Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Size: px
Start display at page:

Download "Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System"

Transcription

1 Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong ABSTRACT: The IEEE 82.4 standard committee is currenty working on a project to find a cost-effective means of providing access to integrated networks for peope to enjoy mutimedia programs and to work at home. An advanced system based on the CATV system caed Hybrid Fiber Coax is being studied. Since some properties of the HFC system precude the possibiity of directy using existing medium access contro protocos for its data ink ayer, a MAC scheme based on time division is discussed in this paper.. Introduction As ATM technoogy progresses, researchers are ooking for a cost-effective means of providing home access to integrated networks so that peope can enjoy mutimedia programs and work at home. Due to the arge geographica coverage of existing CATV systems, an advanced system based on CATV caed Hybrid Fiber Coax (HFC) is being studied by the IEEE 82.4 Project Committee []. This system wi ikey use ATM technoogy to provide mutipe services to home such as teephone, TV and information retrieva. In the HFC system, the downstream band and upstream band operate asymmetricay at different frequencies, and a node has ony one ink to each bus. Therefore, the HFC system may be abstracted into a ogica dua-branch-bus based network consisting of a distributing hub (caed headend in this paper) and the fiber nodes (or simpy nodes) as shown in Figure 3. In the downstream direction (from the headend to the nodes) broadcast mode is used, and the headend is the ony transmitter. This makes contro of the downstream band simpe. In the upstream direction (from the nodes to the headend), the nodes share the upstream band for transmission, and contention access mode is used. To aow each node to have equa opportunity to share the upstream band, an efficient medium access contro (MAC) protoco is necessary. This protoco has to be cost-effective and efficient for ong distance communication, supporting a wide range of transmission rates as we as both anaog and digita broadband services [2]. Unfortunatey, these properties and requirements make it difficut to use existing MAC protocos directy for the foowing reasons: ) The ring-based protocos such as Token-Ring [5], FDDI [5], ATMR [3] and Orwe [4] are not suitabe for the duabranch-bus topoogy required by the HFC system. On the other hand, both CSMA/CD and Token-Bus [5] are suitabe for the HFC topoogy. However, CSMA/CD cannot guarantee bounded deay and is ony suitabe for reativey short distances. The weakness of Token-Bus is that it requires the users to remain on-ine to be incuded in the ogica ring which needs to be reconfigured whenever users are added or removed from the network. 2) It is difficut to use MAC protocos based on the sotted media approach ike DQDB [5] and CRMA [6]. These protocos often require a node to have two inks to each bus for data insertion. Moreover, DQDB needs two headends and CRMA requires a foded bus whie there is ony one ogica headend and the topoogy is required to be dua-branch-bus in the HFC system. Athough the two ogica buses in the HFC system can be ooped to form a foded bus ike CRMA, the outbound bus (from the headend to the nodes) is reserved for transmission, and the inbound bus (from the nodes to the headend) for receiving in the foded-bus CRMA. This is opposite to the HFC system where the downstream band is for the users to receive data and upstream band for the users to transmit data. With regards to the specia position of the headend in the HFC system, a MAC scheme based on centraized contro is a natura choice. One such scheme is the traditiona poing system such as Ro-ca Poing [8]. However, these systems have been designed for ow or medium speed data appications under the assumption that the propagation deay is negigibe compared to the transmission time. This assumption is not true in high speed networks [7]. In this paper, we wi discuss a new MAC scheme caed Sef-Contro Cyce Access with Time Division (SCCA/TD). The rest of the paper is organized as foows. The principe of SCCA/TD is introduced in Section 2, and simuation studies on this prototype are give in Section 3. Finay Section 4 concudes the paper. 2. Introduction to SCCA/TD SCCA/TD is a reservation based MAC scheme which aows the nodes to share the upstream bandwidth. A node normay needs to make requests for bandwidth through the upstream band. The headend wi respond to the requesting nodes through the downstream band. The upstream bandwidth is divided into equa time segments caed cyces. A cyce is divided again into fractions which are assigned to the nodes according to their requests. As shown in Figure, the same epoch of the cyce is repeated periodicay as ong as the requests of the nodes are unchanged. That is, the quota and position of the bandwidth aocation to a given node in each cyce are not changed. In this way, a node can access the medium simpy knowing the reative position of its assignment in the cyce. The granted bandwidth can be used by the nodes for transmitting data or submitting requests. Cyce k Cyce k+ Cyce k+2 3 i 3 i 3 i 2.. Cyce Structure i assignment to node i : cyce ength Figure The principe of SCCA/TD

2 A cyce is divided into the static reservation segment (SRS) and the dynamic reservation segment (DRS) as shown in Figure 2. SRS gives each node a basic bandwidth assignment periodicay in each cyce. A node can use the SRS assignment to submit requests or transmit sma amounts of data. DRS, on the other hand, provides bandwidth dynamicay to the nodes according to their requests. The advantage of using SRS is that it provides the nodes quick access to the medium. However, if a node has nothing to transmit, its assignment wi be wasted. Requiring severa nodes to share the same assignment aternatey can improve efficiency. When a node has a arge amount of data to transmit, it needs to get the requested bandwidth from DRS. To this end, the node submits a request to the headend carried by a specia packet containing the node's identifier, transmission speed, request type and other reated parameters. The headend wi respond with a specia confirmation packet. cyce: L SRS DRS SRS (Static Reservation Segment) is staticay reserved to each node DRS (Dynamic Reservation Segment) is aocated to nodes according to the node's requests L / L2: Length of SRS / DRS, = L + L2 L2 Figure 2 The cyce structure There are two types of requests that a node can submit to the headend: Gross Bandwidth Request (GBR) and Cycic Bandwidth Request (CBR). With GBR, a node informs the headend of the tota amount of bandwidth it needs, and the headend serves the request in consecutive cyces if the request cannot be satisfied within a singe cyce. In this case, the requesting node wi get the tota required bandwidth in mutipe cyces, each providing ony a fraction of the tota required bandwidth. With CBR, a node informs the headend of the bandwidth it requires in each cyce. If the request is granted, the node gets the same quota of bandwidth in the same reative ocation in each subsequent cyce unti the end of transmission. When the node finishes transmission, it has to send a message to the headend to reinquish its DRS reservation. The first type of request is suitabe for bursty traffic such as data whie the second type is suitabe for periodic traffic such as voice and video. For both SRS and DRS, the nodes can adopt the sefcontro cycic access mechanism to use the bandwidth after receiving confirmation without additiona contro from the headend. That is, the headend notifies the requesting node the starting time of its bandwidth assignment, the quota of bandwidth that the node can use in each cyce and the cyce ength, i.e., the period in which the node can use its assignment unti either the expiration of its grant (for GBR request) or the end of transmission (for CBR request). This scheme can be impemented with timers or counters for fixed ength MAC protoco data units Scheduing Schemes Coisions burden networks with extra work for coision detection and resoution, and wastes bandwidth. This is especiay undesirabe in high-speed networks. Therefore, SCCA/TD is designed to be coision-free. The scheduing done by the headend is the key to coision avoidance. The bandwidth aocation mechanism has to maintain fairness for the nodes to share bandwidth whie avoiding coision to improve network utiization. There are many aternatives for the aocation poicy. A simpe scheme woud be for the headend to coect the requests and serve them one by one in round robin. This scheme is used in the simuation studies beow. In the foowing, we discuss two coision avoidance approaches. The foowing parameters are used in the discussion: n - tota number of nodes in the network (see Figure 3); m - tota number of nodes simutaneousy sharing the same cyce; - cyce ength; d(i,j) - distance between nodes i and j; d - distance between nodes and n, i.e., maximum propagation deay; µ - measured in terms of the tota time used for transmission within a cyce over the cyce ength. (for simpicity,, d(i,j) and d are a measured in time units) a) The Efficient Approach (EA) headend Tb 2... i... m... n upstream band bus current cyce downstream band bus Te / Tb Te() next cyce Tb() d(,2) Te(2) Te() no transmission Tb(2) d(2,3) Te(3) Te(m) Tb(3)... Tb(m) d(,m) Tb() Tb / Te: Beginning / End of the cyce Tb(i) / Te(i): Beginning / End of assignment to node i Figure 3 Diagram of cyce division with EA For this approach, we suppose that the signa propagation in the upstream band bus is unidirectiona towards the headend, and the sequence of bandwidth assignment to the nodes in each cyce is in accordance with the sequence of their physica positions in the network. In this case, the cyce aways begins with the assignment to the node cosest to the headend. The propagation deay between adjacent nodes is taken into account to maximize which can go up to. This can be expained by Figure 3, where the cyce is fuy shared by m active nodes. Notice that an active node i+ can advance its transmission by d(i,i+) ahead of the end of transmission of node i due to propagation deay. The tota time advanced within a cyce is equa to d(i,i+) = d(,m) (i =, 2,.. m- ). When the ast active node m finishes transmission, time d(,m) is required to aow its traffic pass through a the downstream nodes before the beginning of the next cyce. This time is compensated by the tota time advanced by a the nodes. Therefore, EA can give high independent of network size and cyce ength. However, if no bandwidth in a suitabe position in the cyce is avaiabe to a new requesting node, the headend has to shift the positions of some existing assignments in order to accept new requests. For exampe, as shown in Figure 4, if nodes 3, 4 and 8 become active, there is no free segment suitabe to them even though there are severa free segments in the cyce. By shifting the bandwidth assignments for nodes, 2 and 7 to the eft (occupying some of the unassigned space), some spaces are made avaiabe for the new requesting nodes in the right position. In this case, the headend needs to send messages to the affected nodes informing them their new

3 bandwidth assignments in the cyce. Shifting bandwidth assignments can provide more fexibe and efficient bandwidth aocation at the expense of compexity. Cyce division: Inactive nodes: ➂ ➃ ➇ ➉ Active nodes: ❶ ❷ ❺ ❻ ❼ ❾ occupied Figure 4 Assignment in a cyce versus the physica position of the nodes A simpe impementation of EA caed quasi-ea () is that when aocating an assignment in the cyce for a node, the position of the assignment in the cyce is determined by the node's physica position in the network to avoid irreguar cyce divisions. b) The Simpe Approach () With this approach, the reative physica positions of the nodes in the network are not taken into account. The maximum distance (i.e., d) is used as the distance between any pair of nodes. In this case, when an active node finishes its assignment in a cyce, the next active node has to wait d time units before starting its transmission. µ = - m *, where = d /, is the bandwidth wastage per active node due to the gap paced between adjacent assignments for avoiding coision. As shown in Figure 6, is inversey proportiona to the number of active nodes for a given cyce ength and network size. The maximum is bounded by -. Therefore, this approach is suitabe for sma size networks ony because it is easy to get a sma with ong cyces in this case. 3. Simuation Studies As mentioned in Section 2., there are two types of requests that a node can make, i.e., GBR and CBR. With CBR, a node can get the guaranteed bandwidth in every cyce if its CBR request is confirmed. This is simiar to GBR when a arge GBR request is divided into mutipe fragments served by severa consecutive cyces. Therefore, our simuation is concerned with GBR requests ony. 3. Simuation Mode The simuation mode consists of 25 nodes with equa distance between any two neighboring nodes (s). The network size (NS) is equa to 24 * s (assuming the distance between node and the headend is ). The traffic mode of each node is a bursty puse train [9] as shown in Figure 5. The deay between two consecutive bursts and the number of ces in a burst foow respectivey the exponentia and geometric distributions. The network capacity is set to Mbps corresponding to OC-3, which resuts in the ce ength (CL: time to transmit an ATM ce) of µs. The static reservation for each node is set to s. The ength of the static reservation segment in a cyce, L, is equa to 25 * s. The mean ce arriva rate from a node (MCR) can be computed by BL / (DB + BL * IC). The ce transmission rate given by the network is equa to / CL, which is shared by 25 nodes so free that each node gets / (25 * CL). The offered oad (OL) is defined as MCR / [ / (25 * CL)] = 25 * CL / MCR. Given CL, OL and BL, DB = (25 / OL - ) * BL * CL. The main performance index to be investigated is µ. The request response time is not measured since a node can continue to make requests even after the previous ones have not been honored; and the headend may honor severa requests for a given node at the same time. Tabe ists the main parameter vaues used by the different simuations (NS = network size, BS = buffer size, = cyce ength, OL = offered oad, BL = burst ength, PV = parameter to be varied). The defaut M setting is (L2 - I) for the with I = d, and L2 / 25 for the scheme. DB burst BL DB: mean deay between two burrsts (exponentia distribution) BL: mean number of ces in a burst (geometric distribution with probabiity =. / [BL + ]) IC: interva between two ces (constant equa to a ce ength) Figure IC Figure 5 Burst puse train traffic mode NS (km) BS (ce) (ce) OL BL (ce) Fig PV. 3 Fig PV PV 3 Fig.8 3 PV 3.75 PV Fig.9 3 PV 3.75 PV Fig. 3 PV 3.75 PV Fig. PV 25 PV. 3 Fig.2 PV 25 PV. PV Tabe Parameter setting for the different simuations 3.2 Simuation Resuts This subsection is organized as foows: Figures 6 to investigate the effects of some parameter settings (e.g., request threshod, offered oad and buffer size) to the performance of and s; and Figure compares the performance between and. Athough shows better performance than in many cases as shown beow, the main advantages of are its simpicity and appicabiity to wireess networks. The simuation resuts are obtained using the simuation package BONes DESIGNER V 2.6 from Ata Group. Each point on the graphs took about 3 hours to simuate on a SPARC-5 machine. Figure 6 shows the effect of request threshod (T) to (µ) for and. It is observed that T has very itte effect on µ. For, a reasonabe cyce setting (e.g., CL = 3) can produce a good µ. For, the cyce ength is 5 ces and M is set to 5, 9, 25 (average setting) and 45 (maximum setting) ces respectivey. Note that can amost achieve the same µ as, but the number of simutaneous active nodes in is imited to or 2 by the maximum M setting (i.e., M = L2 - I) whie that in is equa to N (e.g., N = 25 in this simuation mode). Figure 7 depicts (µ) versus offered oad (OL) for different cyce engths (). µ at T is the theoretica maximum vaue (TMµ) for a given network size and cyce ength according to the anayses in Section 2.2. Note that it is easier for traffic to fi a shorter cyce (e.g., = ) rather than a onger one. However, increasing µ with

4 increasing OL in with a short cyce is imited by the TMµ which is smaer than in. It is possibe to have a high µ in since the TMµ is equa to. In addition, different cyces in ead to the same µ in the case of heavy oad since µ given by is not infuenced by the cyce setting but mainy depends on the traffic pattern of the nodes ike the EA scheme mentioned in Section = =3 = request threshod (ce) a) µ vs, M = - 5 ces M = 5 M = 9 M = 25 M = request threshod (ce) b) µ vs M, = 5 ces Figure 6 Effect of request threshod to Figures 8 ~ 9 show the performance (bandwidth utiization, mean response time and mean ce oss rate) for different buffer sizes (BS) and different burst engths (BL). Generay, when the buffer is arge enough, the infuence of BL becomes weak in, but this is not the case in. It is because M is set to the maximum in so that a node can get a arger quota in each cyce. After finishing the quota, the node needs to wait for a ong time to get another quota. During this period, the arge buffer can be used to smooth the traffic. However, adopts the average setting so that a node can usuay get a quota in each cyce. This makes sensitive to traffic burstiness. Therefore, with the average setting is more suitabe for ess bursty traffic = =3 = offered oad (OL) = =3 = T offered oad (OL) Figure 7 Bandwidth utiization versus offered oad T mean response time (ms) mean response time (ms) BL= BL=3 BL=5 75 BL= BL=3 BL=5 75 Figure 8 Bandwidth utiization versus buffer size BL= BL=3 BL= BL= BL=3 BL=5 75 Figure 9 Mean response time versus buffer size Figure 9 shows the mean response time (MRT) as a function of buffer size. MRT is the eapsed time between the ce arriva to the buffer and its departure. Different from, MTR in is sensitive to BL due to the reason mentioned above. Figure presents the mean ce oss rate (MCLR) cacuated in terms of tota ost ces over tota generated ces. When the buffer size is sma, MCLR for is smaer than that for because the bandwidth aocation in the cyce in with the average setting is more suitabe than that in with the maximum setting for the traffic accumuated in a sma buffer. The effect is reversed in the case of arge buffers due to the reason mentioned above. Figure shows (µ) versus network size (NS) with cyce engths of 3 and 5 ces. _t and EA_t are respectivey the theoretica maximum µ for and EA respectivey (refer to Section 2.2 for the cacuation). It is cear that µ in decreases with increasing NS in the case of = 3. In the case of = 5, µ first increases with NS up to NS = 52 then decreases. This is due to the mismatch between the assignment in the cyces and the traffic oad from

5 the nodes. Since ong distance increases the response deay because of the propagation deay, this gives some time for the nodes to accumuate traffic. Simiar observation is aso found in. However, this increase is imited by the theoretica maximum vaue. Anyway, is ess infuenced by NS than so is more suitabe for metropoitan area of networks. mean ce oss rate mean ce oss rate BL= BL=3 BL= BL= BL=3 BL=5 75 Figure Mean ce oss rate versus buffer size _t EA_t a) = 3 ces 65 network size (km) _t EA_t b) = 5 ces network size (km) Figure Bandwidth utiization versus network size The fairness with which the nodes share the upstream bandwidth depends on the service discipine used by the scheduing agorithm at the headend. In the simuation, the nodes are served one by one in round-robin rather than FIFO discipine since the atter wi ead to unfairness caused by the propagation deay between the nodes and the headend. Figure 2 pots the mean access interva for each node, which is the mean interva between two consecutive accesses to the media for a node. As shown in Figure 2.a, behaves better than since use the average setting and uses the maximum setting. As iustrated in Figure 2.b, performs very we in the case of burst ength equa to. A better service discipine is needed to ensure fairness among a nodes for BL >. mean access interva (µs) mean access interva (µs) node index a) =5 ces, NS=65 km, BL=3 ces 5 5. Discussion BL= ces BL=3 ces node index b), =3 ces, NS=26 km Figure 2 Fairness issue on mean access interva in and A MAC scheme based on time division for the HFC system, SCCA/TD, was discussed in this paper. The reservation scheme with sef-contro-cycic-access mechanism, which can be easiy impemented with timers, aows SCCA/TD to provide the bounded deay and throughput. This scheme requires ess contro from the network and permits the nodes to be passivey inked to the buses which enhance network robustness. The non-sotted media based framework can accommodate different transmission rates and support different types of MAC protoco data units. Athough the priority mechanism has not been addressed, it can be easiy impemented since the aocation poicy is centray performed by the headend. The static reservation segment (SRS) in each cyce can provide quick access to the medium. The scheduing agorithm is the key in SCCA/TD. Two schemes were discussed in the paper: the simpe one () is suitabe for sma size networks and the efficient one (EA) suitabe for a wide range of network sizes. More efficient schemes to reaize EA require further studies. References [] J. W. Eng, J. F. Moenauer, IEEE Project 82.4: Standards for Digita Convergence, IEEE Communications Magazine, May 995 Vo. 33 No. 5, pp2-23 [2] Mario P. Vecchi, Broadband Networks and Services: Architecture and Contro, IEEE Communications Magazine, August 995 Vo.33 NO.8, pp24-32 [3] Kazuo Imai,Tadashi Ito,Hideki Kasahara et a., "ATMR: Asynchronous transfer mode ring protoco", Computer Networks and ISDN Systems 26 (994) [4] J.L. Adams, "Orwe", Computer Networks and ISDN Systems 26 (994) [5] James Martin, "Loca Area Networks, Architectures and Impementations", 2nd Edition, PTR PRENTICE HALL, 994 [6] E.A. Zurfuh, R.D. Cideciyan et a, "The IBM Zurich Research Laboratory's.3 Gb/s LAN / MAN Prototype", Computer Networks and ISDN Systems 26 (993) [7] Bandua W.Abeysundara, "High-speed oca area network and their performance:a survey", ACM computing surveys,vo.23,no.2,june 99,p22-65 [[8] Mischa Schwartz, "Teecommunication Networks, Protocos, Modeing and Anaysis", Adison-Wesey pubishing Company, 988 [9] Ata Group of Cadence Design Systmes (Inc), BONeS DESIGNER Core Library Reference, V 3.

Architecture and Performance of A MAC Protocol for The HFC System

Architecture and Performance of A MAC Protocol for The HFC System Architecture and Performance of A MAC Protocol for The HFC System Shengming Jiang, Danny H.K. Tsang, Samuel T. Chanson Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong {eejiang,

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:

More information

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Distributed Dynamic Scheduling For End-to-end Rate Guarantees In Wireless Ad Hoc Networks

Distributed Dynamic Scheduling For End-to-end Rate Guarantees In Wireless Ad Hoc Networks Distributed Dynamic Scheduing For End-to- Rate Guarantees In Wireess Ad Hoc Networks ABSTRACT Theodoros Saonidis Department of Eectrica and Computer Engineering Rice University 6100 Main Street Houston,

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks Aternate Paths for Mutipe Faut Toerance on Dynamic WDM Optica Networks Nicoas Jara, Reinado Vaejos, Gerardo Rubino To cite this version: Nicoas Jara, Reinado Vaejos, Gerardo Rubino. Aternate Paths for

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Modeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks

Modeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks Internationa Journa of Eectrica and Eectronics Engineering 4:1 2010 Modeing and Anaysis of Adaptive Buffer Saring Sceme for Consecutive Packet Loss Reduction in Broadband Networks Saksi Kausa, R.K Sarma

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Directives & Memory Spaces. Dr. Farid Farahmand Updated: 2/18/2019

Directives & Memory Spaces. Dr. Farid Farahmand Updated: 2/18/2019 Directives & Memory Spaces Dr. Farid Farahmand Updated: 2/18/2019 Memory Types Program Memory Data Memory Stack Interna PIC18 Architecture Data Memory I/O Ports 8 wires 31 x 21 Stack Memory Timers 21 wires

More information

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet. Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up

More information

Inside TCP/IP, Third Edition Network Support for TCP/IP

Inside TCP/IP, Third Edition Network Support for TCP/IP Inside TCP/IP, Third Edition -- Ch 3 -- Network Support for TCP/IP Page 1 of 47 Inside TCP/IP, Third Edition - 3 - Network Support for TCP/IP One of the reasons for the popuarity of TCP/IP networks is

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Error Control Strategies for WiMAX Multi-hop Relay Networks

Error Control Strategies for WiMAX Multi-hop Relay Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Defense against Low-rate TCP-targeted Denial-of-Service Attacks

Defense against Low-rate TCP-targeted Denial-of-Service Attacks Defense against Low-rate CP-targeted Denia-of-Service Attacks Guang Yang, Mario Gera and M. Y. Sanadidi Computer Science Department, UCLA Los Angees, CA 995 {yangg, gera, medy}@cs.uca.edu e: +-3-825-888,

More information

Feedback-Free Packet Loss Recovery for Video Multicast

Feedback-Free Packet Loss Recovery for Video Multicast Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Infinite Server Queueing Networks with Deadline Based Routing

Infinite Server Queueing Networks with Deadline Based Routing Infinite Server Queueing Networks with Deadine Based Routing Nea Master and Nichoas Bambos BCMP networks in the more genera framework of Key networks [8]. Key networks have been used and buit upon in severa

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Keywords Wireless Mesh Network, Routing, WMN Routing Metric, Best Path Selection in WMNs, Wireless Routing Strategy.

Keywords Wireless Mesh Network, Routing, WMN Routing Metric, Best Path Selection in WMNs, Wireless Routing Strategy. Voume 6, Issue 7, Juy 2016 ISSN: 2277 128X Internationa Journa of Advanced Research in Computer Science and Software Engineering Research Paper Avaiabe onine at: www.ijarcsse.com An Efficient Routing Metric

More information

Location Aided Hybrid Routing Algorithm for MANET

Location Aided Hybrid Routing Algorithm for MANET Internationa Journa of Engineering & Technoogy IJET-IJENS Vo: No: 0 30 Location Aided Hybrid Routing Agorithm for MANET Mamoun Hussein Mamoun Facuty of Computer and Information Sciences Mansoura University,

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

SA2100X-UG001 SA2100. User Guide

SA2100X-UG001 SA2100. User Guide SA2100X-UG001 SA2100 User Guide Version 2.0 August 7,2015 INSEEGO COPYRIGHT STATEMENT 2015 Inseego Corporation. A rights reserved. The information contained in this document is subject to change without

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Techniques for Scheduling I/O in a High Performance Multimedia-on-Demand Server

Techniques for Scheduling I/O in a High Performance Multimedia-on-Demand Server Syracuse University SURFACE Eectrica Engineering and Computer Science Coege of Engineering and Computer Science 995 Techniques for Scheduing I/O in a High Performance Mutimedia-on-Demand Server Divyesh

More information