furher complicaed because he feedback from he receiver in an RTS/CTS exchange may have o pass hrough several relay saions before reaching all he nodes expeced o be silen. Some of he soluions proposed in he lieraure reduce he probabiliy of a collision by requiring a larger han necessary se of nodes o be silen. In urn, his has negaive effecs upon he communicaion laency and he overall nework hroughpu. We propose a MAC layer proocol, AsyMAC, which reduces he number of nodes ha have o be silen bu, as all he oher schemes proposed, may miss some of he nodes which should have been classified as hidden. IEEE assumes symmeric links beween each pair of nodes while Asy- MAC does no. For raffic over asymmeric links, AsyMAC relies on a proxy node in he hree-pary proxy se o relay acknowledgemens back o he sender so ha he reliabiliy is assured. Our MAC proocol reduces average packe loss raio and average packe delivery laency as asymmeric links are comprehensively uilized which dominae rouing in heerogeneous ad hoc neworks. We conduced a simulaion experimen using he NS-2 simulaor and compared he performance of AODV/IEEE , OLSR/IEEE , A 4 LP using 3- limied forwarding wih disance meric (A 4 LP-M3-F1) wih AsyMAC, and A 4 LP using 3-limied forwarding wih he meric proposed in [19] (A 4 LP-M3-26

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

Wireless LANs: MAC. Wireless LAN: MAC. IEEE protocol stack. Module W.lan MAC

Wireless LANs: MAC. Wireless LAN: MAC. IEEE protocol stack. Module W.lan MAC Wireless LANs: W.lan.3-2 Wireless LAN: 802.11MAC Dr.M.Y.Wu@CSE Shanghai Jiaoong Universiy Shanghai, China Module W.lan.3 Dr.W.Shu@ECE Universiy of New Mexico Albuquerque, NM, USA managemen PANs & Blueooh:

More information

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs EEC173/ECS152C, Winer 2006 Key Poins from Las Lecure Wireless LANs 802.11 Frame forma 802.11 MAC managemen Synchronizaion, Handoffs, Power MAC mehods: DCF & PCF CSMA/CA wih posiive ACK Exponenial backoff

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Communication Networks

Communication Networks Communicaion Neworks Chaper 10 Wireless Local Area Neworks According o IEEE 802.11 Communicaion Neworks: 10. IEEE 802.11 651 10. WLANs According o IEEE 802.11 Overview Organizaion of a WLAN according o

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013.

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013. hp://www.diva-poral.org This is he published version of a paper presened a The 2013 IEEE Inernaional Conference on Inerne of Things, Beijing, China, 20-23 Augus 2013. Ciaion for he original published paper:

More information

Exercise 3: Bluetooth BR/EDR

Exercise 3: Bluetooth BR/EDR Wireless Communicaions, M. Rupf. Exercise 3: Blueooh BR/EDR Problem 1: Blueooh Daa Raes. Consider he ACL packe 3-DH5 wih a maximum user payload of 1021 byes. a) Deermine he maximum achievable daa rae in

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis REM: A Novel Mulicas Rouing Algorihm - Comprehensive Cos Analysis Yewen Cao and Khalid Al-Begain chool of Compuing, Universiy of Glamorgan, CF37 DL, Wales, U.K E-mail:{ycao,kbegain}@glam.ac.uk Absrac Ever-increasing

More information

Evaluation and Improvement of Multicast Service in b

Evaluation and Improvement of Multicast Service in b Evaluaion and Improvemen of Mulicas Service in 802.11b Chrisian Bravo 1 and Agusín González 2 1 Universidad Federico Sana María, Deparmen of Elecronics. Valparaíso, Chile chbravo@elo.ufsm.cl 2 Universidad

More information

Connections, displays and operating elements. 3 aux. 5 aux.

Connections, displays and operating elements. 3 aux. 5 aux. Taser PlusKapiel3:Taser3.1Taser Plus Meren2005V6280-561-0001/08 GB Connecions, displays and operaing elemens Taser Plus Arec/Anik/Trancen Operaing insrucions A 1 2 1 2 3 4 5 6 C B A B 3 aux. 7 8 9 aux.

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

Mobile Computing IEEE Standard 9/10/14. CSE 40814/60814 Fall 2014

Mobile Computing IEEE Standard 9/10/14. CSE 40814/60814 Fall 2014 Mobile Compuing CSE 40814/60814 Fall 2014 IEEE IEEE (Ins4ue of Elecrical and Elecronics Engineers) esablished he 802.11 Group in 1990. Specifica4ons for sandard ra4fied in 1997. Ini4al speeds were 1 and

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Connections, displays and operating elements. Status LEDs (next to the keys)

Connections, displays and operating elements. Status LEDs (next to the keys) GB Connecions, displays and operaing elemens A Push-buon plus Sysem M Operaing insrucions 1 2 1 2 3 4 5 6 7 8 C B A 4 Inser he bus erminal ino he connecion of pushbuon A. 5 Inser he push-buon ino he frame.

More information

Delayed reservation decision in optical burst switching networks with optical buffers. Title. Li, GM; Li, VOK; Li, CY; Wai, PKA

Delayed reservation decision in optical burst switching networks with optical buffers. Title. Li, GM; Li, VOK; Li, CY; Wai, PKA Tile Delayed reservaion decision in opical burs swiching neworks wih opical buffers Auhor(s) Li, GM; Li, VOK; Li, CY; Wai, PKA Ciaion The 3rd nernaional Conference on Communicaions and Neworking in China

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Compuer Neworks Lecure 2 Physical Layer Dr. Xiaobo Zhou Deparmen of Compuer Science CS422 PhysicalLayer.1 Quesions of Ineress How long will i ake o ransmi a message? How many bis are in he message

More information

Video streaming over Vajda Tamás

Video streaming over Vajda Tamás Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD 21 s Inernaional Conference on Composie Maerials Xi an, 20-25 h Augus 2017 LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD Hyunseok Kwon 1, Yurim Park

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded

More information

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:!

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:! Daa Link Layer! The Daa Link layer can be furher subdivided ino:!.! Logical Link Conrol (LLC): error and flow conrol!.! Media Access Conrol (MAC): framing and media access! differen link proocols may provide

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

A Survey on mobility Models & Its Applications

A Survey on mobility Models & Its Applications A Survey on mobiliy Models & Is Applicaions Prof. Vikas Kumar Jain 1, Prof. Raju Sharma 2, Prof. Bhavana Gupa 3 1,2,3 Compuer Science & Engineering, CIST Absrac In his paper, we survey he curren scenario

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

Dimmer time switch AlphaLux³ D / 27

Dimmer time switch AlphaLux³ D / 27 Dimmer ime swich AlphaLux³ D2 426 26 / 27! Safey noes This produc should be insalled in line wih insallaion rules, preferably by a qualified elecrician. Incorrec insallaion and use can lead o risk of elecric

More information

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

Mobility Chapter 13. More Car Network Ideas. Rating. Overview. Mobile IP Internet. First steps Text book. GSM Network. No apps Mission critical

Mobility Chapter 13. More Car Network Ideas. Rating. Overview. Mobile IP Internet. First steps Text book. GSM Network. No apps Mission critical More Car Nework Ideas Mobiliy Chaper 13 CAR2CAR Consorium: Audi, BMW, Daimler, Fia, GM, Honda, Renaul, VW 13/1 Raing Overview Area mauriy Firs seps Tex book Pracical imporance No apps Mission criical Mobile

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS Jun Peng Elecrical Engineering Deparmen, Universiy of Texas Rio Grande Valley, Edinburg, Texas, USA ABSTRACT Unmanned

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

A Simulation Study of a MAC Layer Protocol for Wireless Networks with Asymmetric Links

A Simulation Study of a MAC Layer Protocol for Wireless Networks with Asymmetric Links A Simulation Study of a MAC Layer Protocol for Wireless Networks with Asymmetric Links Guoqiang Wang, Damla Turgut, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Electrical Engineering and

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

1. Function 1. Push-button interface 4g.plus. Push-button interface 4-gang plus. 2. Installation. Table of Contents

1. Function 1. Push-button interface 4g.plus. Push-button interface 4-gang plus. 2. Installation. Table of Contents Chaper 4: Binary inpus 4.6 Push-buon inerfaces Push-buon inerface Ar. no. 6708xx Push-buon inerface 2-gang plus Push-buon inerfacechaper 4:Binary inpusar. no.6708xxversion 08/054.6Push-buon inerfaces.

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

/85/ $ IEEE

/85/ $ IEEE 174 Saged Circui Swiching MAURICIO ARANGO, HUSSEIN BADR, AND DAVID GELERNTER Absrac -Saged circui swiching (S) is a message-swiching echnique ha combines a new proocol wih new communicaion hardware. Proocol

More information

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips 16.3 A Progressive-ILP Based Rouing Algorihm for Cross-Referencing Biochips Ping-Hung Yuh 1, Sachin Sapanekar 2, Chia-Lin Yang 1, Yao-Wen Chang 3 1 Deparmen of Compuer Science and Informaion Engineering,

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

Delay in Packet Switched Networks

Delay in Packet Switched Networks 1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link

More information

Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios

Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios 1 Nework Slicing for Ulra-Reliable Low Laency Communicaion in Indusry 4.0 Scenarios Anders Ellersgaard Kalør, René Guillaume, Jimmy Jessen Nielsen, Andreas Mueller, and Pear Popovski arxiv:1708.09132v1

More information

CHAPTER 1. A Simulation Study of Location- and Power-aware Wireless Networks with Asymmetric Links

CHAPTER 1. A Simulation Study of Location- and Power-aware Wireless Networks with Asymmetric Links CHAPTER 1 A Simulation Study of Location- and Power-aware Wireless Networks with Asymmetric Links Guoqiang Wang, Yongchang Ji, Dan C. Marinescu School of Computer Science University of Central Florida

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

Computational Geometry in Wireless Networks - Routing. Presented by Heather M. Michaud

Computational Geometry in Wireless Networks - Routing. Presented by Heather M. Michaud Compaional Geomery in Wireless Neworks - Roing Presened by Heaher M. Michad 1 Ad Hoc Wireless Neworks No fixed pre-exising infrasrcre Nodes can be saic or mobile Assme nodes don move dring roing or opology

More information

A High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios

A High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios A High Efficiency MAC Proocol for WLANs: Providing Fairness in Dense Scenarios Luis Sanabria-Russo, Jaume Barcelo, Boris Bellala, Francesco Gringoli arxiv:42.395v2 [cs.ni] Nov 5 Absrac Collisions are a

More information

PHY and MAC Performance Evaluation of IEEE a WLAN over Fading Channels

PHY and MAC Performance Evaluation of IEEE a WLAN over Fading Channels PHY and MAC Performance Evaluaion of IEEE 802.11a WLAN over Fading Channels Hiroyuki Yomo, Cong Huan Nguyen, Persefoni Kyrisi, Tien Duc Nguyen, Shyam S. Chakrabory, and Ramjee Prasad Absrac This paper

More information

BI-TEMPORAL INDEXING

BI-TEMPORAL INDEXING BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,

More information

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

Improving Explicit Congestion Notification with the Mark-Front Strategy

Improving Explicit Congestion Notification with the Mark-Front Strategy Improving Explici Congesion Noificaion wih he Mark-Fron Sraegy Chunlei Liu Raj Jain Deparmen of Compuer and Informaion Science Chief Technology Officer, Nayna Neworks, Inc. The Ohio Sae Universiy, Columbus,

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

PROCESS AUTOMATION MANUAL TIMER RELAY KF**-DU-EX1.D ISO9001

PROCESS AUTOMATION MANUAL TIMER RELAY KF**-DU-EX1.D ISO9001 PROCESS AUTOMATION MANUAL TIMER RELAY KF**-DU-EX1.D ISO9001 Wih regard o he supply of producs, he curren issue of he following documen is applicable: The general erms of delivery for producs and services

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

Evaluation and Improvement of Region-based Motion Segmentation

Evaluation and Improvement of Region-based Motion Segmentation Evaluaion and Improvemen of Region-based Moion Segmenaion Mark Ross Universiy Koblenz-Landau, Insiue of Compuaional Visualisics, Universiässraße 1, 56070 Koblenz, Germany Email: ross@uni-koblenz.de Absrac

More information

The Effects of Multi-Layer Traffic on the Survivability of IP-over-WDM Networks

The Effects of Multi-Layer Traffic on the Survivability of IP-over-WDM Networks The Effecs of Muli-Layer Traffic on he Survivabiliy of IP-over-WDM Neworks Peera Pacharinanakul and David Tipper Graduae Telecommunicaions and Neworking Program, Universiy of Pisburgh, Pisburgh, PA 15260,

More information

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communicaion Technology according o IEEE Local wireless neworks WLAN 802.11 WiFi 802.11a 802.11h 802.11i/e/ /w 802.11b 802.11g Mobile Communicaions Chaper 7: Wireless LANs Characerisics IEEE 802.11

More information