TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks

Size: px
Start display at page:

Download "TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks"

Transcription

1 213 International onference on omputing, Networking and ommunication (IN) Workhop on omputing, Networking and ommunication -R: An Equation-baed Tranport Protocol for ognitive Radio Network Abdulla K. Al-Ali and Kauhik howdhury Department of Electrical and omputer Engineering Northeatern Univerity oton, MA {al-ali.a, Abtract Data delivery in a dynamically changing pectrum environment continue to remain an unolved problem, with exiting TP baed implementation falling hort owing to their inability to react wiftly to pectrum change. Thi paper propoe the firt equation-baed tranport protocol, baed on the TP Friendly Rate ontrol () protocol, which ue the recent F mandated pectrum databae information intead of relying on any intermediate node feedback. Not only doe thi approach maintain the trict end to end property required at thi layer of the protocol tack, but alo allow fine adjutment of the tranmiion rate through continuou adaptation. We explore intereting direction on how to limit repeated querie to the pectrum databae and yet allow the ource to control the rate effectively; when to re-tart the tranmiion; and how to interpret poible pectrum change in the intermediate node correctly without mitaking it for normal network congetion, among other. Our extenion to the n-2 imulator enable thorough teting of variou apect of our protocol adapted for cognitive radio, called a -R. We how through imulation an improvement of over 33% in the end to end throughput when compared with the claical. I. INTRODUTION ognitive radio (R) network enable opportunitic ue of available licened pectrum, and reduce the preure on the unlicened ISM band in the 2.4GHzand 5GHzrange. While the core function of pectrum ening, witching, and haring are now being better undertood given the rapid tride in thi area, work on higher layer of the protocol tack, uch a the tranport layer, i till in a nacent tage. There ha been extenive invetigation of window-baed TP protocol for auring congetion-free behavior in claical wirele network, given it widepread ue in the wired domain. y minor modification of the information contained in the feedback acknowledgment (AK) ent by the detination, uch a by falely advertiing a receive window of in Freeze TP [6] when an impending handoff i detected, the TP ource can be prevented from tranmitting. The ingle end-to-end connection can be plit into the wired (ender to bae tation or S, when uch an infratructure upport exit) and wirele (S to the wirele node) plane, a hown in WTP [7]. In Addition, ome protocol explore tuning the ender tranmiion rate through explicit notification (TP EFLN) [8] and via elective retranmiion of lot packet (TP SAK) [9]. While each of thee approache have merit, they were not originally deigned with the aim of licened or primary uer (PU) protection, udden large-cale bandwidth fluctuation, and periodic interruption caued by pectrum ening and channel witching. A recent approach called TP-RAHN addreed thee concern [1], though it relied on extenive feedback from the underlying layer of the protocol tack a well a the intermediate node that form the connected chain. Thi i undeirable a it violate the end-toend paradigm typically aumed for tranport layer protocol. Thi paper i aimed to open up freh dicuion on the deign of R-pecific protocol uing an equation-baed approach, wherein the concept of the congetion window in claical TP (and the elf-clocking via returning AK) i no longer followed. A notable example in thi area for wirele ad hoc network i ATP [4], which argue that the hort term unfairne of the SMA/A MA reult in an undeirable burty data flow. Thi problem i exacerbated in R network becaue node paue the tranmiion when they are engaged in ening or channel witching. Thi, in turn, reult in varying round-trip time etimate (in the cae of TP) and higher induced load rendering the elf-clocking nature ineffective. The frequency and reliance on the AK for window baed tranmiion alo lead to revere path performance impact on the forward DATA path. In TP, thi can amount to 1%-2% of the data tream rate [4]. The burty nature of TP i clearly demonetrated in Figure 1. In thi paper, we devie the firt equation baed tranport protocol uing exiting approach called a TP Friendly Rate ontrol () [2]. We name our modified deign a - R, whoe main feature are a follow: It allow the TP ource to integrate with a deignated pectrum databae, a mandated by the F in a recent ruling [5]. There i no feedback from any of the intermediate node, and neither i any information from an underlying layer i utilized. It enhance the peed of repone by ditinguihing between the effect of pectrum change and true congetion, by leveraging both the information from the pectrum databae and the periodic information ent by the detination through the uual AK. Hence, the tranmiion rate i almot never penalized unle the need i jutified and likewie, the coare jump in the rate can be much fater than that poible in traditional tranport protocol /13/$ IEEE 143

2 TALE I: Symbol ued by -R framework Symbol RT T avg RT T tddev I n I PU t t n t PU Decription Packet ize Average round-trip-time Round trip time tandard deviation Average AK inter-arrival during no PU activity Average AK inter-arrival during PU activity Time now Time lat AK received during no PU activity Time lat AK received during lat PU activity It intelligently poll the pectrum databae only when needed, by identifying a poible PU arrival event, i.e., it doe not conume the backend ytem reource ued for interacting with the databae. The databae may likely be a ingle point of failure and hence, it need to be protected from being overwhelmed in a practical ituation. The current regulation require databae polling at leat in 6 econd-interval, and our aim i to exceed that default value only when a critical need i detected. The ret of thi paper i organized a follow: The preliminary background of and the motivation for adapting it for R i decribed in Section II. In Section III, we decribe the propoed protocol -R in detail. Section IV give reult from our comprehenive imulation tudy, and finally, we conclude our paper in Section V with pointer to future reearch. Throughput (kbp) v TP throughput 18 TP Throughput 16 Throughput time (econd) Fig. 1: Throughput comparion between TP and in a 3-hop chain ad-hoc network II. AKGROUND AND MOTIVATION i a rate baed mechanim for congetion control in unicat traffic. We ue thi a the platform to build our protocol becaue it aim at providing a table throughput, a oppoed to the udden fluctuation caued by Additive Increae Multiplicative Decreae (AIMD) in TP, while maintaining a TP friendly rate. Given that i alo an end-toend protocol, deployment i only neceary at the ource and detination. To achieve reduced fluctuation, it calculate a parameter called the lo event rate (p) at the receiver by taking the reciprocal of the average weight in the lat (n) lo event ample where a ample i defined a the number of conecutive data packet received within a RTT before a packet lo happen., by default, average the lat 8 ample (n =8) which give an approximate naphot of how the traffic flow looked in the lat n RTT. p i then ent to the ender to be ued in the throughput equation that etimate TP average ending rate: X bp = 2 b p 3 b p R 3 +(t RT O (3 8 p ( p 2 )), (1) where X bp i TP average tranmit rate in byte per econd, i the packet ize in byte, R i the round-trip time in econd, p i the lo event rate between and 1., t RT O i TP retranmiion timeout value in econd, and b i the maximum number of packet acknowledged by a ingle TP AK. The goal of thi i to achieve a moother rate by avoiding udden abrupt rate fluctuation a i the cae in TP. uffer when deployed in ognitive Radio owing to the following reaon: (i) Low rate after PU exit: i not able to ue the maximum allocated bandwidth after a PU exit, due to weighing the lat lo rate which are recorded falely during PU activity, ii) Slow recovery: Afterthe PU exit, having mitaken the original interruption purely a a congetion event, tart polling the bandwidth connection over large interval of time, which can lead to ignificant delay in reuming the tranmiion, and iii) uffer overload and interference: initially end multiple packet during the PU activity a part of it regular rate control, cauing additional interference with the PU. Thee individual iue are decribed in further detail in the ret of thi ection. Low rate after PU exit: After a prolonged idle tate due to PU activity, the lat n lo event rate hould be neglected becaue they occurred in that tagnant tate. Thi caue to reume the throughput at a fale lo event rate p leading to le than optimal throughput. will recover after at leat n event lo rate have been recorded. Thi can take up to n Round-Trip-Time (RTT). Slow recovery: During PU Activity, nofeedback timer expire everal time which lead to reduction in the effective rate by half each time until the minimum rate of t mbi where i the packet ize and t mbi i et to 64 econd i reached. Thi mean that will poll the network once every 64 econd which can caue a delay of up to 64 econd for the network to reume activity after a PU exit. uffer overload and interference: During the PU activity, will initially continue the ongoing rate becaue it i unaware of the PU activity. Thi will lead to undeired packet being ent over the network leading to a bigger buffer queue at the MA layer of the node immediately before the affected area. Thee packet will retranmit until they timeout which caue additional undeired interference with the PU. 144

3 Normal AK Timeout Slow tart AK received Received a packet ondition not met PU Detected PU Exit ondition met No AK Received In average AK inter arrival PU Exit Reume Slow Start AK Received PU Exit & No AK Paued No AK Fig. 2: -R finite tate machine. PU detected tate Thi i an intermediate tate implemented a an additional meaure to verify that the lat AK timeout in the Normal tate wa in fact due to PU activity. On entering thi tate, the ource wait for a period I n for any incoming AK and continuouly poll the pectrum databae. If no ubequent AK are received, and the databae reveal that the PU i till preent, then the protocol tranition into the Paued tate. On the other hand, if an AK doe arrive in that time period, then the protocol return to the Normal tate a thi implie that the intermediate node are not affected by the PU activity. In uch a cae, the AK timer expiry wa due to random channel or congetion error. III. -R: AN EQUATION ASED TRANSPORT PROTOOL In thi ection, we decribe our propoed -R protocol and the modification done to claical. Our change in the protocol operation are aimed at (i) enuring that the connection reume the data tream immediately after the PU leave the affected traffic zone, (ii) triking a balance between polling the network too frequently by the ource that may caue interference with the PU, and converely, reacting too lowly to pectrum change, and (iii) finding the available bandwidth a oon a poible, after the PU vacate the pectrum. We preent an overview of our approach uing a finite tate machine diagram, a hown in Figure 2. The remainder of thi paper refer to the ymbol lited in Table I. A. Normal tate Thi i the default tate of -R, and the protocol return to thi tate whenever there i no expected pectrum outage. The repone during true congetion event and the reulting change i the tranmiion rate i identical to that of the claical. The protocol operation diverge, however, when a timeout event occur and no AK i received. To differentiate congetion from poible PU activity, the - R at the ource querie the F mandated pectrum databae to check if a PU uddenly appeared on any of the feaible channel. Note that the ource ha no knowledge of the location or the pecific channel ued by the node in the end to end connection. However, a udden arrival event of the PU (a indicated by the databae) and the timeout can be treated a correlated event, with a high probability. If thi condition i true, the protocol enter into the PU detected tate, and if not, the ituation i interpreted a a normal cae of network congetion. Additionally, the protocol continue to maintain an average AK inter-arrival time (denoted a I n ), and the tandard deviation of the round-trip time (denoted a RT T tddev ). Thee value are ued in the ubequent tate to influence the rate control mechanim.. Paued tate In thi tate, the PU i determined to be preent, and i aumed to be reponible for dirupting the continuou data tream a it ha occupied the pectrum. The challenge now i to identify when the tranmiion rate can revert back to a higher value, and thi i obtained by polling the connection bandwidth with an occaional packet. When a portion of the pectrum i occupied by a PU, the link layer algorithm on the node pair on the affected link may either paue the tranmiion altogether, or immediately try and identify an alternate pectrum for that link. Note that the ource ha no idea of which of thee option are actually elected, a no intermediate node feedback i allowed. Thu, by increaing the tranmiion rate too early, the ource rik added interference to the PU before it vacate the pectrum. Alo, by delaying the rate increae after a pectrum change, the ource i unable to efficiently ue the available bandwidth of the connection. y imply monitoring the pectrum databae (which can continue to how the PU a preent), the ource remain unaware of a local pectrum change. We have undertaken a ubtantial et of imulation and empirically identify the optimal polling rate a X bp = 6 RT T avg (Section II), i.e., the ource will poll the connection every 6 average RTT time whether or not the node have witched the channel. In comparion, reduce the rate after each AK timer expiry in half, until it reache a rate of 64, which end out a packet every 64 econd. Thi lead to low reaction to both the udden reduction in bandwidth when the PU tart affecting the traffic chain, and to the higher available bandwidth once the PU i out of the vicinity. If an AK i received in the Paued tate, the network retore the rate to the lat rate recorded in the Normal tate and enter the Reumed tate. -R perceive thi packet a an indication that the intermediate node have moved to a vacant pectrum and allow the rate to adapt accordingly. If no feedback packet are received during thi period, indicating that the node have not witched the pectrum, -R will enter the Slow tart tate immediately after the PU leave the pectrum. The PU exit time i known by the aforementioned pectrum databae. 145

4 D. Reumed tate -R enter thi tate when an AK i received while being in the Paued tate. The protocol interpret thi AK arrival a an indication that the intermediate node have witched to a vacant channel and allow for the rate to adapt accordingly by retoring it to the lat known rate in the Normal tate. The protocol tay in thi tate until the PU exit, at which time it enter the PU Exit tate. Notice that -R i not returning to the Normal tate yet becaue the AK that wa received in the Paued tate could be due to an intermediate node falely mi-detecting the PU preence. If the the node never mi-detect the PU preence, then the protocol will never enter thi tate becaue it will remain in the Paued tate. The protocol enter the PU Exit tate when the current active PU exit the vicinity. Thi time i cheduled baed on the query reult from the integrated F databae which i known at the ender. The average AK inter-arrival time I PU i calculated during thi time period for ue in the next tate. E. PU Exit tate In the PU Exit tate, the goal i to determine whether a low-tart i required or not. -R low-tart if the rate at the time of the PU exit i relatively low in comparion to the rate recorded during the lat Normal tate. In other word, the AK received during the Paued tate wa a reult of a ening error and a low-tart to probe for new bandwidth i required. Otherwie, the protocol quietly return to the Normal tate becaue the intermediate node have found a vacant pectrum and reumed tranmiion. The deciion whether to low-tart i made baed on the reult obtained in Algorithm 1. Algorithm 1 : i low tart required let I n be the average inter-arrival of AK at the ender in the Normal tate. let I PU be the the average inter-arrival of AKS at the ender during the Paued tate. let t be the time now. let t PU time lat AK received during Paued tate. 1: if I PU > (2 I n ) OR t t PU > (3 I n ) then 2: return true 3: ele 4: return fale 5: end if In ummary, Algorithm 1 check if one of the following i true, baed on empirical obervation: ae I: If the average inter-arrival of AK during the Paued tate i larger than twice the average inter-arrival of AK during Normal tate. ae II: If the time elaped ince the lat AK received during an ongoing PU activity i larger than 3 time the average inter-arrival of AK during Normal tate. F. Slow tart tate -R enter Slow-tart if the rate during Reumed tate wa low according to Algorithm 1 or if the previou tate wa the Paued tate, i.e., no AK were received in Paued tate. Slow-tart i ued to quickly probe the new vacant pectrum for the maximum available bandwidth. -R low-tart by reetting the weight and variable of. Thi i done by having the ource flag the next packet a a low-tart requet packet (SSREQ). When the detination receive thi packet, it reet it own lo rate p calculation (ee Section II) and end back a low-tart acknowledgement packet (SSAK) immediately. During low tart, the nofeedback timer i et to RT T avg +4 RT T tddev. We ue thi a a more accurate reult than default tatic 2 packetize 3. Once the SSAK packet i received at the ource, -R return back to the Normal tate, thu completing the cycle. IV. PERFORMANE EVALUATION We imulate -R over a multihop chain in n2 a depicted in Figure 5. In our imulation, we ue the ognitive Radio Ad-Hoc Network (RAHN) framework built by [3] and place four node in a traight line. In thi framework, the node do not end TS to RTS requet if they ene any PU activity. Thi lead to packet being queued at the node immediately before the PU region and eventually dropped due to retrie or timeout. We et our ening period to.1 econd and tranmiion period to 3. econd [1]. The bandwidth of the channel at each hop i et to 2 Mbp. The node in thi imulation do not witch to another pectrum when PU i detected; they wait until the PU exit the pectrum to tart tranmitting again. All enor node pick from 1 available pectrum band at random at the beginning of the imulation. Each node will have two different interface: one for receiving packet and one for ending. We vary the type of PU activity from an exponentially ditributed on and off time with mean (2 ec) and (1 ec) repectively, which we name hort burt. Similarly, a PU on time of 1 ec i deigned to imulate long PU activity event PU Region Fig. 5: 3-Hop chain and PU region The imulation compare with -R regarding the following metric: (i) throughput over time, (ii) interference percentage with the PU, (iii) total data received by the receiver over the ame period of time, (iv) the goodput of the data tream, and (v) the queue length of the affected node. A. Throughput over time Figure 3 and 4 compare with -R in term of throughput at the receiver for long and hort activity duration of the PU, repectively. The imulation wa run for for

5 kbp A v R Throughput R time (econd) Fig. 3: Throughput (kbp) v Time for 3-hop (long PU activity) kbp A v R Throughput R time (econd) Fig. 4: Throughput (kbp) v Time for 3-hop (hort burt) Interference % (Tx during PU/Total PU activity) Interference with the PU Long PU activity -R Short PU burt M Total tranferred data Long PU activity -R Short PU burt Goodput % Goodput comparion Long PU activity -R Short PU burt (a) (b) (c) Fig. 6: The interference, total data tranmitted and goodput comparion are provided in (a), (b) and (c), repectively. econd, and the region of interet are denoted with letter A, and. The area in gray repreent the PU active region. 1) Region A: In thi region, -R i in the Normal tate. We can oberve that the protocol throughput matche that of. Intereting to note that in Figure 4, although the PU wa affecting the traffic tream, -R could not detect it becaue it did not encounter a nofeedback timer expiry during thee hort PU activity period. 2) Region : Area indicated by indicate that -R goe into low-tart immediately after the PU exit the vicinity. We notice here that i unaware of PU activity, and due to the reduction in rate during the PU activity period, the data flow reume later. The longer the PU activity, the lower the rate, and hence, the later the protocol reume. Thi i clearly indicated by Figure 3. 3) Region : In thi area, the PU i active but we notice the pike in throughput during thi period. The pike occur more frequently at the beginning of the PU activity region due to the long time it take to reduce the rate (i.e. with every AK timer expiry, it reduce the rate by half). Thi low reaction to the link diconnection caued by the PU caue undeirable interference. In thee area, -R reduce the rate to 6 RT T avg until an AK i received. Thi lead to le interference a will be hown in the next ection. 147

6 . Interference with the PU The immediate reduction in rate when -R encounter the firt AK timer expiry lead to le interference with the PU. For example, with I n of 1.2 ec, a rate of 3 bp in the Normal tate, and a nofeedback timer et at 2 econd, -R will reduce the rate to bp in 2 ec. In comparion, the ame rate will be reached by after 5.8 econd leading to an exce of retranmiion attempt during that time period. We calculate the interference to be the total time it take to tranmit RTS, TS, AK and DATA packet divided by the total PU on period. 6a how the lower interference of -R in both the hort burt and the long PU activity imulation run.. Total data received Due to the fact that fail to reume the data tream immediately after a PU exit or to ue low-tart to probe for the new network bandwidth, -R i able to tranmit more data in the 3 econd of the imulation with both type of PU activity. Thi can be een in Figure 6b. In the hort burt cenario, the amount of increae i 33%. D. Goodput total data packet received We calculate the goodput a total data packet ent.we can infer from Figure 6c that and -R have very imilar goodput, however, -R ha lightly higher percentage due to it being able to low down fater during the Paued tate (read: when PU i active), and by doing that, it avoid the exce wated packet that occur in. E. Queue length When the affected node detect PU activity, they halt any tranmiion that i cheduled at the MA layer. Thi caue the queue to build up on the node immediately before the PU active region or node 3 in our topology. Figure 7a how the queue length at that node. We note that there in no exceive build up on the queue and the increae in queue length are proportional to the ending rate at that time a hown in Figure 7b. When the PU enter the vicinity at time 6ec, -R queue length are at mot 1 packet higher than even though the throughput i double that of. V. ONLUSION We preented an equation-driven TP protocol that i geared to meet the demand of R network, which alo accommodate ome of the latet development in thi pace, uch a pectrum databae acce. Our olution -R i demontrated to perform ignificantly better than it claical counter, with repect to both PU protection and tranmiion efficiency in a dynamically changing pectrum environment. Different from the few exiting work at the tranport layer for R, our protocol doe not aume any cro-layer feedback or other input from intermediate node. Our future work i aimed at changing the baic rate control equation baed on different pectrum-related event. Queue length Throughput (kbp) v -R Queue Length 9 Queue length 8 -R Queue length time (econd) (a) v -R throughput time (econd) (b) Throughput -R Throughput Fig. 7: (a) Queue length of and -R at node 3 and (b) the correponding throughput of the network VI. AKNOWLEDGMENT The leading author would like to thank Qatar Univerity for the PhD cholarhip upport. REFERENES [1] K. R. howdhury, M. Di Felice and I. F. Akyildiz. TP-RAHN: a tranport protocol for cognitive radio ad-hoc network. In INFOOM 29, IEEE, page , April 29. [2] S. Floyd, M. Handley, J. Padhye, and J. Widmer, Equation-baed congetion control for unicat application, In Proc. of AM SIGOMM, Aug. 2. [3] Marco Di Felice, Kauhik Roy howdhury, and Luciano ononi, Modeling and performance evaluation of tranmiion control protocol over cognitive radio ad hoc network, in Proc. of AM MSWiM, 29. [4] Karthikeyan Sundarean, Vaidyanathan Anantharaman, Hung-Yun Hieh, and Raghupathy Sivakumar, ATP: A reliable tranport protocol for ad hoc network, in IEEE Tran. Mob. omput., 4(6):58863, 25. [5] F, Second Memorandum Opinion and Order, ET Docket No , September 21. [6] T. Goff et al., Freeze-TP: A True End-to-End TP Enhancement, in Proc. IEEE INFOOM, 2. [7] P. Sinha, T. Nandagopal, N. Venkitaraman, R. Sivakumar, and V. harghavan. WTP: A reliable tranport protocol for wirele wide-area network, in Wirele Network, 8(2-3):31-316, 22 [8] G. Holland and N. H. Vaidya, Analyi of TP Performance over Mobile Ad Hoc Network. in Proc. of AM MOIOM, pp , Seattle, WA, Aug [9] M. Mathi, J. Mahdavi, S. Floyd and A. Romanow, TP elective acknowledgment option, RF 218 (October 1996). [1] W. Y. Lee and I. F. Akyildiz, Optimal Spectrum Sening Framework for ognitive Radio Network, IEEE Tran. on Wirele omm., vol. 7, no. 1, Oct

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Research Article Real-Time Communications in Large-Scale Wireless Networks

Research Article Real-Time Communications in Large-Scale Wireless Networks Hindawi Publihing Corporation International Journal of Digital Multimedia Broadcating Volume 2008, Article ID 586067, 16 page doi:10.1155/2008/586067 eearch Article eal-time Communication in Large-Scale

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

Problem Set 2 (Due: Friday, October 19, 2018)

Problem Set 2 (Due: Friday, October 19, 2018) Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control

Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control Performance Evaluation and Comparion of,, and Vega TCP Congetion Control Luigi A. Grieco and Saverio Macolo Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari, Italy {a.grieco,macolo}@poliba.it

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks Reource Allocation in Multi-Radio Multi-Channel Multi-Hop Wirele Network Technical Report (July 2007) Simone Merlin, Nitin Vaidya, Michele Zorzi Padova Univerity, DEI, Padova, Italy; Univerity of Illinoi

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Research Article Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks

Research Article Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks Hindawi Publihing Corporation EUASIP Journal on Wirele Communication and Networking Volume 2010, Article ID 878412, 22 page doi:101155/2010/878412 eearch Article Energy-Efficient eervation-baed Medium

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

TAM 212 Worksheet 3. Solutions

TAM 212 Worksheet 3. Solutions Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.

More information

Improving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control

Improving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control 1 Improving P Performance in High Bandwidth High R Link Uing Layered ongetion ontrol Sumitha Bhandarkar, Saurabh Jain and A. L. Naraimha Reddy Dept. of Electrical Engineering, exa A & M Univerity umitha,aurabhj,reddy

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Finite Elements Method in Split Hopkinson Pressure Bar developing process

Finite Elements Method in Split Hopkinson Pressure Bar developing process 6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 1-3, 007 63 Finite Element Method in Split Hopkinon Preure Bar developing proce ROTARIU ADRIAN

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Source Code (C) Phantom Support Sytem Generic Front-End Compiler BB CFG Code Generation ANSI C Single-threaded Application Phantom Call Identifier AEB

Source Code (C) Phantom Support Sytem Generic Front-End Compiler BB CFG Code Generation ANSI C Single-threaded Application Phantom Call Identifier AEB Code Partitioning for Synthei of Embedded Application with Phantom André C. Nácul, Tony Givargi Department of Computer Science Univerity of California, Irvine {nacul, givargi@ic.uci.edu ABSTRACT In a large

More information

SQUAD: A Spectrum-based Quality Adaptation for Dynamic Adaptive Streaming over HTTP

SQUAD: A Spectrum-based Quality Adaptation for Dynamic Adaptive Streaming over HTTP SQUAD: A Spectrum-baed Quality Adaptation for Dynamic Adaptive Streaming over HTTP Cong Wang and Amr Rizk Univerity of Maachuett Amhert {cwang1,arizk}@uma.edu Michael Zink Univerity of Maachuett Amhert

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information