IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *
|
|
- Bryan Gibbs
- 5 years ago
- Views:
Transcription
1 IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206, Bejng Unversty of Posts & Telecouncatons, Bejng 00876, P.R.Chna 2 Noka Chna R&D Center, Noka House, No., He Png L Dong Je, Bejng, 0003, P.R.Chna Abstract- Beng a art of IEEE roject 802, the 802. Medu Access Control(MAC) s used to suort asynchronous and te bounded delvery of rado data ackets. It s roosed that a Dstrbuted Coordnaton Functon(DCF), whch uses Carrer Sense Multle Access wth Collson Avodance (CSMA/CA) and bnary slotted exonental backoff, be the bass of the IEEE 802. WLAN MAC rotocols. Ths aer rooses a throughut enhanceent echans for DCF by adjustng the Contenton Wndow(CW) resettng schee. Moreover, an analytcal odel based on Markov chan s ntroduced to coute the enhanced throughut of 802. DCF. The accuracy of the odel and the enhanceent of the roosed schee are verfed by elaborate sulatons. Key Words: IEEE 802., CSMA/CA, DCF, analyss I. INTRODUCTION Recently, there s an ncreasng need towards ortable and oble couters or workstatons wth the develoent wreless acket coutng technology. Wreless networks need to rovde councatons between oble ternals, oreover, hgh seed access to backbone networks needs to be rovded too. Wreless Local Area Networks(WLANs)[-4], whch rovdes hgher flexblty and convenence than ther wred counter art, are beng develoed to rovde hgh bandwdth access for users n a lted geograhcal area. IEEE Project 802 recoends an nternatonal standard 802.[-2] for WLANs. The standards ncludes detaled secfcatons both for Medu Access Control(MAC) and Physcal Layer(PHY). In WLANs, the hyscal eda, whch s shared by all statons and has lted connecton range, has sgnfcant dfferences when coared to wred eda. The IEEE 802. standards nclude Dstrbuted Coordnaton Functon(DCF) and otonal Pont Coordnaton Functon(PCF). In 802., the DCF s the fundaental access ethod used to suort asynchronous data transfer on a best effort bass. As secfed n the standards, the DCF ust be suorted by all the statons n a basc servce set(bss). The DCF s based on Carrer Sense Multle Access wth Collson Avodance (CSMA/CA). CSMA/CD s not used because a staton s unable to lsten to the channel whle transttng. In 802. CS s erfored both at hyscal layer, whch s also referred to as hyscal carrer sensng, and at the MAC layer, whch s known as vrtual carrer sensng. The PCF n the 802. s a ollng-based rotocol, whch s desgned to suort collson *Ths work s suorted by Noka-BUPT roject free and real te servces. There are two technques used for acket transttng n DCF. The default one s a two-way handshakng echans, also known as basc access ethod. A ostve MAC acknowledgeent(ack) s transtted by the destnaton staton to sgnal the successful acket transsson. The other otonal one s a four-way handshakng echans, whch uses request-to-send/clear-to-send(rts/cts) technque to reserve the channel before data transsson. Ths technque has been ntroduced to reduce the erforance degradaton due to hdden ternal. However, the drawback of RTS/CTS echans s ncreased overhead for short data fraes. In DCF, a bnary slotted exonental backoff s used wth CSMA/CA. Whenever a backoff occurs, the backoff te s set fro a unfor dstrbuton over the nterval [0,CW], whle the Contenton Wndow(CW) wll be doubled for a retry and reset for a new acket. Ths aer rooses a lttle bt conservatve way by resettng the CW to rove the throughut erforance of DCF. To analyze resettng CW, the odelng of 802. has been exaned. Paer [5] gves the theoretcal throughut lt of 802. based on a -ersstent varant. However, t doesn t take the effect of the Contenton Wndow(CW) and bnary slotted exonental back-off rocedure used by DCF nto consderaton. Unlke those ones, Paer [6,7] use Markov rocess to analyze the saturated throughut of The Markov odel n aer[7] can be regarded as an extenson of the odel n aer[6] and t takes the retranssson lt of MAC fraes nto account. Ths aer analyzes the effect of roosed CW resettng schee by a new Markov chan odel, whch s valdated by elaborate sulatons. The aer s organzed as followng. Secton II brefly descrbes the DCF of IEEE 802. MAC rotocols. In secton III, the new CW resettng schee s ntroduced and an analytcal odel s roosed. Secton IV valdates the accuracy of ths odel by sulatons, and the odel s used for throughut erforance analyss. Fnally, secton V concludes the aer. II. DISTRIBUTED COORDINATION FUNCTION IN 802. The basc servce set(bss) s the fundaental buldng block of IEEE 802. archtecture. The geograhcal area covered by the BSS s known as the basc servce area(bsa), whch s slar to a cell n a cellular network /02/$7.00 (C) 2002 IEEE
2 suorts both the ad hoc network and nfrastructure network archtecture. Ths aer only gves a bref ntroducton of 802. DCF, the readers are referred to [,2] for detaled nforaton about It conssts of both a basc access ethod and an otonal RTS/CTS access ethod. A. The basc access ethod In 802., rorty access to the wreless edu s controlled by the use of nter-frae sace(ifs) te between the transsson of fraes. Totally three IFS ntervals have been secfed by 802. standard: short IFS(SIFS), ont coordnaton functon IFS(PIFS), and DCF-IFS(DIFS). The SIFS s the sallest and the DIFS s the largest. The staton ay roceed wth ts transsson f the edu s sensed to be dle for an nterval larger than the Dstrbuted Inter Frae Sace(DIFS). If the edu s busy, the staton defers untl after a DIFS s detected and then generate a rando back-off erod before transttng. The back-off ter counter s decreased as long as the channel s sensed dle, frozen when the channel s sensed busy, and resued when the channel s sensed dle agan for ore than a DIFS. A staton can ntate a transsson when the backoff ter reaches zero. The back-off te s unforly chosen n the range (0, w-). Also (w-) s known as Contenton Wndow(CW), whch s an nteger wth the range deterned by the PHY characterstcs CW n and CW ax. After each unsuccessful transsson, w s doubled, u to value 2 W, where W equals to (CW n +) and 2 W equals to (CW ax +). Uon receved a acket correctly, the destnaton staton wats for a SIFS nterval edately followng the receton of the data frae and transts a MAC ACK back to the source staton, ndcatng that the data frae has been receved correctly. In case the source staton does not receve an ACK, the data frae s assued to be lost and the source staton schedules retranssson wth the CW doubled. When the data frae s transtted, all the other statons hearng the data frae adjust ther Network Allocaton Vector(NAV), whch s used for vrtual CS at the MAC layer, based on the duraton feld value n the data frae, whch ncludes the SIFS and the ACK followng the data frae. B. The RTS/CTS access ethod In 802.[], DCF also rovdes an otonal way of transttng data fraes that nvolve transsson of secal short RTS and CTS fraes ror to the transsson of actual data frae. When the destnaton receves the RTS frae, t wll transt a CTS frae after SIFS nterval edately followng the receton of the RTS frae. The source staton s allowed to transt ts acket only f t receves the CTS correctly. If a collson occurs wth RTS fraes, less bandwdth s wasted when coared wth the stuaton where larger data fraes are n collson. III. DCF PERFORMANCE ENHANCEMENT AND ANALYSIS In ths aer, we focus on the saturated throughut, whch s also exaned n aer [6,7]. It s a fundaental erforance fgure defned as the throughut lt reached by the syste as the offered load ncreases, and t reresents the load that the syste can carry n stable condtons. A. New backoff schee to reset the CW In 802. DCF, a bnary slotted exonental backoff s used wth CSMA/CA. Whenever a backoff occurs; the backoff te s set fro a unfor dstrbuton over the nterval [0, w-]. After each unsuccessful transsson, w s doubled, u to a axu value 2 W, where W equals to (CW n +) and 2 W equals to (CW ax +). Once the CW reaches CW ax, t wll rean at the value of CW ax untl t s reset. The CW wll be reset to CW n after every successful attet of transsson of a data frae or a RTS frae, or where a retry counter reaches ts lt, whose value s dfferent for data and RTS frae n 802.,.e., 5 and 7[2]. Snce a staton use CW to control the backoff wndow of acket transsson, the otal settng of CW wll affect the erforance of DCF. The backoff rocedure of CW can be consdered as a rogress to robe the otal value of CW, however, the resettng schee n 802. breaks ths rogress, whch wll degrades the erforance of DCF. Then the queston s how to control the backoff counter, or CW otally or near otally. Ths aer rooses a sle change for 802. n order to ake the backoff counter oscllate around the otal value wthout colex calculaton and run-te estaton as n aer [5]. The way s conservatve than that used n It can be descrbed as followng: )Whenever the retry counter reaches the lt, the CW s ket and not reset; 2)After a successful transsson, w s set to the value ax[w/2, CW n +]; 3)Whenever a transsson for fals, w s set to the value n[2w, CW ax +]. It wll be referred as new backoff schee through out ths aer. Another contrbuton of ths aer s the analytcal evaluaton of the saturated throughut of the new backoff schee, n the assuton of deal channel condtons. Ths aer does not choose the way n aer [5], whch uses a - ersstent varant that does not cature the effect of bnary exonental settng of CW. Ths aer uses Markov chan to analyze the effect of new backoff schee. A new Markov chan s roosed, whch dfferentates t fro The analyss ncludes two arts: )Wth a Markov chan, the behavor of a staton s exaned, whch we use to get the statonary robablty τ that the staton transt a acket; 2)The throughut of both basc and RTS/CTS access ethods s exaned. B. Markov Chan Model We use the sae assuton n aer [6,7] for the analyss. The contendng statons s suosed to a fxed nuber, n. Let b(t) be the stochastc rocess reresentng the back-off wndow sze for a gven staton at slot te t. Note the slot te s referred to as the constant value σ and the varable te nterval between two consecutve backoff te counter decreents[6]. As n aer [6,7], the key aroxaton n /02/$7.00 (C) 2002 IEEE
3 b 2( 2 x)( x) + + W( (2 x) )( x) + ( 2 x)( x ) = 2( 2 x)( x) W x x + x x + W x x x ' + + ' ' + ' ( (2 ) )( ) ( 2 )( ) 2 ( 2 )( ) ' > ' (9) ths odel s that the robablty that a transtted acket colldes s ndeendent on the state s(t) of the staton. Thus, the b-densonal rocess {s(t), b(t)} of our roosed schee s a dscrete-te Markov chan, whch s shown n Fg.. - 0, 0,2 -,0,,2 -,0,,2 0,W 0-2 0,W 0 - -,0 -, -,2 -,W ,W - -,W -2,W -,W -2,W - Fg. Markov chan odel of new back-off wndow schee Ths aer use all the araeters assgned for Drect Sequence Sread Sectru(DSSS) PHY n 802.; for other PHY layers, the analyss rocess s slar. In DSSS, CW n and CW ax equal to 3 and 023. Therefore, we have W = 2 W ' () ' W = 2 W > ' where W=(CW n +), and 2 ' W = ( CWax + ), so for DSSS, we have ' = 5. Here we use to reresent axu backoff stage. As secfed n 802.[], ths value could be larger than, whle the CW wll be hold after that, whch s shown s equaton (). In fact, here also eans the axu retranssson count, whch s dfferent for data frae and RTS frae,.e., 5 and 7. In ths aer, the backoff schee to reset the CW s dfferent fro that n 802. DCF, so the Markov chan n ths aer and that n aer [7] are dfferent. In ths Markov chan, the only non-null one-ste transton robabltes are Pk {, k, + } = k [0, W 2] [0, ] P {, k,0} = ( )/ W k [0, W 0 ] [, ] (2) Pk {,,0} = / W k [0, W ] [, ] Pk {,,0} = W / k [0, W ] P{0, k 0, 0} = ( ) / W0 k [0, W0 ] These transton robabltes account, resectvely, for: )the decreents of the backoff ter; 2)after a successful We adot the sae short notaton used n aer [0]: P{, k 0, k 0 }=P{s(t+) =, b(t+) = k s(t) = 0, b(t) = k 0 } transsson at backoff stage, the backoff ter of the new acket starts wth a backoff stage (-); 3)an unsuccessful transsson akes the backoff stages ncrease; 4)at the the axu backoff stage, the CW wll kee the sae value f transsson s unsuccessful; 5)at backoff stage 0, t wll stay on the sae stage f the transsson s successful. Let b,k be the statonary dstrbuton of the Markov chan. Frst note that b,0 = ( ) b 0 < (3),0 we have b,0 = xb 0 (4) where x= /( ) (5) Snce the chan s regular, so for each k (0, W ), we have ( )( b,0 + b ) = 0 W k (6) bk, = b,0 + ( ) b 0 < < +,0 W b (,0 + b,0) = Wth (4)(5) and transtons n the chan, equaton (6) can be slfed as W k b = b k,,0 W 0 (7) Therefore, by usng the noralzaton condton for statonary dstrbuton, we have W W W k W + (8) = bk, = b,0 = b,0 = 0 k= 0 = 0 k= 0 W = 0 2 Usng equaton ()(4)(5)(8), we have equaton (9), whch s shown at the to of ths age. Now the robablty τ that a staton transts n a randoly chosen slot te can be exressed as, x τ = = + b,0 b = 0 x (0) where b can be obtaned fro equaton (9) and x s fro equaton (5). In the statonary state, a staton transts a acket wth robablty τ, so we have τ Therefore, equatons (5)(9)(0) and () reresent a nonlnear syste n the two unknowns τ and, whch can be solved by nuercal results. Note that we ust have = ( ) n () (0,) and τ (0,) Snce the Markov chan transtons n Fg. are dfferent fro those n aer [7], the results obtaned for b s dfferent fro that n aer [7], so do τ and. In fact, for the sae other araeters, the value of τ and are saller than those n aer [7] because of the new backoff schee used. C. Throughut Analyss Let P tr be the robablty that there s at least one transsson n the consdered slot te. And let P s be the /02/$7.00 (C) 2002 IEEE
4 robablty that a transsson s successful, gven the robablty P tr. So we have P ( ) n tr = τ (2) n n nτ( τ) nτ( τ) (3) Ps = = n Ptr ( τ ) Now we are able to exress the noralzed syste throughut S as the rato, E[Payload Inforaton n a slot te] S = E[Length of a slot te] (4) PP s tre[ P] = ( P ) σ + PPT + ( P) PT tr s tr s s tr c where we use the sae sybols as those n aer [6]. Here, T s and T c are the average te the channel s sensed busy because of a successful transsson or a collson. The E[P] s the average acket length and σ s the duraton of an ety slot te. Let acket header be H = PHY hdr + MAC hdr and let roagaton be δ. Then we ust have the followng exresson. bas Ts = H + E[ P] + SIFS + δ + ACK + DIFS+ δ (5) bas Tc = H + E[ P*] + SIFS + δ + ACK + DIFS + δ where bas eans basc access ethod and E[P*] s the average length of the longest acket ayload nvolved n a collson. In all our cases, all the ackets have the sae fxed sze, therefore, we have E[P]=E[P*]=P. For the RTS/CTS access ethod, assung that all the staton use the RTS/CTS for the data frae for slcty, then we have rts Ts = RTS + SIFS+ δ + CTS+ SIFS+ δ + H (6) + E[ P] + SIFS + δ + ACK + DIFS + δ rts Tc = RTS + SIFS+ δ + CTS+ DIFS+ δ where rts eans RTS/CTS access ethod. Note that here we suose collson only occurs between RTS fraes. IV. MODEL VALIDATION Ths aer uses the well-known sulaton tool NS-2 [8] fro Lawrence Berkeley Natonal Laboratory. To valdate our odel, we also coare the results of the new backoff schee wth those of 802. n aer [7]. Also, ths aer assues each staton has enough data to send to obtan the saturated throughut erforance of the new backoff schee. All the araeters used n analytcal odel and our sulatons follow the secfcatons n standard[] for DSSS, and are the sae as those n [7]. Note that we assue the alcaton data ayload s 000bytes and IP header and UDP header are 20 and 8 bytes, so acket ayload at MAC layer s 028bytes. Note our MAC Markov odel equatons are ndeendent of the PHY araeters, so t does not atter when choosng araeters for dfferent PHY layers. A. Sulaton results for basc access ethod Frst we see the results of basc access ethod, whch s shown n Fg.2. Here we use 802. to reresent the odel n aer [7] for 802. standards and New backoff to reresent the odel n ths aer for new CW settng schee. For a fxed nuber of statons, we run 0 sulatons wth dfferent rando seed. Each sybol + or reresents a sulaton result, for 802. and new CW settng schee resectvely. Note for soe sulaton seres, soe sybols are suerosed because those results are dentcal or very close to each other. Fro the fgure we are able to see that the analytcal odel of ths aer s accurate and catures the trend exactly. The odel n aer [7] also accurate to trace the results of 802. because t follows the standards closely both n the Markov chan transtons and n the throughut analyss. Our analyss closely odels 802. and new backoff schee esecally when the nuber of statons s over dozens, whch follows our assuton that the Markov chan s fored,.e., that the robablty that a transtted acket colldes s ndeendent of the state s(t) of the staton s accurate when the nuber of statons s large. We also see that the analyss for the new CW settng a lttle bt overestates the sulaton results. Ths s because n sulatons, there exsts the transsson of routng ackets, whch are send by broadcast and CW wll be reset at the sae te, therefore, t wll break the CW resettng schee roosed n ths aer when the nuber of statons s very hgh. Also we can see that the CW resettng schee n ths aer could enhance the erforance of 802. DCF sgnfcant, whch s roved by both analyss and sulaton results. Snce the schee s rather sle and effectve, and can be regarded as an oton for 802., t can rove the stablty of syste esecally when the nuber of statons s hgh. Saturaton Throughut Nuber of Statons 802. sulaton 802. calculaton New backoff sulaton New backoff calculaton Fg.2 Analyss versus sulatons: basc access ethod B. Sulaton results for RTS/CTS access ethod The results coarson of RTS/CTS access ethod s slar to that of basc ethod. Note that n Fg.3, the vertcal axs scale s dfferent to that n Fg.2, so the reader ay feel /02/$7.00 (C) 2002 IEEE
5 that the analyss s uch hgher than sulatons results. Another reason for the analyss overestates the sulaton results s that n our sulatons, the routng ackets n broadcast ay cause collson wth other routng ackets or RTS frae, therefore, the sulaton erforance s degraded. Fro ths fgure, we are able to conclude that RTS/CTS access ethod s useful to coensate the erforance degradaton due to collson, whose robablty ncreases wth the nuber of statons. Note that we can get these results because n ths aer the acket ayload length, 028bytes, s large enough to coensate the overheads of RTS/CTS. Saturaton Throughut sulaton 802. calculaton New backoff sulaton New backoff calculaton Nuber of Statons Fg.3 Analyss versus sulatons: RTS/CTS access ethod Saturaton Throughut = New backoff New Backoff =3 =5 =7 =7 = Nuber of Statons Fg.4 Effect of for basc access ethod C. Perforance Analyss Ths aer uses the roosed Markov odel to analyze the throughut erforance wth dfferent araeters. As we know fro equaton (9), the value of, and W wll affect the results we acheve. Snce the value of and W has been assgned value related to PHY n the standards, we wll exane the effect of n ths aer. The effect of s shown s Fg.4 and Fg.5, for basc and RTS/CTS access ethod resectvely. Fro these fgures, we can see the effectveness of our new backoff schee. Also, we fnd that can affect the erforance greatly. Note n the aer [2], there s =5, whch s for DSSS PHY. Fro the analyss we know that hgher brngs hgher stablty and ncreased delay for retransssons. Fro Fg.4 and Fg.5 we conclude that the value of 5 and 7 for basc and RTS/CTS access ethod s a good tradeoff. Saturaton Throughut New backoff New Backoff =3 =3 =5 =7 =5 = Nuber of Statons Fg.5 Effect of for RTS/CTS access ethod V. CONCLUSIONS Ths aer rooses a sle and effectve Contenton Wndow(CW) resettng schee to enhance the erforance of IEEE 802. DCF. A new and sle analytcal odel based on Markov chan s ntroduced to coute the throughut of the roosed schee. Ths odel can be used n coutaton both for the basc access ethod and the RTS/CTS access ethod. Coarsons wth sulaton results as well as the odel resented n aer [7] show that ths odel s accurate n redctng the erforance and rove the effectveness of the new backoff schee. REFERENCES [] IEEE standard for Wreless LAN Medu Access Control (MAC) and Physcal Layer (PHY) secfcatons, ISO/IEC 8802-:999(E), Aug. 999 [2] B.P. Crow, J.G. K, IEEE 802. Wreless Local Area Networks, IEEE Councatons agazne, Set. 997 [3] G. Anastas, L.Lenzn QoS rovded by IEEE 802. wreless LAN to advanced data alcatons: a sulaton analyss , Wreless Networks 6 (2000) [4] G.Banch. L.Fratta, M.Olver. Perforance Evaluaton and Enhanceent of the CSMA/CA MAC Protocol for 802. Wreless LANs. Proc. PIMRC , Oct.996 [5] F.Cal, M.Cont, E.Gregor. Dynac Tunng of the IEEE 802. Protocol to Acheve a Theoretcal Throughut Lt, IEEE/ACM Trans. On Networkng, V8, N6, Dec [6] G.Banch. Perforance Analyss of the IEEE 802. Dstrbuted Coordnaton Functon. IEEE Journal on Selected Area n Co. V8, N3, March 2000 [7] Hatao Wu, Yong Peng, Keng Long, Shduan Cheng, A sle odel of IEEE 802. Wreless LAN, Proceedngs of ICII 200,.54-59, Oct. 200 [8] NS, URL htt://www-ash.cs.berkeley.edu/ns /02/$7.00 (C) 2002 IEEE
Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations
Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ 8854-888 {fuyhung, arsc}@ca.rutgers.edu Abstract In
More informationDelay Analysis of Different Backoff Algorithms in IEEE
Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths
More information2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:
06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,
More informationInterclass Collision Protection for IEEE e Wireless LANs
Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based
More informationVoice capacity of IEEE b WLANs
Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationIntroduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More information136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE
136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng
More informationAn Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks
An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons
More informationPerformance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks
Ths full text aer was eer revewed at the dreton of IEEE Counatons Soety subet atter exerts for ublaton n the IEEE ICC roeedngs Perforane Analyss of the Bnary Exonental Bakoff Algorth for IEEE 8. Based
More informationThe ray density estimation of a CT system by a supervised learning algorithm
Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationA Base Station-Coordinated Contention Resolution for IEEE PMP Networks
A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,
More informationModeling TCP Throughput: A Simple Model and its Empirical Validation
Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Jtendra Padhye, Vctor Frou, Don Towsley, Jm Kuros 0-09-9 Presenter: Ognjen Vukovc Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Motvaton
More informationAn Adaptive Batched Patch Caching Scheme for Multimedia Streaming *
An Adatve Batched Patch achng Schee for Multeda Streang * Shaohua Qn, Wehong He, Zu L, and Janng Hu School of outer Scence, Beng Unversty of Aeronautcs & Astronautcs, Beng 8,hna {shqn,annghu}@buaa.edu.cn
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationAn Analytical Model for IEEE Point-to-Point Link
An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationTHE IEEE standard for wireless local area networks
IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,
More informationA Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks
11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda
More informationUBICC Publishers 2008 Ubiquitous Computing and Communication Journal
UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationEquation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular
More informationAn Energy-Aware QoS Routing Protocol for Wireless Sensor Networks
An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of
More informationSums of exponential functions and their new fundamental properties
Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as
More informationAn Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data
More informationSolutions to Programming Assignment Five Interpolation and Numerical Differentiation
College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent
More informationPerformance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling
Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA
More informationAlgorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns
Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationIEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS
ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e
More informationPattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network
World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn
More informationAnalysis of QoS in WLAN
Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE
More informationAggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks
Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong
More informationUSER CLASS BASED QoS DIFFERENTIATION IN e WLAN
USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee
More informationAchievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells
Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,
More informationExtension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationLight Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2
Lght Weght Dstruted QoS Adapter n Large-Scale Ad hoc Networs Seyed Hossen Hossen Nazhad Ghazan, R.M.Algulev 2 Ph.D. Canddate, Insttute of Inforaton Technology of ANAS, Bau, Azerajan 2 Doctor of Techncal
More informationLoad Balancing Algorithm for Web Server Based on Weighted Minimal Connections
Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton
More informationA Free-Collision MAC Proposal for Networks
12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal
More information126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*
126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera
More informationAN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
More informationPerformance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks
RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser
More informationSemi-Markov Process based Model for Performance Analysis of Wireless LANs
Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita
More informationEfficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks
Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,
More informationWIRELESS communication technology has gained widespread
616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationA study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.
More informationDynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs
More informationPerformance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student
erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student
More informationTime-based Adaptive Retry for Wireless Video Streaming 1
Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,
More informationResearch Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features
Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,
More informationA Fair MAC Algorithm with Dynamic Priority for e WLANs
29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong
More informationKeywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.
Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng
More informationPerformance Analysis of Beacon-Less IEEE Multi-Hop Networks
Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.
More informationRouting Time-Constrained Traffic in Wireless Sensor Networks
Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationUser Behavior Recognition based on Clustering for the Smart Home
3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND
More informationA New Scheduling Algorithm for Servers
A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationPerformance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect
Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model
More informationHandover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks
Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks
More informationBayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model?
Bayesan Networks: Indeendences and Inference Scott Daves and Andrew Moore Note to other teachers and users of these sldes. Andrew and Scott would be delghted f you found ths source materal useful n gvng
More informationMerging Results by Using Predicted Retrieval Effectiveness
Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;
More information1 Calculation and Analysis of Buffer
Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton
More informationA Game Theory based Contention Window Adjustment for IEEE under Heavy Load
93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationGenerating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms
Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal
More informationAn Approach for Congestion Control in Sensor Network Using Priority Based Application*
An Aroach for Congeston Control n Sensor Network Usng Prorty Based Alcaton* Md. Obadur Rahman Muhammad Mostafa Monowar Byung Goo Cho Choong Seon Hong Deartment of Comuter Engneerng, Kyung Hee Unversty
More informationA FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS
A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS Abbas Al-Refae, Areen Obadat 1, Ra H. Fouad 1, and Bassel Hanayneh 1 Deartent
More informationA General Model of Wireless Interference
A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu
More informationE-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN
21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationBroadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)
Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese
More informationA Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet
IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun
More informationA Unified Approach to Survivability of Connection-Oriented Networks
A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,
More informationRe-routing Instability in IEEE Multi-hop Ad-hoc Networks *
Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationSTATISTICAL PERFORMANCE ANALYSIS OF THE PREDICTIVE FAST AND SEAMLESS HANDOFF SCHEME FOR THE NESTED MOBILE NETWORK
Pak. J. Statst. 011 Vol. 7(5), 591-61 STATISTICAL PERFORMANCE ANALYSIS OF THE PREDICTIVE FAST AND SEAMLESS HANDOFF SCHEME FOR THE NESTED MOBILE NETWORK Ing-Chau Chang and Cou-Song Lu Departent of Coputer
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationScheduling Workflow Applications on the Heterogeneous Cloud Resources
Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationEnergy-aware Delay-Constrained Routing in Wireless Sensor Networks
Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,
More informationTraffic Classification Method Based On Data Stream Fingerprint
5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence
More informationIdle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs
Idle Sense: An Optmal Access Method for Hgh Throughput and Farness n Rate Dverse Wreless LAs Martn Heusse, Franck Rousseau, Romarc Guller, Andrzej Duda LSR-IMAG Laboratory Grenoble, France {Martn.Heusse,
More informationControl strategies for network efficiency and resilience with route choice
Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More informationwith `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract
HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the
More informationAdaptive Network Resource Management in IEEE Wireless Random Access MAC
Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More information