Congestion Control for Differentiated-Services using Non-linear Control Theory

Size: px
Start display at page:

Download "Congestion Control for Differentiated-Services using Non-linear Control Theory"

Transcription

1 Congestion Contol fo Diffeentiated-Sevices using Non-linea Contol Theoy Andeas Pitsillides 1, Petos Ioannou 2, Loukas Rossides 1 Deatment of Comute Science, Univesity of Cyus, andeas.itsillides@ucy.ac.cy, 2 Deatment of Electical Engineeing, Univesity of Southen Califonia. Abstact The gowing demand of comute usage equies efficient ways of managing netwok taffic in ode to avoid o at least limit the level of congestion in cases whee inceases in bandwidth ae not desiable o ossible. Using non-linea contol theoy we develoed and analysed a geneic Integated Dynamic Congestion Contol (IDCC) scheme fo contolling taffic using infomation on the status of each queue in the netwok. The IDCC scheme is based on a nonlinea model of the netwok that is geneated using fluid flow consideations. The methodology used is geneal and indeendent of technology, as fo examle TCP/IP o ATM. We assume a diffeentiated-sevices netwok famewok and fomulate ou contol stategy in the same siit as IP Diff-Sev fo thee tyes of sevices: Pemium Sevice, Odinay Sevice, and Best Effot Sevice. The thee diffeentiated classes of taffic oeate at each outut ot of a oute/switch. An IDCC scheme is designed fo each outut ot, and a oweful, simle to imlement contolle is designed and analysed. The IDCC methodology has been alied to an ATM netwok. We use OPNET simulations to demonstate that the oosed contol methodology achieves the desied behaviou of the netwok, and ossesses imotant attibutes, such as: stable and obust behaviou, high utilisation with bounded delay and loss efomance, and good steady state and tansient behaviou. Index Tems Congestion contol, Non-linea Contol theoy, Diffeentiated-Sevices, DiffSev, Intenet, ATM. 1 Intoduction It is geneally acceted that the oblem of netwok congestion contol emains a citical issue and a high ioity, esecially given the gowing size, demand, and seed (bandwidth) of the inceasingly integated sevices netwok. One could ague that netwok congestion is a oblem unlikely to disaea in the nea futue. Futhemoe congestion may become unmanageable unless effective, obust, and efficient methods fo congestion contol ae develoed. The existing congestion contol solutions deloyed in the Intenet Tansot Contol Potocol (TCP) fo TCP tansoted taffic [1,2] ae inceasingly becoming ineffective, and it is geneally acceted that these solutions cannot easily scale u even with vaious oosed fixes [3,4,5], new aoaches [6.7] and achitectues [8, 9]. Newly develoed (lagely adhock) stategies [10,11,12,13] ae also not oven to be obust and effective. Also, ecently thee is inceasing inteest in non-tcp alications. As demand fo multimedia (steaming) alications inceases, it becomes inceasing imotant to ensue that these alications can co-exist with cuent TCP alications. It is becoming widely acceted that steaming media should be subjected to simila ate contols, as TCP taffic, and ecently a numbe of eseaches advocate that they should also exhibit TCP-fiendly behaviou [14,7,15,16]. This makes the contol of the congestion in the Intenet consideably moe difficult. Futhemoe, the congestion contol oblem in the Intenet is exacebated, as the Intenet is inceasingly tansfomed into a multi-sevices high-seed netwok, see fo examle Diffsev oosed achitectues [8,9]. Asynchonous Tansfe Mode (ATM) also witnessed a simila aoach, with the efomance of vaious congestion contol schemes oosed (e.g. [17,18]) fo solution of Available Bit Rate (ABR) oblem [19] not oven analytically. Most oosed schemes ae develoed using intuition and simle non-linea contol designs. These have been demonstated to be obust in a vaiety of scenaios that have been simulated (see e.g. [18]). Since these schemes ae designed with significant non-lineaities (e.g. twohase slow stat and congestion avoidance dynamic windows, binay feedback, additive-incease multilicative-decease flow contol etc), the analysis of the closed loo behaviou is difficult if at all ossible, even fo single contol loo netwoks. The inteaction of additional non-linea feedback loos can oduce unexected and eatic behaviou [20]. Emiical and analytical evidence demonstates the oo efomance and cyclic behaviou of the contolled TCP/IP Intenet [21,22]. This is exacebated as link seed inceases to satisfy demand (hence bandwidth-delay oduct, and thus feedback delay, inceases), and also as demand fo bette quality of sevice inceases. Clealy, moe effective congestion contol schemes ae needed to event seious economic losses and ossible "meltdown" of the Intenet.

2 Desite the successful alication of contol theoy to othe comlex systems the develoment of netwok congestion contol based on contol theoetic concets is quite unexloed. Most of the cuent congestion contol methods ae based on intuition and ad hoc contol techniques togethe with extensive simulations to demonstate thei efomance. The oblem with this aoach is that vey little is known why these methods wok and vey little exlanation can be given when they fail. Recently seveal attemts have been made to develo congestion contolles [20,23,24,25,26,27], mostly using linea contol theoy. Desite these effots the design of congestion contolles whose efomance can be analytically established and demonstated in actice is still a challenging unesolved oblem. Recent advances in non-linea adative contol theoy [28] offe otential fo develoing effective congestion netwok contolles whose oeties can be analytically established. This ae is oganised as follows. In section 2 we oveview ou oosed solution aoach, esent the contol oblem and objective, illustated by the fomal deivation of the integated dynamic congestion contolle (IDCC), deived using non-linea contol theoy based on a fluid flow model. In section 3 we evaluate the efomance of IDCC. Finally in section 4 we esent ou conclusions. 2 Netwok congestion and oosed solution Following the same siit adoted by the IETF Diff- Sev woking gou fo the Intenet [9] we define classes of aggegated behaviou. Cuently, the DiffSev woking gou is discussing two boad aggegate behaviou gous: the Exedited Fowading (EF) Pe-Ho Behaviou (PHB) [29] and the Assued Fowading (AF) PHB [30]. The EF- PHB can be used to build a low loss, low latency, low jitte, assued bandwidth end-to-end sevice, thus indiectly oviding some minimum quality of sevice. The AF-PHB gou ovides delivey of IP ackets in fou indeendently fowaded AF classes. Within each AF class, an IP acket can be assigned thee diffeent levels of do obabilities. Each class can be ovided with some minimum bandwidth and buffe guaantees. In this ae we define thee Sevices: Pemium Taffic Sevice, Odinay Taffic Sevice, and Best Effot Taffic Sevice. An analogy may ove useful hee to justify this choice. At many lage social events thee ae diffeent tyes of asses. Fo Vey Imotant Peole thee ae VIPs asses. VIP asses get efeential teatment. This categoy is likened to ou Pemie Taffic Sevice. Fo odinay eole thee ae common asses. To uchase these tickets eole may have to queue to get the best ossible seats, and thee is no efeential teatment, unless diffeent ices ae intoduced fo bette seats. This categoy may be likened to ou Odinay Taffic Sevice. Fo easons of economy, anothe ass may be offeed, at a discount ice fo the ootunists at the doo. The last (ootunistic, best effot) class will take any available seat, but also at the isk of not attending the event at all, due to a sold out event. This categoy is likened to ou Best Effot Taffic Sevice. The Pemium Taffic Sevice may belong to the EF-PHB in a Diff-Sev achitectue and is designed fo alications with stingent delay and loss equiements on e acket basis that can secify ue bounds on thei taffic needs and equied quality of sevice. Tyical alications include video on demand, audio, video confeencing, etc. The Odinay Taffic Sevice may belong to the fist class of the AF-PHB in a Diff-Sev achitectue. Note that diffeent ioities may be assigned, without comlicating geatly the design. The Odinay Taffic Sevice is intended fo alications that have elaxed delay equiements and allow thei ate into the netwok to be contolled. These Sevices use any left ove caacity fom the Pemium Taffic. Note that to ensue that bandwidth is leftove fom the Pemium Taffic Sevice a minimum bandwidth may be assigned, e.g. by using bandwidth allocation between sevices o connection admission. Tyical alications include web bowsing, image etieval, , ft, etc. Note that fo TCP tansot in a TCP/IP netwok a window-based congestion contolle is used [1]. To make this algoithm alicable in such a setting a convesion fom ate to window will be equied [31].Thisissueisnottackledinthisae;itisleftfo futue investigation. Note howeve, that fo eal time steaming taffic the cuently advocated aoach is to use ate based contol [15, 16]. Finally, the Best Effot Taffic Sevice may belong to the last class of the EF-PHB in a Diff-Sev achitectue. It has no delay o loss exectations. It ootunistically uses any instantaneous leftove caacity fom both Pemium and Odinay Taffic Sevices. It should be noted that the methodology used is geneal and indeendent of technology. The oosed IDCC algoithm can be classified as Netwok-assisted Congestion Contol [32] and uses queue length infomation fo feedback. IDCC oeates locally fo the Pemium Taffic Sevice (note concet similaity with RED [6]) and fo the Odinay Taffic Sevice it sends feedback to the souces to egulate thei ate. Note some ecent woks fo DiffSev aly feedback contol [33,34]. 2.1 Poosed integated dynamic congestion contol aoach using non-linea contol theoy We assume a geneic K inut, K outut ot, outut buffeed switch as a efeence model. Each outut ot has numbe of hysical o logical queues: one fo each taffic class. A congestion contolle is installed at each outut ot. At each outut ot of the switch we assume that dedicated buffe sace is allocated fo each one of the thee sevices and that the seve can be shaed between the thee in a contolled fashion (see Figue 1). Each sevice tansmits ackets to destination teminals. The ackets

3 fom seveal Oigin-Destination (OD) ais tavese a numbe of switches on oute to the destination. Each OD flow may be classified as Pemium Sevice, Odinay Sevice, o Best Effot Sevice. Pemium Sevice equies stict guaantees of delivey, within given delay and loss bounds. It does not allow egulation of its ate (o at least egulation that will affect the given delay bounds). Any egulation of this tye of taffic has to be achieved at the connection hase. Once admitted into the netwok the netwok has to offe sevice in accodance with the given guaantees. This is the task of the Pemium Taffic Contolle. Odinay Taffic on the othe hand allows the netwok to egulate its flow (ace it) into the netwok. It cannot toleate loss of ackets. It can howeve toleate queueing delays. This is the task of the Odinay Taffic Contolle. Best Effot Sevice on the othe hand offes no guaantees on eithe loss o delay. It makes use of any instantaneous leftove caacity. λ Allowed common ate sent to the Odinay Taffic souces Incoming taffic Pemium Taffic λ Odinay in Taffic λ Best effot taffic λ b() t Integated Dynamic Congestion Contolle (IDCC) x () t () t ( ) C ( ) t Instantaneous left-ove caacity Fixed sevice ate C seve (e.g. 155 Mb/s) Schedule with seve buffe ef x ef efeences Figue 1. Imlementation of contol stategy at each switch outut ot 2.2 Dynamic Netwok Models Most of the cuent congestion contol techniques use intuition and ad hoc contol techniques togethe with extensive simulations to demonstate thei efomance. The oblem with this aoach is that vey little is known why these methods wok and vey little exlanation can be given when they fail. The use of dynamic models could ovide a bette undestanding of how the netwok oeates and can be used to develo contol techniques whose oeties can be established analytically even when such techniques ae based on intuition and ad hoc guesses. Fo contol design uoses the model does not need to be accuate. It is because of the inability of modelling the eal wold accuately that feedback was invented and contol theoy is widely used. A good feedback contol design should be able to deal with consideable uncetainties and inaccuacies that ae not accounted fo in the model. A dynamic model is sought, in a fom suitable fo a distibuted contol solution. The objective is to find a model which catues the essential dynamic behaviou, but has low ode comlexity elative to detailed obabilistic models such as the Chaman-Kolmogoov equations fo detemining the time-deendent state obability distibution fo a Makovian queue [35]. Using the aoximate fluid flow modelling aoach oosed by Agnew [36], vaious dynamic models have been used by a numbe of eseaches [35,37,38,39] to model a wide ange of queueing and contention systems, e.g. see [35,38,37,39]. Note that seveal vaiants of the fluid flow model have been extensively used fo netwok efomance evaluation and contol, see fo examle an ealy efeence that stimulated a lot of inteest theeafte [40], and a ecent efeence of the esent inteest [41]. Fo an M/M1 queue it can be shown [42] that xt () xt &( ) = Ct ( ) +λ( t), x(0) = xo (1) 1 + xt ( ) whee x(t) is the state of the queue, given by the ensemble aveage of the numbe of cells N(t) in the system (i.e. queue + seve) at time t; λ(t) is the ate ackets aive at the queue, and C(t) is the caacity of queue seve. Note that this equation is valid fo 0 xt ( ) xbuffe size and 0 Ct ( ) Cseve whee xbuffe size is the maximum ossible queue size and Cseve the maximum ossible seve ate. The validity of this model has been veified by a numbe of eseaches, including [37,38,42]. Note that simila fluid flow models in both the discete and continuous time fom have been used by a numbe of eseaches fo designing o analysing the behaviou of netwok systems unde contol [20,23,22,43,44]. 2.3 Poosed integated congestion contol stategy: Design and analysis At each outut ot of a switch, we imlement IDCC, the integated congestion contol stategy (see Figue 1). IDCC is an integated stategy develoed fo Pemium Taffic, Odinay Taffic and Best Effot Taffic. It is basedonthefluidflowmodel(1)usedtomodeltheinutoutut chaacteistics of the switch (see Figue 1). Pemium Taffic contol stategy: Fo Pemium Taffic Sevice, ou aoach is to tightly contol the length of the Pemium Taffic queue to be always close to a efeence value, chosen by the netwok oeato, so as to indiectly guaantee accetable bounds fo the maximum delay and loss. The caacity fo the Pemium Taffic is dynamically allocated, u to the hysical seve limit, o a given maximum. In this way, the Pemium Taffic is always given esouces, u to the allocated maximum (C max : maximum available o assigned caacity, and x max : maximum buffe size) to ensue the ovision of Pemium Taffic Sevice with known bounds. Wheneve this sevice does not equie the use of maximum caacity to maintain its QoS at the escibed levels it offes the excess caacity to the Odinay Taffic Sevice. The contol objective is to choose the caacity

4 C (t) to be allocated to the Pemium Taffic unde the constaint that the incoming taffic ate λ( t) is unknown but bounded by k ) so that the aveaged buffe size x( t) ef is as close to the desied value x (chosen by the oeato o designe) as ossible. In mathematical tems we need to ef choose C (t) sothat x() t 0 ( x = x() t x )unde ) the constaints that C Cseve and λ() t k < Cseve. Based on the fluid flow equation (1), feedback lineaization, and obust adative contol ideas: 1 + x( t) C = max 0, min Cseve, ρ α x + k() t x() t (2) whee: 0 if x ( t) 0.01 ρ ( t) = 1.01 x( t) 0.01 if 0.01 < x( t) 1 1 if x ( t) > 1 and k & = P δ x() t, 0 k (0) k ) (3) whee P[ ] is a ojection oeato defined as: ) if (0 k ( t) k ) ) δ x ( t) o ( k ( t) = k and x ( t) 0) P δ x( t) = (4) o ( k ( t) = 0 and x ( t) 0) 0 else whee k ) is a constant indicating the maximum ate that could be allocated to incoming Pemium Taffic (e.g. though a connection admission olicy), and α > 0,and δ > 0, ae design constants that affect the convegence ate and efomance. Due to sace limitations, the deivation, and analysis ofthe stabilityofthe above contol stategy will not be esented hee. Details aea in [45]. Odinay Taffic contol stategy: The Odinay Taffic Sevice Contolle egulates the flow of Odinay Taffic into the netwok, by monitoing the length of the Odinay Taffic queue and the available caacity. The length of the Odinay Taffic queue is comaed with the efeence value and using a non-linea contol stategy it infoms the souces of the maximum allowed ate they can tansmit ove the next contol inteval. This algoithm takes into account the leftove caacity C = max 0, Cseve C, uses the eo between the queue length x of the Odinay Taffic ef queue and the efeence queue length x as the ef feedback infomation ( x = x x ), and calculates the common ate λ to be allocated to the Odinay Taffic uses once evey contol inteval T s ms, based on the contol algoithm esented below. Once the common ate is calculated it is sent to all usteam souces. The imlementation details of the feedback scheme ae left fo futhe study. In this ae we evaluate using simulation a scheme wheeby exlicit feedback is ovided by udating secial fields in ackets (RM cells in an ATM setting). The souce does not allow its tansmission ate ove the next contol inteval T s ms to exceed the allowed calculated common ate eceived. Note that any excess souce demand (above calculated common ate) is queued at the souce queues, athe than be allowed to ente the netwok, and thus congest the netwok. Based on the fluid flow equation (1) and feedback lineaization the contolled taffic inut ate is x() t λ = max 0, min C(), t C αx() t (5) 1 + x ( t) whee α > 0 is a design constant. Due to sace limitations, the deivation, and analysis of the above contol stategy will not be esented hee. Best Effot taffic contol stategy: The Best Effot taffic contolle oeates on an instantaneous (acket o cell) time scale. It utilizes any instantaneous left ove caacity to tansmit a acket fom the Best Effot buffe. This inceases the netwok utilisation duing eiods of insufficient suly of ackets fom both the Pemium and Odinay Taffic Sevices. Details aea in [45]. 3 Pefomance evaluation In this section we use simulations to evaluate the efomance of IDCC. Analytical oofs aea in [45]. We fistly esent the imlementation details of the contol algoithm, and then the simulation scenaios and simulation esults. 3.1 Imlementation of integated contol stategy At each switch outut ot (Figue 1) we imlement the integated contol stategy deived in the evious section. ef ef The efeences x, x, and the design constants α, α, δ, and k % ae fist selected. At each instant n (n=0,1,2, ) which coesonds to time t=nt s,wheet s is the samling eiod, we calculate C ( n ), C ( n ), and λ ( n) (comuted in discete fom). Note that C ( n) is used at the switch outut ot by the schedule to dynamically allocate caacity to the Pemium Taffic queue (see Figue 1). The allocated caacity is held constant ove the eiod of the contol inteval T s ms. The calculated common ate λ ( n) is sent to each of the

5 Odinay Taffic souces using this outut ot of the switch to each the destination. 3.2 Simulations Fo the evaluation of the efomance using simulation, we use a netwok comising a numbe of ATM switches. As discussed ealie, if the ATM switches ae elaced by outes simila efomance is exected, if the calculated common ate is sent to the souces. Ou ATM netwok model is shown in Figue 2. We assume all of the queueing occus at the outut buffes of the switches and thee is no intenal blocking in the switch. In each ATM switch thee ae thee seaate logical buffes (e outut ot) collecting Pemium Taffic (128 cells), Odinay Taffic (1024 cells) and Best Effot Taffic (infinite buffe sace). The queues ae seviced in accodance with the stategy, outlined in section 2. Figue 2. Simulation Netwok Model We use same netwok model fo LAN and WAN, but the distances between switches ae changed to eflect the diffeent geogahic sans of the two netwok tyes. In WAN, delay between each switch, due to link distance is set at 20 msec fo each link and 20 msec between the last switch and the destination station (thus a ound ti delay of 120 msec is esent). All of the links ae assumed to tansmit at 155 Mbits/sec. Fo the Odinay Taffic we conside 40 connections at the edge of the netwok (20 ae connected diectly to ATM switch 0, and 10 in each of ATM switches 1 and 2), which can have thei tansmission ate contolled by the netwok. Thee of the Odinay Taffic flow aths ae 1-ho aths, and one is a 3-ho ath. Also fou VBR and two CBR souces ae diectly connected to ATM switch 2 (1 ho-ath). Each Odinay Taffic teminal geneates taffic based on a 3-state model; see Table 1 fo the selected aametes. We have consideed the Odinay Taffic souce teminal buffes as infinite. Each VBR souce is simulated by using the autoegessive model oosed by Maglais et al [46]. The CBR souce geneates 25 Mbits/sec and aces the cells into the netwok unifomly. In case of cell losses, which occu duing the eiods of congestion, we use a simle etansmission otocol. A acket is esumed to be lost even if a single cell is lost. Packets that ae eceived by the eceive teminal with missing cells ae etansmitted by the souce until successful delivey. The "useful netwok thoughut" eesents the actual thoughut of ackets (in Mbits/sec) that ae eventually deliveed to the destination without cell loss (afte etansmission if necessay). PARAMETER DISTRIBUTION MEAN VALUE Idle eiod Geometic Chosen to adjust netwok load Geneated ackets Geometic 20 in an active eiod Packet size Geometic 8 Kbytes Pause eiod Exonential sec Table 1. Odinay Taffic souce model aametes We have used Onet simulation tools fo ou exeiments. Using simle undestanding of the ATM, we set the contolle design constants as follows: Fo the ef Pemium Taffic contolle x =50 o 100 fo a buffe size of 128, α =2000, k ) =210000, k (0) =2000, and min ef k =1000. Fo the Odinay Taffic contolle x =900 o 300 o 600 fo a buffe of 1024, and α =2000. The contol udate eiod T s msec was set at seveal values (32 celltimes msec, 75 celltimes, 175 celltimes, and 353 celltimes 1 msec) in ode to investigate the sensitivity of contol to the value of the contol udate eiod. 3.3 Simulation esults Steady state and tansient behavio Using the simulation model we evaluate the efomance of ATM LAN and ATM WAN. As noted eviously Pemium Taffic (CBR/VBR souces) has a ioity. We can guaantee them maximum delays not exceeding in an aveage sense the efeence value on the buffe length set by the netwok administato. In ode to test the esonsiveness of ou contolle (tansient behaviou) we set a vaiable efeence oint fo this sevice. At the beginning we set the efeence oint to 100 cells. Afte t=0.4 sec it is set to 50 cells and afte t=0.8 sec it is again aised to 100 cells (whee t stands fo time in seconds). In this way not only we show that ou contolle can match the efeence values but that it can also coe with dynamic changes that occu in the netwok (e.g. anothe connection is set-u, moe bandwidth is equied fo eal-time sevices etc). To simulate a moe ealistic scenaio, we also change the efeence on the Odinay Taffic. Since we can accet highe delays the efeence values ae set at 900 cells fo t<0.5 sec. Afte that time it is set to 300 cells until t=1 sec and afte t=1 sec it is aised to 600 cells. It can be noticed that the efeence oint changes between the Pemium and Odinay Taffic ae not synchonised between them. Note that the Pemium and Odinay Taffic souces geneate taffic accoding to a

6 ealistic scenaio (they ae not satuated souces). The contolled system efomance fo the case of an ATM unde heavy load (140%) is demonstated hee, fo both a LAN and a WAN. Figue 3 shows the behaviou of the Pemium Taffic fo both a LAN and WAN. As exected the contolled system behaviou is the same, as the feedback is local fo both WAN and LAN netwoks. In Figue 4 the behaviou of the Odinay Taffic queue length is shown fo the WAN configuation with vaying contol eiods (as exected, the LAN exhibited a slightly bette behaviou and is not shown hee). The most heavily congested switch (Switch 2) is selected, whee Odinay Taffic cometes with Pemium Taffic fo the scace netwok esouces. The figue shows that the contolle adats vey quickly to efeence oint changes (could be likened to abut changing netwok conditions), as well as showing a easonable insensitivity to contol eiods anging fom msec to 1 msec (a moe than 10 tenfold incease). It is vey imotant to notice that thee ae no obsevable oveshoots and undeshoots (excet fo the undeshoot at 0.5 seconds fo the longest contolle eiod of 1 msec), no oscillations o cyclic behaviou, and that the contolled system esonds vey quickly to the changes intoduced in both queues. In othe wods, the system exhibits a good tansient behaviou. So we can say that we can dynamically contol the buffe state and the souces sending ate, which in tun imlies that the netwok is well contolled and congestion is avoided, o quickly contolled. Note that the case of the WAN exhibits comaable efomance with the LAN, even though the oagation delay (and theefoe the fowad and feedback delay have substantially inceased in the ode of 120 msec RTT, ound ti time). Also, the obseved deteioation due to the ten-fold incease in contol eiod is vey accetable. Also note that a sizeable offset fom the efeence value is esent, howeve this can be ectified by intoducing integating action into the contolle design. Figue 4. Switch 2 (last switch) time evolution of the Odinay Taffic queue length fo WAN fo 140% load demand. (The contol eiod vaies between 32 celltimes msec to 353 celltimes celltimes 0.94 msec) We have also monitoed the queue length behaviou fo Switch 0 and Switch 1. We obseve that both queues ae well contolled with no oveshoots o undeshoots exceeding 2%. The thoughut fo the bottlenecked switch was also monitoed, exhibiting a constant and vey close to 100% utilisation; ~98 % fo tyical simulation uns. This is vey imotant since the contolle not only avoids congestion but also fully utilises the available esouces, even fo demands consideably exceeding the available link caacity (140% in this case). The time evolution of the calculated common allowed cell ate fo the congested switch is shown in Figue 5 fo WAN, fo 140% load demand. Note that this common allowed cell ate is sent to all souces using this switch. This ate is used by the souces as the maximum ate that they ae allowed to tansmit ove the next contol udate eiod. The time evolution of the tansmission ate of a numbe of contolled souces is shown in Figue 6. In the figue 3-ho and 1 ho c souces ae shown fo WAN netwoks. Note that the souces ae not satuated. The souce ates quickly adat in a fai way to thei steady-state values, even though the 3-ho souces, in the case of the WAN, ae located about km away (equivalently 60 msec delay fo cells to aive at the switch). Figue 3. Switch 2 (last switch) time evolution of Pemium Taffic queue length fo a LAN and WAN fo 140% load demand. Note that as the feedback infomation is local, thee is no deteioation in efomance due to the inceased WAN oagation delay. Figue 5. Tyical behaviou of the time evolution of the common calculated allowed cell ate at Switch 2 fo WAN.

7 Figue 6. Tyical behavio of the time evolution of the tansmission ate of contolled souces using Switch 2 fo WAN configuations. Fainess is anothe imotant attibute of any congestion contol system. The fainess shown by ISCC can be infeed fom Figue 6 fo a numbe of tyical on-off souces fo the Odinay Taffic. Additional scenaios ae esented in [45]. Also the oosed contolle has demonstated insensitivity of contol to the value of the contol udate eiod (T s msec was set at seveal values fom 32 celltimes msec to 353 celltimes 1 msec). As shown in Figue 4, the contolled netwok efomance does not degade consideably, consideing the 10-fold incease in the value of the contol udate eiod (and thus 10-fold eduction in contol infomation ovehead). Futhemoe obustness of contol design constant to changing netwok conditions was obseved fo divese taffic demands anging fom 50%-140% and souce location (feedback delays) u to about 250 msec RTT, as well as contol eiods anging fom msec to 1 msec. Fo all simulations the behaviou of the netwok emains vey well contolled, without any unaccetable degadation. This demonstates the obustness of the oosed congestion contolle. Given also that thee was no change in the selected design constants the oosed scheme has demonstated its univesality and suitability to oeate effectively and efficiently unde divese netwok conditions in both LAN and WAN configuations. 4 Conclusions This ae ooses a geneic scheme fo congestion contol. It uses an integated dynamic congestion contol aoach (IDCC). A secific oblem fomulation fo handling multile diffeentiated classes of taffic, oeating at each outut ot of a switch is illustated. IDCC is deived fom non-linea contol theoy using a fluid flow model. The fluid flow model deicts the dynamical system behaviou, using acket flow consevation consideations and by matching the queue behaviou at equilibium. In this way analytical efomance bounds can be deived, fo ovable contolled netwok behaviou. We divide taffic into thee basic tyes of sevice (in the same siit as those adoted fo the Intenet by the IETF Diff-Sev woking gou, i.e. Pemium, Odinay, and Best Effot). The oosed contol algoithm ossesses a numbe of imotant attibutes such as ovable stable and obust behaviou, ovable high utilisation with bounded delay and loss efomance (can be set by efeence values), good steady state and tansient behaviou. It uses minimal infomation to contol the system and avoids additional measuements and noisy estimates. That is, it uses only one imay measue, namely the queue length, it does not equie e connection state infomation, queuing, o sevicing at the switch, o any state infomation about the set of connections bottlenecked elsewhee in the netwok (not even a count of these connections). The contolle fo Odinay Taffic comutes the common allowable tansmission ate only once evey T s msec (the contol udate eiod) theeby educing ocessing ovehead. The contolle is insensitive to the value of T s, and achieves max/min fainess. It guaantees a minimum ageeable sevice ate, and it is obust in the sense that it woks ove a wide ange of netwok conditions, such as ound ti delays, taffic attens, and contol udate intevals, without any change in the contol aametes. Futhemoe, the contolle woks in an integated way with diffeent sevices and has simle imlementation and low comutational ovehead, as well as featuing a vey small set of design constants that can be easily set (tuned) fom simle undestanding of the system behaviou. These attibutes make the oosed contol algoithm aealing fo imlementation in eal, lage-scale heteogeneous netwoks. In this ae full exlicit feedback was used in the simulations, signalled using RM cells in an ATM setting. A challenging task is to investigate othe exlicit (e.g. single bit feedback as in ECN oosal fo IP [10]) and imlicit (end-to-end) feedback and signalling schemes. A comaative analytic and simulative evaluation between the diffeent feedback and signalling schemes is a toic fo futue eseach. 5 Refeences: [1] V. Jacobson, Congestion Avoidance and Contol, ACM SIGCOMM88, [2] W. Stevens, "TCP Slow Stat, Congestion Avoidance, Fast Retansmit, and Fast Recovey Algoithms", RFC 2001, Jan [3] P. Kan, C. Patidge, ``Imoving Round-Ti Time Estimates in Reliable Tansot Potocol'', ACM SIGCOMM87, Octobe, 1987.

8 [4] W. Stevens, TCP/IP Illustated, Volume 1 The Potocols', Addison-Wesley, [5] V. Jacobson, R. Baden, D. Boman, TCP Extensions fo High Pefomance, RFC 1323, May [6] S. Floyd, V. Jacobson, Random Ealy Detection gateways fo congestion avoidance, IEEE/ACM Tansactions on Netwoking, August [7] S. Floyd, K. Fall, Pomoting the use of end-to-end congestion contol in the Intenet, IEEE/ACM Tansactions on Netwoking, vol. 7, no. 4, August 1999, [8] R. Baden, D. Clak, S.Shenke, Integated sevices in the intenet achitectue: an oveview, RFC 1633, July [9]D.Black,S.Blake,M.Calson,E.Davies,Z.Wang,andW. Weiss, "An Achitectue fo Diffeentiated Sevices", RFC 2475, Decembe (also see IETF Diffeentiated Sevices Woking Gou htt:// [10] K.K. Ramakishnan, and S. Floyd, A oosal to add exlicit congestion notification (ECN) to IP, daft-kksjf-ecn-03.txt, Octobe (RFC2481, Januay 1999). [11] Baden et al, Recommendations on Queue Management and Congestion Avoidance in the Intenet, RFC2309, Ail [12] K.K. Ramakishnan, Buce Davie, Sally Floyd, A Poosal to Incooate ECN in MPLS, intenet-daft, htt:// July 1999 [13] Hadi Salim, Intenet daft-salim-jhsbnns-ecn-00.txt, A oosal fo Backwad ECN fo the Intenet Potocol (IPv4/IPv6), June [14] J. Madhavi, S. Floyd, TCP-Fiendly unicast ate-based flow contol. Note sent to end2end-inteest mailing list, Januay [15] J. Padhye, J.Kuose, D. Townsley, R. Koodli, A model based TCP-Finedly ate contol otocol, Poc. IEEE NOSSDAV 99, Basking Ridge, NJ, June [16] S. Floyd, M. Handley, J. Padhy, J. Widme, Equation-Based congestion contol fo unicast alications: the extended vesion, Inten. Com. Science Inst. Tech Re., TR , Mach [17] L. Robets, Enhanced PRCA (Pootional ate contol algoithm), Tech. Re. AF-TM R1, August [18] R. Jain, S. Kalyanaaman, R. Goyal, S. Fahmy, R. Viswanathan, ERICA switch algoithm; a comlete descition, ATM FORUM, AF/ , August [19] ATM Foum, Taffic management secification vesion 4.0, Tech. Re. AF-TM , Ail [20] C.E. Rohs and R.A. Bey and S.J. O'Halek, A Contol Enginee's Look at ATM Congestion Avoidance, IEEE GLOBECOM'95, Singaoe, [21] J. Matin, A. Nilsson, The evolution of congestion contol in TCP/IP: fom eactive windows to eventive flow contol, TR- 97/11, Noth Caolina State Univ., August [22] T.V. Lakshman and U. Madhow, The Pefomance of TCP/IP fo Netwoks with High Bandwidth Delay Poducts and Random Loss, IEEE/ACM Tansactions on Netwoking, vol. 5, , June [23] S. Keshav, A contol theoetic aoach to flow contol, ACM SIGCOMM 91, Zuich, Switzeland, [24] L. Benmohamed, Y.T. Yang, A Contol-Theoetic ABR Exlicit Rate Algoithm fo ATM Switches with Pe-VC Queuing, Infocom 98, [25] A. Kolaov, G. Ramamuthy, A contol theoetic aoach to the design of an exlicit ate contolle fo ABR sevice, IEEE/ACM Tansactions on Netwoking, Octobe [26] A. Pitsillides, P. Ioannou, D. Tie, Integated contol of connection admission, flow ate, and bandwidth fo ATM based netwoks, IEEE INFOCOM'96, 15th Confeence on Comute Communications, San Fancisco, USA, Mach 1996, [27] A. Pitsillides, J. Lambet, "Adative congestion contol in ATM based netwoks: quality of sevice with high utilization", Jounal of Comute Communications, 20, 1997, [28] P. Ioannou, J. Sun, Robust Adative Contol, Pentice Hall, [29] V. Jacobson, K. Nichols, K. Podui, An Exedited Fowading PHB, RFC 2598, June [30] J. Heinamen, F. Bake, W. Weiss, J. Woclawski, Assued Fowading PHB Gou, RFC 2597, June [31] R. Satyavolu, K. Duvedi, S. Kalyanaaman, Exlicit Rate contol of TCP alications, ATM-Foum/ R1, Feb [32] J.F. Kuose, K.W Ross, Comute Netwoking: A to down aoach featuing the Intenet, Addison Wesley, [33] S. Kalyanaaman, S. Aoa, K. Wanglee, G. Guaiello, and D. Haison, A one bit feedback enhanced diffeentiated sevices achitectue, Intenet Daft, IETF, A [34] H. Chow, A. Leon-Gacia, A Feedback Contol Extension to Diffeentiated Sevices, htt:// ~keith/ietf-id/daft-chow-diffsev-fbctl- 00.s [35] D. Tie, M. K. Sundaeshan, "Numeical Methods fo modelling Comute Netwoks Unde Nonstationay Conditions", IEEE Jounal of Selected Aeas in Communications, Dec [36] C. Agnew, Dynamic modelling and contol of congestionone systems, Oe. Res., Vol. 24, No. 3, 1976, [37] J. Filiiak, "Modelling and Contol of Dynamic Flows in Communication Netwoks", Singe-Velag, [38] S. Shama, D. Tie, "Aoximate models fo the study of nonstationay queues and thei alication to communication netwoks", IEEE ICC'93, May [39] X. Gu, K. Sohaby, D. R. Vaman, Contol and efomance in acket, cicuit, and ATM netwoks, Kluwe Academic, [40] D. Anick, D. Mita, M. Sondhi, Stochastic theoy of datahandling system and multile souces, Bell Systems technical jounal, 1982, 61, [41] Y. Wadi, B. Melamed, Continuous Flow Models: modeling, simulation and continuity oeties, 38 th Confeence on Decision & Contol, Phoenix, Aizona, USA, Decembe [42] L. Rossides, A. Pitsillides, P. Ioannou, Non-linea Congestion contol: Comaison of a fluid flow based model with OPNET simulated ATM switch model, TR-99-1, Det. Comute Science, Univesity of Cyus, [43] J-C Bolot, A.U. Shanka, Analysis of a fluid aoximation to flow contol dynamics, IEEE Infocom 92, Floence, Italy, May 1992, [44] B. Vandaloe, R. Jain, R. Goyal, S. Hahmy, Design and analysis of queue contol functions fo exlicit ate switch schemes, IC3N 8, Lafayette, Louisiana, Octobe 18, [45] A. Pitsillides, P. Ioannou, L. Rossides, Congestion Contol fo Diffeentiated-Sevices using Non-linea Contol Theoy, TR , Det. Comute Science, Univesity of Cyus, [46] B. Maglais, D. Anastassiou, P. Sen, G. Kalsson, J. Robbins, Pefomance models of statistical multilexing in acket video communications, IEEE Tansactions on Communications, Vol. 36, No. 7, , July 1988.

Integrated Dynamic Congestion Controller Andreas Pitsillides 1, Petros Ioannou 2, Loukas Rossides 1

Integrated Dynamic Congestion Controller Andreas Pitsillides 1, Petros Ioannou 2, Loukas Rossides 1 Integated Dynamic Congestion Contolle Andeas Pitsillides 1, Petos Ioannou 2, Loukas Rossides 1 Abstact--The gowing demand of comute usage equies efficient ways of managing netwok taffic in ode to avoid

More information

Performance Evaluation of TCP Vegas over Optical Burst Switched Networks

Performance Evaluation of TCP Vegas over Optical Burst Switched Networks Pefomae Evaluation of TCP Vegas ove Otical Bust Switched Netwoks Basem Shihada 1, Qiong Zhang 3, Pin-Han Ho 1,, 1 School of Comute Sciee, Univesity of ateloo, ateloo, Canada Deatment of Electical and Comute

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Getting the System Sizing and Performance Test Right

Getting the System Sizing and Performance Test Right Getting the System Sizing and Pefomance Test Right Steve Hazeltine - Sema Gou Systems Ltd. (now Oacle UK Ltd.) (Email shazelti@uk.oacle.co - Telehone +44 171 830 4444) Andew Johnston - Indeendent Consultant

More information

Fault-Tolerant Metric Vector Routing

Fault-Tolerant Metric Vector Routing Fault-Toleant Metic Vecto Routing Joge A. Cobb Deatment of Comute Science Univesity of Texas at Dallas Richadson, TX 75083-0688 jcobb@utdallas.edu Abstact We esent a distibuted outing otocol fo obtaining

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

A Novel Genetic Algorithm for Static Task Scheduling in Distributed Systems

A Novel Genetic Algorithm for Static Task Scheduling in Distributed Systems Intenational Jounal of Comute Theoy and Engineeing, Vol., No., Ail 200 A Novel Genetic Algoithm fo Static Task Scheduling in Distibuted Systems Ami Masoud Rahmani and Mojtaba Rezvani Abstact The static

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

A New Free-form Deformation Through the Control of Parametric Surfaces

A New Free-form Deformation Through the Control of Parametric Surfaces A New Fee-fom Defomation Though the Contol of Paametic Sufaces Jieqing Feng Lizhuang Ma and Qunsheng Peng State Key Lab. of CAD&CG, Zhejiang Univesity Hangzhou 310027, P. R. of CHINA email: jqfeng@cad.zju.edu.cn

More information

Trinocular Stereo using Shortest Paths and the Ordering Constraint

Trinocular Stereo using Shortest Paths and the Ordering Constraint Tinocula Steeo using Shotest Paths and the Odeing Constaint Motilal Agawal and Lay S. Davis Deatment of Comute Science, Univesity of Mayland, College Pak, MD 20742, USA email: mla,lsd @umiacs.umd.edu Abstact

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Aggregating Local Descriptors for Epigraphs Recognition

Aggregating Local Descriptors for Epigraphs Recognition Aggegating Local Descitos fo Eigahs Recognition Giusee Amato, Fabizio Falchi, Fausto Rabitti, Lucia Vadicamo ISTI-CNR, via G. Mouzzi, 5624 Pisa (Italy) Emails: .@isti.cn.it Abstact. In this

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

3/1/18. Overview. Program Representations. Abstract Syntax Tree (AST) Eclipse JDT. Java Model. The Tree Structure of Java Project[2]

3/1/18. Overview. Program Representations. Abstract Syntax Tree (AST) Eclipse JDT. Java Model. The Tree Structure of Java Project[2] Oveview Pogam Reesentations Abstact Syntax Tee Eclise JDT Java Model Eclise JDT AST Contol Flow Gah Pogam Deendence Gah Points-to Gah Call Gah 2 Abstact Syntax Tee (AST) Ceated by the comile at the end

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Computer Vision - Histogram Processing. Dr. S. Das IIT Madras, CHENNAI - 36

Computer Vision - Histogram Processing. Dr. S. Das IIT Madras, CHENNAI - 36 Comute Viion - Hitogam Poceing D. S. Da IIT Mada, CHENNAI - 36 HISTOGRAM In a gay level image the obabilitie aigned to each gay level can be given by the elation: n, N Inut image,,2...l - - The nomalized

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

An Efficient Trusted Computing Base for Routing in MANET s

An Efficient Trusted Computing Base for Routing in MANET s G. Kishna Kishoe et al, / (IJCSIT) Intenational Jounal of Comute Science and Infomation Technologies, Vol. 2 (5), 2011, 1940-1946 An Efficient Tusted Comuting Base fo Routing in MANET s G.Kishna Kishoe

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

ESTIMATION OF INTERPOLATION ERROR IN DEMS USING STATISTICAL METHODS

ESTIMATION OF INTERPOLATION ERROR IN DEMS USING STATISTICAL METHODS ESTIMATION OF INTERPOLATION ERROR IN DEMS USING STATISTICAL METHODS Robet PAQUET, Austalia Key wods: DEM, inteolation eo, ALS, hotogammety, Delaunay tiangulation SUMMARY To wok with DEMs euies a knowledge

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

TCP Libra: Exploring RTT-Fairness for TCP

TCP Libra: Exploring RTT-Fairness for TCP TCP Liba: Exploing RTT-Fainess fo TCP UCLA Compute Science Depatment Technical Repot #TR050037 Gustavo Mafia, Claudio Palazzi, Giovanni Pau, Maio Gela, M. Y. Sanadidi, Maco Roccetti, Compute Science Depatment

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Simulating Life of Virtual Plants, Fishes and Butterflies

Simulating Life of Virtual Plants, Fishes and Butterflies Simulating Life of Vitual Plants, Fishes and Butteflies 1 3 Simulating Life of Vitual Plants, Fishes and Butteflies Hansudi Nose, Daniel Thalmann Comute Gahics Lab, Swiss Fedeal Institute of Technology

More information

CS 450: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 2016 DR. MICHAEL J. REALE

CS 450: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 2016 DR. MICHAEL J. REALE CS 45: COMPUTER GRAPHICS RASTERIZING CONICS SPRING 6 DR. MICHAEL J. REALE RASTERIZING CURVES OTHER THAN LINES When dealing with othe inds of cuves, we can daw it in one of the following was: Use elicit

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Defining and Implementing Dynamic Semantics of Object Oriented High Level Petri Nets

Defining and Implementing Dynamic Semantics of Object Oriented High Level Petri Nets Defining and Imlementing Dynamic Semantics of Object Oiented High Level Peti Nets Maius Bezovan Faculty of Automation Comutes and Electonics, Univesity of Caiova 1100 Caiova, Romania Abstact. This ae deals

More information

Optimal Peer Selection for P2P Downloading and Streaming

Optimal Peer Selection for P2P Downloading and Streaming Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Compute Science Depatment Faculty Publication Seies Compute Science 2005 Optimal Pee Selection fo P2P Downloading and Steaming Micah Adle Univesity

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

MAC Protocol for Supporting QoS in All-IP HiperLAN2

MAC Protocol for Supporting QoS in All-IP HiperLAN2 MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Interesting Target Detection and Matching Algorithm Based on Phase Information

Interesting Target Detection and Matching Algorithm Based on Phase Information 009 Intenational Confeence on Machine Leaning and Comuting IPCSIT vol.3 0 0 IACSIT Pess Singaoe Inteesting Taget Detection and Matching Algoithm Based on Phase Infomation hitao Xiao Jun u Lei Geng Jianming

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach Minimizing Application-Level Delay of Multi-Path TCP in Wieless netwoks: A Receive-Centic Appoach Se-Yong Pak, Changhee Joo, Yongseok Pak, and Saewoong Bahk Depament of ECE and INMC, Seoul National Univesity,

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Relating the lab apartment to a full-size apartment in Beijing

Relating the lab apartment to a full-size apartment in Beijing Achitectue 4.411 Building Technology Laboatoy Sping 004 Relating the lab apatent to a full-size apatent in Beijing It is inteesting to elate what we easue in the lab to eal life. Ou lab easueents will

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Compute Netwoks 54 (2010) 2327 2344 Contents lists available at ScienceDiect Compute Netwoks jounal homepage: www.elsevie.com/locate/comnet TCP Liba: Deivation, analysis, and compaison with othe RTT-fai

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Meta Objects for Access Control: A Formal Model for Role-Based Principals

Meta Objects for Access Control: A Formal Model for Role-Based Principals Meta Objects f Access Contol: A Fmal Model f Role-Based Pincials Thomas Riechmann, Fanz J. Hauck Univesity of Elangen-Nünbeg* Deatment of Comute Science IV Matensst. 1, D-91058 Elangen, Gemany {iechmann,hauck}@infmatik.uni-elangen.de

More information

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization ICCAS25 June 2-5, KINTEX, Gyeonggi-Do, Koea Adaptation of Motion Captue Data of Human Ams to a Humanoid Robot Using Optimization ChangHwan Kim and Doik Kim Intelligent Robotics Reseach Cente, Koea Institute

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Switching and Fault Transients of Unit Transformers of a Combined-Cycle Gas Turbine Generator

Switching and Fault Transients of Unit Transformers of a Combined-Cycle Gas Turbine Generator Switching and Fault Tansients of Unit Tansfomes of a Combined-Cycle Gas Tubine Geneato M. Kizilcay, S. Demmig Abstact A new combined-cycle powe plant is to be connected to a 110-kV gid though a powe cable

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information