Problem Set 2 (Due: Friday, October 19, 2018)

Size: px
Start display at page:

Download "Problem Set 2 (Due: Friday, October 19, 2018)"

Transcription

1 Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue in a packet witched network, for which = 50 and = 60. (a) Determine the probability that between 5 and 7, incluive, packet arrive at the queue in a 100 m period. (b) Determine the probability that a packet i longer than 5000 bit, given that the output link rate i 4 Mbp. Quetion 2 Conider the model of an output buffer in a packet witch for a 200 Mbp link. he arrival rate of packet to the queue i given by = 400,000 packet per econd. Determine the average delay through the ytem and the average number of packet in the queue given: (a) exponential packet ize with an average length of 53 byte (b) fixed packet ize of length 53 byte (c) packet length with a known mean of 53 byte and a variance of Quetion 3 A queue i utilized in an AM witch to control the packet uing a link of rate 622 Mbp. Arrival to the queue are Poion and arrive at an average rate of = 1.2 packet/ ec. (a) Given that AM cell are fixed length of 53 byte, determine the average time pent in the queuing ytem (i.e., including waiting time and ervice time). (b) Aume that the deigner of the ytem want to enure that the buffer allocated to the queue i capable of toring at leat 5 time a many packet in the queue a the average number in the queue. What i the ize of the buffer allocated in term of the number of bit required to tore the neceary packet? 1

2 Quetion 4 Conider the following queueing ytem. All queue are M/M/1 and traffic tream plit with the probabilitie a given. Determine the expected delay through the entire ytem. Arrival rate are given a arrival per econd and ervice rate are given a departure per econd. q1=.25 2=1.2 p2=.6 =4 q2=.4 1=5 4=4 5=5 p1=.75 3=3.5 Quetion 5 Conider the following queuing ytem. A indicated, 70% of the incoming packet enter Q1 and 30% enter Q2. 70% Q1 1=16 Q3 Q4 =20 30% Q2 2=8 3=25 4=21 (a) Auming that all queue are M/M/1, determine the average delay through the queuing ytem. (b) Repeat part (a) auming that Q1, Q2, and Q3 are M/M/1 and Q4 i an M/D/1 queue. (c) Repeat part (a) auming that Q1, Q2, and Q3 are M/M/1 and Q4 i an M/G/1 queue with the mean ervice time being 1/21 econd and the variance of the ervice time being econd 2. 2

3 Quetion 6 Conider that a queue in a communication network i modeled a an M/M/1/N queue where the ize of the queuing ytem i N = 3. (a) Auming that the arrival rate i 10,000 packet per econd and the average ervice time i 80 ec: (i) Draw the tate tranition diagram that repreent the behaviour of the queuing ytem. (ii) Determine the probability that a packet arriving at the queue mut be dicarded becaue the queue i full. (iii) Determine the average number of packet in the queue. (iv) Determine the average delay for packet that are not dicarded. (b) Aume now that N = 2. Given that the arrival rate i 10,000 packet per econd, determine the maximum poible average ervice time o that the probability of a packet being dicarded i le than Quetion 7 A queuing ytem ha Poion arrival with an arrival rate of 50 packet/ ec and two erver with an exponential ervice time of t =.015 ec. In addition to the two erver, the ytem ha one waiting poition. Hence, the ytem i a M/M/2/3 queue. (a) Draw the tate tranition diagram and determine the tate probabilitie. (b) Determine the average number of cutomer in the queuing ytem. (c) What i the probability of blocking? Quetion 8 Conider a queuing ytem that behave in the following manner: - here are never more than two cutomer in the queuing ytem. - he erver mut erve either two cutomer at a time or no cutomer. - If a cutomer arrive and there are no cutomer in the queuing ytem, the cutomer will wait and will not be erved immediately. - If a cutomer arrive and there i one cutomer waiting and no cutomer being erved, both cutomer will immediately begin to be erved by the erver. - If a cutomer arrive and two cutomer are being erved, the cutomer i dicarded. (Hence, there can never be cutomer waiting while cutomer are being erved.) - he erver erve two cutomer at once for the ame length of time and the ervice time i exponentially ditributed. (a) Draw the tate tranition diagram for the ytem. (b) Auming that cutomer arrival are Poion at a rate of 20 cutomer per minute and the average time cutomer will take while being erved (not including waiting time) i 2 econd, what i the probability that a cutomer i blocked from being erved (i.e., the probability that a cutomer i dicarded)? 3

4 Quetion 9 A ynchronou packet witch contain only input queue, with one firt-come-firt-erve queue at each input. During a witching cycle, one packet may placed in the queue and/or one packet may leave the queue. Packet at the head of the queue are kept in the queue until they can be uccefully tranmitted to the output link. hat i, if the packet at the head of the queue i not blocked, it i removed from the queue. In any given witching cycle, the probability of a packet arriving at an input i 20% and the probability of blocking occurring for a packet at the head of the queue i 30%. he input queue can tore up to 4 packet. Arriving packet are queue at the beginning of the witching cycle and departing packet are dequeued at the end of the witching cycle. Hence, an incoming packet mut be queued before it i poible to dequeue the packet at the head of the queue. A packet mut be placed in the queue for at leat one witching cycle before it i tranmitted. (For example, if a packet arrive in witching cycle i to an empty queue, it will be removed from the input queue no earlier than witching cycle i+1.) (a) Draw the tate tranition diagram of the Markov chain formulation of the ytem. (b) Determine the tate probabilitie. (c) What i the probability that a packet will be dicarded? Note that an arriving packet mut be queued before the packet at the head of the queue can be dequeued. 4

5 ANSWERS: Q1. (a) (b) Q2. (a) (b) (c) Q3. (a) (b) 5936 bit Q4. (a) 6.17 Q5. (a) 1.7 (b) (c) Q6. (a) (ii) PB = (iii) (b) k (iv) Q7. (a) P0 = 0.468, P1 = 0.351, P2 = 0.132, P3 = (b) average # packet = (c) PB = Q8. (a) P0 = 3/8, P1 = 3/8, P2 = 1/4 (b) PB = 1/4 Q9. (b) P0 = , P1 = , P2 = , P3 = , P4 = (c) PB =

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Compiler Construction

Compiler Construction Compiler Contruction Lecture 6 - An Introduction to Bottom- Up Paring 3 Robert M. Siegfried All right reerved Bottom-up Paring Bottom-up parer pare a program from the leave of a pare tree, collecting the

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Performance Analysis of the Signaling Channels of OBS Switches

Performance Analysis of the Signaling Channels of OBS Switches 296 Performance Analysis of the ignaling Channels of OB witches Hulusi YAHYAGİL A.Halim ZAİM M.Ali AYDIN Ö.Can TURNA İstanbul University, Computer Engineering Department, Avcılar İstanbul, TURKEY Abstract

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

p done CPU p user p drivdone 1-p drivdone

p done CPU p user p drivdone 1-p drivdone Approximate Analytical Performance Evaluation of a UNIX Baed Multiproceor Operating Sytem Stefan Greiner Duke Univerity Dept. of Electrical Engineering Durham, NC 2770-029, USA Box 9029 greiner@ee.duke.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States (19) United State US 2006O1296.60A1 (12) Patent Application Publication (10) Pub. No.: Mueller et al. (43) Pub. Date: Jun. 15, 2006 (54) METHOD AND COMPUTER SYSTEM FOR QUEUE PROCESSING (76) Inventor: Wolfgang

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

13/ 12/ Am ade us IT Gro up and its affil iate s and sub sidi arie s. Development Last update: 04/27/2017 Page 1 of 12. amadeus-hospitality.

13/ 12/ Am ade us IT Gro up and its affil iate s and sub sidi arie s. Development Last update: 04/27/2017 Page 1 of 12. amadeus-hospitality. u it ub idi Lat date: 04/27/7 Page 1 of 12 amu-hopitality.com u it ub idi Index I-Server 2.0 AP4 I-Server 2.0 AP4 Sytem Requirement...3 Additional Server Requirement...4 Sytem Requirement Worktation Requirement...5

More information

Course Updates. Reminders: 1) Assignment #13 due Monday. 2) Mirrors & Lenses. 3) Review for Final: Wednesday, May 5th

Course Updates. Reminders: 1) Assignment #13 due Monday. 2) Mirrors & Lenses. 3) Review for Final: Wednesday, May 5th Coure Update http://www.phy.hawaii.edu/~varner/phys272-spr0/phyic272.html Reminder: ) Aignment #3 due Monday 2) Mirror & Lene 3) Review for Final: Wedneday, May 5th h R- R θ θ -R h Spherical Mirror Infinite

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function Proceeding of the World Congre on Engineering and Computer Science 2012 Vol II, October 24-26, 2012, San Francico, USA Modeling Throughput and Delay in 802.11 Infratructure Mode Network with QoS Support

More information

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Technical Bulletin TB1554. Class: INFO. JVM Software Update Procedure

Technical Bulletin TB1554. Class: INFO. JVM Software Update Procedure Serie Cla: INFO Reviion: B Sheet 1 of 9 Releae Date: 14.08.2014 With the introduction of the JVM (Johnton Viual Module) on the product range it i now poible to download oftware by mean of a Johnton USB

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

TN NET. TCP/IP stack sockets API V (http://www.tnkernel.com/) Copyright 2009 Yuri Tiomkin

TN NET. TCP/IP stack sockets API V (http://www.tnkernel.com/) Copyright 2009 Yuri Tiomkin TN NET TCP/IP tack ocket API V. 0.8 (http://www.tnkernel.com/) Copyright 2009 Yuri Tiomkin Document Diclaimer The information in thi document i ubject to change without notice. While the information herein

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Queueing Networks. Lund University /

Queueing Networks. Lund University / Queueing Networks Queueing Networks - Definition A queueing network is a network of nodes in which each node is a queue The output of one queue is connected to the input of another queue We will only consider

More information

Understanding Queuing and Scheduling QoS on Catalyst 4000 Supervisor III and IV

Understanding Queuing and Scheduling QoS on Catalyst 4000 Supervisor III and IV Understanding Queuing and Scheduling QoS on Catalyst 4000 Supervisor III and IV Document ID: 21389 Contents Introduction Before You Begin Conventions Prerequisites Components Used Queuing Strict Priority

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Paper. Development and Evaluation of a Certificate Validation System in Mobile Environments

Paper. Development and Evaluation of a Certificate Validation System in Mobile Environments TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING IEEJ Tran 2007; 1: 84 93 Publihed online in Wiley InterScience (www.intercience.wiley.com). DOI:10.1002/tee.20101 Paper Development and Evaluation

More information

Two-Level Iterative Queuing Modeling of Software Contention

Two-Level Iterative Queuing Modeling of Software Contention Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menacé Dept. of Computer Science George Maon Univerity www.c.gmu.edu/faculty/menace.tml In Proc. 2002 IEEE MASCOTS Conference, Fort

More information

Towards Mobility-Aware Proactive Caching for Vehicular Ad hoc Networks

Towards Mobility-Aware Proactive Caching for Vehicular Ad hoc Networks Toward Mobility-Aware Proactive aching for Vehicular Ad hoc Network Youef AlNagar, Sameh Hony, Amr A. El-Sherif Wirele Intelligent Network enter (WIN), Nile Univerity, Giza, Egypt. Department of Electrical

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

Resource Auto-Scaling and Sparse Content Replication for Video Storage Systems

Resource Auto-Scaling and Sparse Content Replication for Video Storage Systems 1 Reource Auto-Scaling and Spare Content Replication for Video Storage Sytem DI NIU 1, HONG XU 2 and BAOCHUN LI 3, Univerity of Alberta 1, City Univerity of Hong Kong 2, Univerity of Toronto 3 Many video-on-demand

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Harvard Technical Report TR-3-4 Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Abtract Numerou propoal exit for load balancing in peer-to-peer (pp)

More information

CS 467/567: Divide and Conquer on the PRAM

CS 467/567: Divide and Conquer on the PRAM CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor

More information

Technical Bulletin TB1570. Class: INFO. Subject JVM Software Update Procedure. Series V-Range (501,651,801)

Technical Bulletin TB1570. Class: INFO. Subject JVM Software Update Procedure. Series V-Range (501,651,801) Serie V-Range (501,651,801) Cla: INFO Reviion: E Sheet 1 of 8 Releae Date: 16.12.2015 With the introduction of CAN communication and control on the truck mounted range of Johnton Sweeper, there i now the

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

Delivery Network on the Internet

Delivery Network on the Internet Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology

More information

arxiv: v1 [physics.soc-ph] 9 Dec 2018

arxiv: v1 [physics.soc-ph] 9 Dec 2018 The z-matching problem on bipartite graph Jin-Hua Zhao CAS Key Laboratory of Theoretical Phyic, Intitute of Theoretical Phyic, Chinee Academy of Science, Beijing 100190, China Dated: December 11, 2018

More information

IV. PACKET SWITCH ARCHITECTURES

IV. PACKET SWITCH ARCHITECTURES IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

How to protect from port scanning and smurf attack in Linux Server by iptables

How to protect from port scanning and smurf attack in Linux Server by iptables In thi pot I will hare the iptable cript in which we will learn How to protect from port canning and murf attack in Linux Server Feature Of Script : (1) When a attacker try to port can your erver, firt

More information

Now consider the following situation after deleting three elements from the queue...

Now consider the following situation after deleting three elements from the queue... Scheme of valuvation -1I Subject & Code : Data Structure and Application (15CS33) NOTE: ANSWER All FIVE QUESTIONS 1 Explain the diadvantage of linear queue and how it i olved in circular queue. Explain

More information

Using Partial Evaluation in Distributed Query Evaluation

Using Partial Evaluation in Distributed Query Evaluation A X x Z z R r y Y B Uing Partial Evaluation in Ditributed Query Evaluation Peter Buneman Gao Cong Univerity of Edinburgh Wenfei Fan Univerity of Edinburgh & Bell Laboratorie Anataio Kementietidi Univerity

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE

PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE Manih Srivatava et al./ International Journal of Comuter Science & Engineering Technology (IJCSET) PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE Mr. Manih Srivatava

More information

ESRP Storage Program EMC Celerra NS-120 (1,500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010

ESRP Storage Program EMC Celerra NS-120 (1,500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010 ESRP Stora Program EMC Celerra NS-12 (1, Uer) Mailbox Reilien Stora Solution for Microoft Exchan 21 Teted with: ESRP Stora Verion 3. Teted Date: 3/2/21 EMC Corporation Corporate Headquarter Hopkinton,

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

Optimization Coverage of Wireless Sensor Networks Based on Energy Saving. Technology, Luoyang , China. Xi an , China

Optimization Coverage of Wireless Sensor Networks Based on Energy Saving. Technology, Luoyang , China. Xi an , China , pp.35-48 http://dx.doi.org/10.1457/ijfgcn.014.7.4.04 Optimization Coverage of Wirele Senor Network Baed on Energy Saving Zeyu Sun 1, Heng Li 1, Heng Chen and Wei Wei 3 1 Computer and Information Engineering,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Computing C-space Entropy for View Planning

Computing C-space Entropy for View Planning Computing C-pace Entropy for View Planning for a Generic Range Senor Model Pengpeng Wang (pwangf@c.fu.ca) Kamal Gupta (kamal@c.fu.ca) Robotic Lab School of Engineering Science Simon Fraer Univerity Burnaby,

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn The Harvard community ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation Publihed

More information

SMDP: minimizing buffer requirements

SMDP: minimizing buffer requirements Multimedia Sytem 8: 05 7 2000 Multimedia Sytem c Springer-Verlag 2000 SMDP: minimizing buffer requirement for continuou media erver Youjip Won,, Jaideep Srivatava 2 Diviion of Electrical and Computer Engineering,

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Lecture 6: Multicast. Multicast Motivation. Multicast Efficiency. Native IP Multicast Service Model. Native IP Multicast Service Model

Lecture 6: Multicast. Multicast Motivation. Multicast Efficiency. Native IP Multicast Service Model. Native IP Multicast Service Model Lecture 6: Multicat Challene: how do we efficiently end meae to a roup of machine? Need to reviit all apect of networkin outin Autonomou ytem and admin control Addre allocation Conetion control eliable

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

Factor Graphs and Inference

Factor Graphs and Inference Factor Graph and Inerence Sargur Srihari rihari@cedar.bualo.edu 1 Topic 1. Factor Graph 1. Factor in probability ditribution. Deriving them rom graphical model. Eact Inerence Algorithm or Tree graph 1.

More information

Attack-Resilient Multitree Data Distribution Topologies

Attack-Resilient Multitree Data Distribution Topologies Attack-Reilient Multitree Data Ditribution Topologie Sacha Grau acha.grau@tu-ilmenau.de Techniche Univerität Ilmenau, Germany Abtract. We conider a cenario of information broadcat where a ource node ditribute

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Computer Communications

Computer Communications Computer Communication 33 (2) 852 859 Content lit available at ScienceDirect Computer Communication journal homepage: www.elevier.com/locate/comcom Admiion region of triple-play ervice in wirele home network

More information