Stanford University, CA Abstract. Increasing demand for wireless mobile communications, coupled with limited network resources,

Size: px
Start display at page:

Download "Stanford University, CA Abstract. Increasing demand for wireless mobile communications, coupled with limited network resources,"

Transcription

1 Eæcient PCS Call Setu Protocols æ Yingwei Cui 1, Derek Lam 2, Jennifer Widom 3, Donald C. Cox 4 Comuter Science & Electrical Engineering Dets. Stanford University, CA Abstract Increasing demand for wireless mobile communications, couled with limited network resources, has motivated investigation into alternative eæcient mobility management solutions. In this aer, we consider wireless PCS call setu rotocols. We roose a Lightweight Location Looku Protocol, which signiæcantly reduces the network signaling and setu delay during call setu. As an alternative, we extend the Reverse Virtual Call Setu technique of ë6ë and roose a Reverse Connection Setu rotocol that also erforms eæcient call setu, while minimizing the cost of failed call attemts. The two new rotocols have diæerent advantages, in articular when combined with location management techniques including HLRèVLR, HLRèVLR with artial relication, and HLRèVLR with caching. We study combinations of call setu rotocols with location management techniques and comare their erformance. Both analytical and simulation results are resented. ëkey Wordsë Location Management Technique, Call Setu Protocol. ëtechnique Areasë Personal Communications Services, Wireless Network Protocols, Mobile Communications Managements. 1 Corresonding author. Gates 444, Stanford, CA Tel: 415è cyw@cs.stanford.edu. 2 Tel: 415è Fax: 415è dlam@wireless.stanford.edu. 3 Tel: 415è Fax: 415è widom@cs.stanford.edu. 4 Tel: 415è Fax: 415è dcox@wireless.stanford.edu. æ Research artially suorted by the National Science Foundation under grantèncr and bypaciæc Bell Cororation. 1

2 1 Introduction Mobility management is a challenging roblem in wireless Personal Communication Services èpcsè ë2ë. In a PCS system, mobile users are located in system-deæned areas called cells that are groued into registration zones. Every user connects with the base station in his cell through the wireless medium. Base stations are connected by a æxed wired network and exchange data to erform call setus and deliver calls between diæerent cells. Mobility management allows the PCS system to track users' current locations for delivering incoming calls. Solutions to the mobility management roblem have two dimensions. One is the Location Management Technique èlmtè emloyed, which governs where user location information is stored, and how it is retrieved and udated. The other dimension is the Call Setu Protocol ècspè, which deænes the stes taken during call setus, such as retrieving the user location information, notifying the user of incoming calls, and setting u the circuit connection through the wired and wireless network aths. In ærst-generation wireless systems, such as the North American Advanced Mobile Phone Service èampsè ë12ë, the system ages every cell within the network to locate a user for call setu. Because of the radio bandwidth ineæciency of this method, second-generation systems, such as the Global System for Mobile ègsmè communication and the North American Digital Cellular, emloy a diæerent aroach as deæned in the GSM ë15ë and IS-41 ë22ë standards. In the IS-41 standard, each user is assigned a ermanent home zone. At any given time, the user location information is stored in a databases in the user's home zone èthe Home Location Register or HLRè, and also in a database in his current zone èthe Visitor Location Register or VLRè. We call LMTs relying on this database structure HLRèVLR. According to the call setu rotocol stated in the IS-41 standard, during a call setu, the system ærst erforms database lookus to ænd the user location information, called location looku. It then sets u the circuit connection from caller to callee, and ages the callee in his cell. While the IS-41 aroach eliminates system-wide aging, which vastly reduces the radio link signaling, it introduces remote database lookus that may incur a large amount of wired network traæc and long call setu delay ë13ë. Much eæort has been dedicated to develoing LMTs to imrove location looku erformance, as discussed in Section 1.1 below. In this aer, we consider the entire PCS call setu rocess, and we roose alternative CSPs to imrove the overall call setu erformance. We believe that as PCS systems scale to very large numbers of users, network bandwidth will become a signiæcant bottleneck. Thus, our goal is to minimize the extra network signaling and call setu delay introduced by the IS-41 style location lookus. At the same time, we can reduce the cost of failed call attemts èsuch as when the callee is not reachableè. Our contributions are: 1. A comlete seciæcation of the call setu rocess using æow charts. We consider a variety of CSPs including the currently existing and newly roosed ones, combined with diæerent HLRèVLR-based LMTs. 2

3 2. A new call setu rotocol, called Lightweight Location Looku Protocol èlillpè, that signiæcantly reduces the network signaling and setu delay associated with the PCS call setu rocess. The advantage of LiLLP is articularly clear when integrated with an HLRèVLR technique that uses artial relication ë19ë. 3. The Reverse Connection Setu èrecsè rotocol, an extended version of the Reverse Virtual Call Setu èrvcè technique of ë6ë. ReCS erforms eæcient call setus and minimizes the cost of failed call attemts, without requiring the global aging techniques that are necessary for RVC. 4. Performance analysis and simulation work that exlores the interactions between diæerent CSPs and LMTs, and extracts the best CSP-LMT air under what we believe to be realistic system conditions. 1.1 Related Work Much eæort has been focused on exloring eæcient location management techniques èlmtsè. Extensions to standard HLRèVLR techniques, such as HLRèVLR with artial relication ë1, 14, 19ë, and HLRèVLR with caching ë7ë, have been develoed to imrove wireless call setu erformance. The local anchoring scheme ë4ë has been roosed to limit database udate cost in HLRèVLR. The hierarchical database architecture ë21ë has been considered to achieve location indeendent or lifelong numbering. Extensions to the hierarchical scheme, such as HiPER ë8ë and HOPPER ë10ë, also have been studied to imrove location management system erformance èin work erformed by our grou at Stanfordè. The idea of Reverse Virtual Call Setu was ærst roosed in ë6ë. The rotocol reduces PCS call setu delay and network cost for failed call attemts using an overlaid global aging network and a reverse connection setu strategy. In this aer, we devise new CSPs and combine existing HLRèVLR-based LMTs with them. Our goal is to exlore the CSP-LMT combinations that achieve the best call setu erformance, while eliminating the requirement of a global aging network. 1.2 Paer Outline In Section 2, we describe the PCS environment and establish terminology. In Section 3, three CSPs are seciæed: the IS-41 standard, our Lightweight Location Looku ProtocolèLiLLPè, and our Reverse Connection Setu èrecsè rotocol. We use event æow charts to secify these rotocols combined with three LMTs: HLRèVLR, HLRèVLR with artial relication ë19ë, and HLRèVLR with caching ë7ë. Section 4 gives an analytical comarison of average call setu erformance for the nine CSP-LMT combinations. Simulation results are shown in Section 5. We conclude in Section 6. 3

4 2 PCS Environment and Terminology In a wireless PCS system, mobile users are located in wireless cells groued into registration zones, and they communicate with nearby base stations through the wireless medium. Base stations are connected to a wired network via Mobile Switching Centers èmscsè to exchange data among diæerent cells. When a call is made, the callee's location information indicating the user's current zone is retrieved. The callee's routing information also is needed, in order for the system to set u the circuit connection. Routing information includes the MSC ort the callee is connected to èthe MSC addressè and his temorary user ID for contacting the MSC èthe Tem addressè. Finally, status information, such as if the callee is busy or if the callee's handset is oæ, also may be used. Location Management Techniques èlmtsè maintain user information in databases in order to erform eæcient call setu. The current LMT standards are HLRèVLR schemes, as introduces in Section 1. In these schemes, each user's routing information is stored in VLR database at his current zone. In addition, an identiæer for the user's VLR èthe VLR addressè, which also indicates the user's current location, is stored in the HLR database at the user's home zone. Each user's HLR address is encoded in his hone number. Therefore, the system can always locate a user's HLR from the hone number, then locate his VLR, and ænally retrieve the routing information. Entries in the HLR and VLR can be combined for users currently located in their home zone. HLRèVLR with artial relication ë1, 19ë èhereafter called the Relication LMTè is one extension of the HLRèVLR standards. It relicates some users' VLR addresses in additional registration zones, so that callers from those zones can obtain the user's VLR address with one local looku, thereby reducing the overall database lookus and network messages. The relicas are ket uto-date by the system. HLRèVLR with caching ë7ë èhereafter called the Caching LMTè is another extension of HLRèVLR schemes. If it is discovered that a zone has many calls directed to a given user, the user's VLR address is cached in the local database. This also increases local looku ratio and saves network messages before the cached entry becomes out-of-date. Figure 1 shows the infrastructure of a PCS system that emloys HLRèVLR-based techniques. The tables in Figure 1 indicate the user information databases, which combine the HLR, VLR, and cache or relication deository of a zone into one database. In the ægure, we can see that user Y is visiting zone 3, and therefore his routing and status information is stored in the database there èthe ærst row in HLRVLR-3è. Zone 2 is Y 's home zone, and stores Y 's VLR address in its local database èthe ærst row in HLRVLR-2è. In addition, a coy of Y 's VLR address is stored in zone 1's cache èthe second row in HLRVLR-1è. User X is currently located in his home zone, zone 1. His HLR entry and VLR entry are combined, and stored in zone 1 èthe ærst row in HLRVLR-1è. Call Setu Protocols ècspsè coordinate information exchange during the call setu rocess. The call setu rocess has two stages: the location looku stage, in which the system ænds the callee's current location èossibly with routing and statusè information, and the connection setu stage that sets u the hysical circuit connections between caller and callee. To otimize the call 4

5 Registration Zone 1 (X s current zone) user curr. curr. tem. Busy ID VLR MSC addr. Status X N Y X MSC 1.1 MSC 1.2 HLR/VLR-1 user ID curr. curr. VLR MSC Y tem. Busy addr. Status - HLR/VLR-2 Wireline Network MSC 2.1 user ID curr. curr. tem. VLR MSC addr. Busy Status Registration Zone 2 (Y s home zone) Y N Y HLR/VLR-3 MSC 3.1 MSC Cell Base Station Registration Zone Mobile Switching Center Registration Zone 3 (Y s current zone) HLR/VLR Home & Visiting Location Register Figure 1: PCS Network Architecture setu rocess, it is imortant to consider the two stages together, in order to utilize the location information most eæectively. In current CSP standards, including that in IS-41, location looku queries are sent from the caller's MSC to his VLR, then to the callee's HLR and then VLR, until the callee's routing information is retrieved. The connection is then set u from the caller to the callee accordingly. In this aer, we develo new CSPs and exlore how they interact with various HLRèVLRbased LMTs in the entire call setu rocess. 3 Call Setu Protocols In this section, we describe two new CSPs: the Lightweight Location Looku Protocol èlillpè and the Reverse Connection Setu èrecsè rotocol. We also study the IS-41 standard CSP for comarison. We combine each CSP with the three LMTs introduced in Section 2: HLRèVLR, Relication, and Caching. We secify each of the nine CSP-LMT combination schemes in a æow chart. The database and network erformance of each combination is studied in later sections of the aer. We secify our rotocols based on the following general scenario, in which PCS user X is calling user Y in the system shown in Figure 1. We assume: 5

6 æ X is currently located in zone 1. æ Y has home zone 2 and is currently located in zone 3. æ HLR and VLR are combined as database HLRèVLR-i in zone i, i =1::3. In the rest of the aer, we refer the database at the user's home zone as HLRi, and the user's current zone's database as VLRi. æ The distance between zone 1 and zone 2 is l network hos. èl = 0 means X is in Y 's home zone.è æ The distance between zone 1 and zone 3 is m network hos. èm = 0 means X and Y are in the same zone.è æ The distance between zone 2 and zone 3 is n network hos. èn = 0 means Y is at home.è 3.1 Call Setu Procedures Several stes are taken during a call setu, and we deæne each ste as a searate rocedure. For each rocedure, the number of database lookus, wired network messages, and network hos are counted to measure call setu erformance. When a database is queried for user location information, it counts as one database looku. Every remote database looku, connection setu request, or acknowledgment contributes one network message. An inter-zone message may take multile network hos to reach its destination. We do not include wireless signaling èe.g., agingè or local messages èe.g., messages between the local VLR and MSCè in our analysis. Figure 2 lists the call setu rocedures. Event counters formatted as ëdatabase lookus, network messages, network hosë are resented in the right column, to cature the cost of each ste. Total network and database costs are calculated for each rocedure. Diæerent sets of rocedures are used in diæerent call setu rotocols: we secify the IS-41's CSP in Section 3.2, LiLLP in Section 3.3, and ReCS in Section IS-41 In the IS-41 standard, when X calls Y, X initiates a local looku at his own VLR èvlr1è for Y 's information. If Y 's information is not found, VLR1 sends query to Y 's home HLR èhlr2è where Y 's VLR address is always stored. HLR2 then retrieves Y's routing and status information from Y 's current VLR èvlr3è and sends it back to VLR1. If Y is not busy, the connection request is sent from X's MSC to Y 's MSC, and the network ath is reserved. Y is then aged in his cell. The call setu is comleted once X receives resonse from Y; otherwise the call setu fails. Figure 3 illustrates the call setu rocess in IS-41. 6

7 Location Looku Procedures: Procedure P1: X does local looku in VLR1 èaè X sends location looku message to local VLR1. èbè VLR1 looks u Y 's location information. ècè VLR1 relies to X. Procedure P2: VLR1 queries VLR3 èaè VLR1 sends location looku message to VLR3. èbè VLR3 looks u Y 's MSC and Tem address. ècè VLR3 relies to VLR1. Procedure P3: VLR1 queries HLR2 èaè VLR1 sends location looku message to HLR2. èbè HLR2 looks u Y 's VLR address. ècè HLR2 relies to VLR1. Procedure P4: HLR2 queries VLR3 èaè HLR2 sends location looku message to VLR3. èbè VLR3 looks u Y 's MSC and Tem address. ècè VLR3 relies to HLR2. total! ë1; 0; 0ë! ë0; 0; 0ë! ë0; 0; 0ë! ë0; 0; 0ë total! ë1; 2; 2lë! ë0; 1; lë! ë1; 0; 0ë! ë0; 1; lë total! ë1; 2; 2më! ë0; 1; më! ë1; 0; 0ë! ë0; 1; më total! ë1; 2; 2në! ë0; 1; në! ë1; 0; 0ë! ë0; 1; në Connection Setu Procedures: Procedure P5 èp8è: X connects to Y èx, Y in same zoneè. èaè X sends connection setu request to Y 's MSC. èbè Y 's MSC ages Y. ècè Y 's MSC relies to X if Y is reachable. Procedure P6: X connects to VLR3 èaè X sends connection setu request to VLR3. èbè VLR3 looks u Y 's MSC and Tem address. ècè VLR3 forwards connection setu message to Y 's MSC. èdè Y 's MSC ages Y. èeè Y 's MSC relies to X if Y is reachable. Procedure P7 èp9è: Y connects to X èx, Y in same zoneè. èaè Y sends connection setu request to X's MSC. èbè X's MSC relies to Y. total! ë0; 2; 2lëèë0; 0; 0ëè! ë0; 1;lëèë0; 0; 0ëè! ë0; 0; 0ëèë0; 0; 0ëè! ë0; 1;lëèë0; 0; 0ëè total! ë1; 2; 2lë! ë0; 1; lë! ë1; 0; 0ë! ë0; 0; 0ë! ë0; 0; 0ë! ë0; 1;lë total! ë0; 2; 2lëèë0; 0; 0ëè! ë0; 1; lëèë0; 0; 0ëè! ë0; 1;lëèë0; 0; 0ëè Figure 2:Call Setu Procedures 7

8 6 7 Y X Zone 3: Y s current zone 4 5 Zone 1: X s current zone Zone 2: Y s home zone Figure 3: IS-41 Call Setu Process We are interested in how the CSPs interact with diæerent LMTs during call setu. Thus, we rovide æow charts in Figures 9, 10, and 11 èin the Aendixè that secify call setu rocesses using IS-41's CSP combined with HLRèVLR, Relication, and Caching, resectively. The æowcharts resent the entire call setu rocess, from the ëstart" of the location looku stage to the ëend" of the connection setu stage. Each oval in the charts indicates the invocation of a rocedure from Figure 1. Both the rocedure name and event counters for the rocedure are noted to indicate the activities and cost of the ste. The diamonds indicate conditional oints that lead to diæerent execution branches under diæerent situations, with ëëyë" indicating the ositive èyesè branch and ëënë" indicating the negative ènoè branch. The terms on the edges, such as ëq" and ë1, q", indicate the robability assumtions for our analysis and will be discussed further in Section 4. HLRèVLR-based LMTs store only the user's current VLR address in his HLR, so that the HLR need not be udated when the user moves between diæerent cells within one registration zone. However, with such a scheme, if the call setu rotocol insists on obtaining full routing information before setting u the connection, then it must query both the callee's HLR and VLR, which may be in diæerent zones, during the location looku stage èas shown in Figure 3è. This may lead to long setu delay and heavy network traæc. In our roosed rotocols, we show that it is ossible to reduce the location looku stage, without signiæcantly increasing the connection setu stage, thereby decreasing overall setu delay and network load. 3.3 LiLLP In our Lightweight Location Looku Protocol èlillpè, the location looku stage in the call setu from X to Y retrieves only Y 's VLR address, instead of his entire routing information, thereby reducing the tasks of the location looku stage. After obtaining Y's VLR address, the system sends a connection setu request to Y's VLR and reserves network aths. Uon receiving the connection setu request, Y 's VLR forwards the request to Y 's MSC, according to the routing information stored in the VLR. Y 's MSC, which is co-located with the VLR in most current systems, ages Y in his cell. The connection setu is comleted once Y resonds. Figure 4 8

9 shows the LiLLP call setu rocess. As in IS-41, LiLLP can be combined with diæerent LMTs. 5 Y X Zone 3: Y s current zone 3 Zone 1: X s current zone Zone 2: Y s home zone Figure 4: LiLLP Call Setu Process Figures 12, 13, and 14 èin the Aendixè secify the entire call setu rocesses of LiLLP integrated with the three LMTs. Eæectively, LiLLP omits the remote database lookus for the detailed routing information during the location looku stage èmessages 3 and 4 in Figure 3è and instead obtains the information ëalong the way" during connection setu. As we will see, this aroach can reduce overall network signaling and setu delay. The advantage of our lightweight scheme is articularly clear when integrated with the Relication LMT. We can see from Figure 4 that if X's VLR has Y 's current VLR address relicated in its database, then X can obtain the address with one local looku and directly set u the connection with Y 's VLR. Thus, only two network messages are needed to comlete the entire setu rocess. Since LiLLP reserves network aths before retrieving Y's status information, LiLLP may waste network resources by reserving connections to unavailable users. The robability that a user is busy is likely to be small, but the robability that a user's handset is oæ may be signiæcant in today's systems. In fact, the same roblem occurs in IS-41, and is addressed by the Reverse Connection Setu Protocol roosed in the next section. 3.4 ReCS The technique of Reverse Virtual Call Setu èrvcè was introduced in ë6ë. The authors roosed that during call setu, the caller's request should be sent to the callee's HLR, which invokes global aging of the callee from there. If the callee answers the age, connection setu is initiated. Otherwise, a message indicating the failure is sent back to the caller. This scheme reduces the cost of failed call attemts and call setu delay. However, it requires another overlaid global aging network and introduces extra wired or wireless signaling. We roose an alternative to RVC, in which the system ages the callee in his current visiting zone during the location looku stage. We call this new rotocol the Reverse Connection Setu èrecsè rotocol. In the ReCS rotocol, when a call is made from X to Y, the system ærst ænds Y 's current VLR address èvlr3è in X's local database or Y 's HLR, and sends the location looku request 9

10 to VLR3. VLR3 then looks at its database for Y 's routing information, and directly ages Y instead of sending the routing information back tox as in IS-41. The circuit connection setu is initiated from Y to X automatically èwhich is the reverse of the call request directionè after Y answers. Figure 5 shows the call setu rocess using ReCS. Figures 15, 16, and 17 èin the Y X Zone 3: Y s current zone 3 2 Zone 1: X s current zone Zone 2: Y s home zone Figure 5: ReCS Call Setu Process Aendixè secify ReCS combined with the three LMTs. By doing reverse connection setu, messages that notify the caller of the callee's routing information èmessages 4 and 5 in Figure 3è are eliminated. This leads to lower setu delay and signaling than the rotocol emloyed in IS-41. Also, since the ReCS rotocol ages the callee before setting u the connection, no network ath is reserved if the callee 's handset is oæ 1.Thus, the cost of failed call attemts is signiæcantly reduced. 4 Analytical Comarison In this section, we erform analytical comarisons between the three CSPs èour roosed LiLLP and ReCS, and the standard IS-41è, when combined with the three diæerent LMTs. We only consider average call setu èi.e. location looku + connection setuè erformance here. Emirical comarisons of overall system erformance of database and network activities for the CSP-LMT schemes, including location lookus and udates, are shown by simulation results in Section 5. Figure 6 summarizes the network message exchanges between the caller and callee HLR and VLRs during the call setu rocess for the three CSPs. We notice immediately that at least two messages are saved by using LiLLP or ReCS. Assuming each message takes the same time to reach its destination, LiLLP and ReCS can achieve much shorter setu delay. However, the scenario becomes more comlicated with diæerent traæc conditions, and when the CSPs are combined with diæerent LMTs. Thus, we consider the robabilities of diæerent situations as following: æ The robability that Y 's handset is oæ be o. 1 We are assuming here and in the rest of the aer that the user is unreachable only when his handset is oæ. However, there may be other reasons, such as the user is out of range, that can cause the unreachability of a user. 10

11 Caller Callee Callee Caller Callee Callee Caller Callee Callee VLR HLR VLR VLR HLR VLR VLR HLR VLR Time IS-41 LiLLP ReCS Location Looku Messages; Connection Setu Messages; Figure 6: Call Setu Network Messages æ The robability that Y is busy be. æ The robability that Y is in the same zone as X be q. æ The robability that Y is in his home zone be s. æ The robability that X is in Y 's home zone be t. In addition, for the Relication and Caching LMTs, we assume: æ The robability that X has a relica or cache of Y 's VLR address is r. æ The robability of a cache hit is h. These robabilities are indicated in the æowcharts of Figures 10í18. We calculate for each CSP-LMT combined scheme the average number of network messages and database lookus er call setu based on the æow charts, and resent the results in Tables 1 and 2. The numbers are reresented as formulas based on the robabilities seciæed above. They are indicative of the call setu delay, and artly decide the network and database loads associated with call setu. We use the following shorthands in the formulas: çh =1, h, ço =1, o, ç =1,, çq =1, q, çr =1, r, çs =1, s, ç t =1, t, rh =1, rh. We see from Table 2 that LiLLP and ReCS incur the same number of database lookus as IS-41. We comare the network erformance of LiLLP and ReCS with the IS-41 standard by resenting 11

12 IS-41 LiLLP ReCS HLRèVLR 2çqè1 + çsç t +çè 2çqè1 + çs t ç +çstè ç çqè1 + çs t ç +2çoçè Relication 2çqè1 + çrçsç t +çè 2çqè1 + çrçs t ç +ççrstè ç çqè1 + çrçs ç t +2çoçè Caching 2çqè1 + rhçsç t + ç hrt ç +çè 2çqè1 + rhçs t ç + hr ç t ç +çrhst ç + hçrtè ç çqè1 + rhçs t ç + ç hrt ç +2çoçè Table 1: Average Network Messages er Call Setu HLRèVLR Relication Caching IS-41, LiLLP, or ReCS 1+çqè1 + çsç tè 1+çqè1 + çrçsç tè 1+çqè1 + rhçsç t + ç hrtè ç Table 2: Average Database Reads er Call Setu the diæerences of the numbers of call setu network messages in Table 3. We can see that each formula in the table has a ositive value èbased on the fact that all the robabilities are ç 1è, which means that LiLLP and ReCS incur a strictly smaller average number ofnetwork messages er call setu than IS-41, regardless which LMT is used. IS-41, LiLLP IS-41, ReCS HLRèVLR 2ççqè1, sç tè çqè1 + çs ç t +2oçè Relication 2ççqè1, çrsç tè çqè1 + çrçs ç t +2oçè Caching 2ççqèt + rhçsç tè çqè1 + rhçs ç t + r ç h ç t +2oçè Table 3: Performance Comarison Between CSPs The relative erformance of LiLLP and ReCS relies on seciæc robability assumtions. To further investigate the analytical formulas, let us make the following assumtions about the system conditions: = 1 8, q = 1 8, s = 1 2, t = 3 8, r = 1 2, h = 7 8. We learned from simulations that the caching èor relicationè ratio r = 1 can be achieved with 2 fewer than æve relicas for each user. For the robability that a user's handset is oæ, we consider two ossible scenarios. One is the ideal o = 0 in which handsets are always on. The other is o = 1 2 roosed in ë18ë, which is more realistic in today's systems due to ower limitations. Tables 4 and 5 show the average numbers of network messages and database reads er call setu under the above default assumtions. We have seen in Table 3 that the larger the robability o is, the more network messages ReCS saves. Table 4 further shows that when o = 1 2, ReCS schemes achieve the best network 12

13 IS-41 LiLLP ReCS èo =0è ReCS èo = 1è 2 HLRèVLR 3:82 2:78 2:68 1:91 Relication 3:55 2:26 2:54 1:78 Caching 3:66 2:81 2:44 1:83 Table 4: Average Network Messages Per Call Setu èunder default assumtionsè IS-41, LiLLP or ReCS HLRèVLR 2:15 Relication 2:01 Caching 2:06 Table 5: Average Database Reads er Call Setu èunder default assumtionsè erformance, reducing u to 1è2 of the network messages in IS-41. However, when o = 0, the scheme combining LiLLP with the Relication LMT achieves better erformance in the average number of network messages and database lookus. Since the Caching LMT always connects to the cached VLR address before connection setu to ensure that the cached address is correct, it incurs one extra remote VLR looku for each call setu in LiLLP and loses its advantage. Therefore, using caching in LiLLP is not worthwhile. The numbers in Tables 4 and 5 will certainly change as the robability assumtions vary. For examle, the higher the relication ratio, the better the Relication scheme erforms. However, udate cost increases when more relicas are added. Neither LiLLP nor ReCS itself incurs extra udate cost, but the Relication LMT may introduce extra udate cost in order to kee the relicated VLR addresses u-to-date. The overall database and network erformance is studied via simulations in the next section. 5 Simulations We have studied the erformance of the call setu rotocols, including our roosed LiLLP and ReCS rotocols, by simulations. As in the revious sections, we combine the call setu rotocols with diæerent location management techniques, and comare their erformance with resect to database accesses and network activity. Our simulations take into account the udate cost when users move across zones, which was not considered when analyzing the average call setu erformance in Section 4. In this section, we ærst introduce our Pleiades simulator ë8, 9ë used to erform our simulations. The toology models and network traæc models that we used to simulate the PCS environment are also brieæy resented. Finally, simulation results comaring the schemes are shown. 13

14 5.1 Pleiades Simulator We erform simulations using our PCS system simulator, Pleiades ë17ë. Pleiades is a highly conægurable discrete event simulator develoed at Stanford. The simulator models PCS location management and call setu rocesses. An inut scrit æle is used to describe the geograhical and network toology models as well as diæerent user call and mobility models. The statistics of the network and database activities are written to an outut æle for analysis. Our simulation models are described in ë9, 11ë and summarized here. Our system toology is modeled after the ten largest cities of the United States. Each city is divided into a number of registration zones and wireless cells according to the city size. Each registration zone is aroximately 400 square miles with about 20,000 subscribers. We used a hierarchical network toology, in which cells in each city are ærst connected with each other, then connected to other cities through higher-level network nodes. We have catured realistic traæc conditions by using time-varying traæc models. The call model includes various call traæc tyes, call volume changes throughout the day, and also incororates callee distribution. We have instantiated our call models with arameters that were derived from call traæc data obtained from our local university telehone exchange ë20ë. The Metroolitan Mobility Model èmetmodè and the National Mobility Model ènatmodè ë9ë are used for modeling movements within and between the cities. They are derived from transortation surveys ë5ë, vehicle traæc data ë16ë and commercial airline data ë3ë. 5.2 Results In our simulations, we consider nine CSP-LMT combinations as discussed in Sections 3 and 4. For Relication and Caching, user i's VLR address is eligible to be relicated or cached in zone j only if the local call to mobility ratio èlcmr ij è is higher than the otimal thresholds ë7, 19ë. A maximum of æve VLR address relicas for each user are allowed in the Relication LMT. We also assume the ideal situation where users are always reachable by the system èo =0èinour simulations. We erformed multi-day simulations and show results for a reresentative 24-hour eriod after start-u transients. Figures 7 and 8 deict the total network traæc and total database accesses er second versus simulation time. The eaks in the ægures indicates the eak calling and movement activities during the simulated day. Our grahs cature all database and network events, including location lookus and udates as well as connection setus, for all subscribers' calling and mobility activities. From Figure 7, we see that LiLLP integrated with Relication incurs the least network signaling, and is about 2è3 of the signaling in the IS-41 schemes. ReCS also achieves good erformance. In Figure 8, we can see that LiLLP and ReCS don't incur extra database accesses, and the database erformance achieved by using the three diæerent LMTs are also similar. These results are consistent with our analysis in Section 4. 14

15 Network Message Hos / Second HLR/VLR in LiLLP Caching in LiLLP Relication in ReCS HLR/VLR in ReCS Caching in ReCS Relication in LiLLP Relication in IS-41 HLR/VLR in IS-41 Caching in IS Time (Hours) Figure 7: Total Network Signaling Hos 3000 Database Accesses (Read & Write) / Second HLR/VLR in IS-41 HLR/VLR in LiLLP HLR/VLR in ReCS Caching in IS-41 Caching in LiLLP Caching in ReCS Relication in IS-41 Relication in LiLLP Relication in ReCS Time (Hours) Figure 8: Total Database Accesses 15

16 6 Conclusions We have roosed two new rotocols for PCS call setu: the Lightweight Location Looku Protocol èlillpè and Reverse Connection Setu èrecsè rotocol. We comared our rotocols with the existing call setu rotocol in the IS-41 standard. We carefully illustrated the interactions between the call setu rotocols and diæerent location management techniques using æow charts. Through analysis and simulations, we have shown that the newly roosed rotocols can reduce the setu delay and decrease network signaling in the call setu rocess by u to 1è2, while no extra database accesses or udate costs are required. We also discussed the best CSP-LMT schemes under what we believe to be realistic system conditions. Acknowledgments We are grateful to Bora Akyol, Jan Jannink, and Narayanan Shivakumar for numerous fruitful discussions. References ë1ë B. R. Badrinath and T. Imielinski. Relication and mobility. In Second Worksho on the Management of Relicated Data, ages 9í12. IEEE, November ë2ë D. C. Cox. Wireless ersonal communications: What is it? IEEE Personal Communications, ages 20í35, Aril ë3ë Origin and destination survey, t-100 domestic market data. Deartment of Transortation. Dataset for eriods 10è91-12è91 and 10è93-12è93. ë4ë J.S.M. Ho and I.F. Akyildiz. Local anchor scheme for reducing location tracking costs in PCN. In 1st ACM International Conference on Mobile Comuting and Networking èmobi- COM'95è, ages 170í180, Berkeley, California, ë5ë P. S. Hu and J. Young NPTS Databook: Nationwide Personal Transortation Survey. Federal Highway Administration, November ë6ë C.-L. I, G. P. Pollini, and R. D. Gitlin. PCS mobility management using the reverse virtual call setu algorithm. IEEEèACM Transactions on Networking, 5è1è:13í23, February ë7ë R. Jain, Y.-B. Lin, C. Lo, and S. Mohan. A caching strategy to reduce network imacts of PCS. IEEE Journal on Selected Areas in Communications, 12è8è, October ë8ë J. Jannink, D. Lam, N. Shivakumar, J. Widom, and D. C. Cox. Eæcient and æexible location management techniques for wireless communication systems. In 2nd ACM International 16

17 Conference on Mobile Comuting and Networking èmobicom'96è, ages 38í49, Rye, New York, November ë9ë D. Lam, D. C. Cox, and J. Widom. Teletraæc modeling for Personal Communications Services. IEEE Communications Magazine Secial Issue on Teletraæc Modeling, Engineering and Management in Wireless and Broadband Networks, 35è2è:79í87, February ë10ë D. Lam, Y. Cui, D. Cox, and J. Widom. A location management technique to suort lifelong numbering in Personal Communication Services. IEEE Global Telecommunications Conference, November To aear. ë11ë D. Lam, J. Jannink, D. C. Cox, and J. Widom. Modeling location management for Personal Communication Services. In Proceedings of 1996 IEEE International Conference on Universal Personal Communications èicupc96è, ages 596í601, Setember ë12ë W. C. Y. Lee. Mobile Cellular Telecommunications Systems. McGraw-Hill, ë13ë K. K. Leung and Y. Levy. Data relication schemes for global network. In 15th Internation Teletraæc Congress èitc15è, ages 211í222, June ë14ë K. K. Leung and Y. Levy. Global mobility management by relicated databases in Personal Communication Networks. IEEE Journal On Selected Areas In Communications, ë15ë M. Mouly and M.-B. Pautet. The GSM System for Mobile Communications. Palaiseau, France, ë16ë 1990 commute summary. Metroolitan Transortation Commission, Lotus 123 format sreadsheet, August S.F. Bay area transortation measurements. ë17ë Peiades homeage: htt:èèwww-db.stanford.eduèleiadesè. Stanford University. ë18ë G. P. Pollini, S. Meier-Hellstern, and D. J. Goodman. Signaling traæc volume generated by mobile and ersonal communications. IEEE Communication Magazine, ages 60í65, June ë19ë N. Shivakumar and J. Widom. User roæle relication for faster looku in mobile environments. In 1st ACM International Conference on Mobile Comuting and Networking èmo- BICOM'95è, ages 161í169, Berkeley, California, ë20ë Telehone call traæc data set, 3è95í9è95. S. Phillis, ersonal communication, October Encryted ID numbers. ë21ë J. Z. Wang. A fully distributed location registration strategy for universal ersonal communication systems. IEEE Journal on Selected Areas in Communications, 11è6è:850í860, August

18 ë22ë J. I. Yu. ISí41 for mobility management. In First International Conference on Universal Personal Communications, èicupc92è. IEEE,

19 A Flow charts Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q Is X at Y s Home? 1-t t P3: VLR1 queries HLR2 [1,2,2m] s Is Y at Home? 1 - s P4: HLR2 queries VLR3 [1,2,2n] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 9: HLRèVLR in IS-41 19

20 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - t Is X at Y s Home? t r Y s relica in VLR1? 1 - r P2: VLR1 queries VLR3 [1,2,2l] P3: VLR1 queries HLR2 [1,2,2m] s Is Y at Home? 1 - s P4: HLR2 queries VLR3 [1,2,2n] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 10: HLRèVLR with Relication in IS-41 20

21 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - t Is X at Y s Home? t r Y s cache in VLR1? 1 - r P2: VLR1 queries VLR3 [1,2,2l] Cache Hit? h 1 - h P3: VLR1 queries HLR2 [1,2,2m] s Is Y at Home? 1 - s P4: HLR2 queries VLR3 [1,2,2n] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 11: HLRèVLR with Caching in IS-41 21

22 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - t Is X at Y s Home? t P3: VLR1 queries HLR2 [1,2,2m] Is Y at Home? 1 - s 1 - s 1 - P6: X connects VLR3 [1,2,2l] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 12: HLRèVLR in LiLLP 22

23 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - r Is X at Y s Home? 1 - t Y s relica in VLR1? t r P3: VLR1 queries HLR2 [1,2,2m] Is Y at Home? 1 - s s P6: X connects VLR3 [1,2,2l] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 13: HLRèVLR with Relication in LiLLP 23

24 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q r Is X at Y s Home? 1-t Y s cache in VLR1? t 1 - r P2: VLR1 queries VLR3 [1,2,2n] Cache Hit? 1 - h h P3: VLR1 queries HLR2 [1,2,2m] 1 - s s Is Y at Home? P6: X connects VLR3 [1,2,2l] P8: X connects to Y [0,0,0] P5: X connects to Y [0,2,2l] End Figure 14: HLRèVLR with Caching in LiLLP 24

25 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q Is X at Y s Home? 1-t t P3-ste(a,b): VLR1 queries HLR2 [1,1,m] s Is Y at Home? 1 - s P4-ste(a,b): HLR2 queries VLR3 [1,1,n] 1 - P5-ste(b): VLR3 ages Y [0,0,0] o Is Y Off? q 1 - o Is Y in X s Zone? 1 - q P9: Y connects to X [0,0,0] P7: Y connects to X [0,2,2l] End Figure 15: HLRèVLR in ReCS 25

26 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - t Is X at Y s Home? t r Y s relica in VLR1? 1 - r P2-ste(a,b): VLR1 queries VLR3 [1,1,l] P3-ste(a,b): VLR1 queries HLR2 [1,1,m] s Is Y at Home? 1 - s P4-ste(a,b): HLR2 queries VLR3 [1,1,n] 1 - P5-ste(b): VLR3 ages Y [0,0,0] o Is Y Off? 1 - o q Is Y in X s Zone? 1 - q P9: Y connects to X [0,0,0] P7: Y connects to X [0,2,2l] End Figure 16: HLRèVLR with Relication in ReCS 26

27 Start P1: X local looku VLR1 [1,0,0] q Is Y in X s Zone? 1 - q 1 - t t Is X at Y s Home? r Y s cache in VLR1? 1 - r P2-ste(a,b): VLR1 queries VLR3 [1,1,l] Cache Hit? h 1 - h P3-ste(a,b): VLR1 queries HLR2 [1,1,m] s Is Y at Home? 1 - s P4-ste(a,b): HLR2 queries VLR3 [1,1,n] 1 - P5-ste(b): VLR3 ages Y [0,0,0] o Is Y Off? 1 - o q Is Y in X s Zone? 1 - q P9: Y connects to X [0,0,0] P7: Y connects to X [0,2,2l] End Figure 17: HLRèVLR with Caching in ReCS 27

Efficient PCS Call Setup Protocols*

Efficient PCS Call Setup Protocols* Efficient PCS Call Setup Protocols* Yingwei Cui, Derek Lam, Jennifer Widom, Donald C. Cox Computer Science & Electrical Engineering Depts. Stanford University Abstract Increasing demand for wireless mobile

More information

A Location Management Technique To Support Lifelong Numbering in Personal Communications Services æ

A Location Management Technique To Support Lifelong Numbering in Personal Communications Services æ A Location Management Technique To Support Lifelong Numbering in Personal Communications Services æ Derek Lam, Yingwei Cui, Donald C. Cox, Jennifer Widom Electrical Engineering & Computer Science Depts.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks

A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks Md. Mohsin Ali Department of Computer Science and Engineering (CSE) Khulna niversity

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August ISSN International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 299 Performance Evaluation of PB-cache Scheme for Personal Communication Service Network Monika Rungta Sudhir

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Flexible Manufacturing Cell Formation of Processing Workshop based on Intelligent Computing

Flexible Manufacturing Cell Formation of Processing Workshop based on Intelligent Computing 27 A ublication of CHEMICAL ENGINEERINGTRANSACTIONS VOL. 55, 206 Guest Editors:Tichun Wang, Hongyang Zhang, Lei Tian Coyright 206, AIDIC Servizi S.r.l., ISBN978-88-95608-46-4; ISSN 2283-926 The Italian

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Incremental Planning of Multi-layer Elastic Optical Networks

Incremental Planning of Multi-layer Elastic Optical Networks Incremental Planning of Multi-layer Elastic Otical Networks P. Paanikolaou, K. Christodoulooulos, and E. Varvarigos School of Electrical and Comuter Engineering, National Technical University of Athens,

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

IN an ad hoc wireless network, where nodes are likely to

IN an ad hoc wireless network, where nodes are likely to 1432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 10, OCTOBER 2006 Otimal Transmit Power in Wireless Sensor Networks Sooksan Panichaiboon, Student Member, IEEE, Gianluigi Ferrari, Member, IEEE, and

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Sage Document Management Version 17.1

Sage Document Management Version 17.1 Sage Document Management Version 17.1 User's Guide This is a ublication of Sage Software, Inc. 2017 The Sage Grou lc or its licensors. All rights reserved. Sage, Sage logos, and Sage roduct and service

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

fshiva, jan, Abstract We consider per-user proæle replication as a mechanism for faster location lookup of mobile users in a

fshiva, jan, Abstract We consider per-user proæle replication as a mechanism for faster location lookup of mobile users in a Per-User Proæle Replication in Mobile Environments: Algorithms, Analysis, and Simulation Results æ Narayanan Shivakumar, Jan Jannink, Jennifer Widom Department of Computer Science Stanford University,

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks Wireless Network, 2016, 8, 13-23 Published Online February 2016 in SciRes. htt://www.scir.org/journal/wsn htt://dx.doi.org/10.4236/wsn.2016.82002 Power Efficient Scheduled-Based Medium Access Control Protocol

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Magdy Saeb, Meer Hamza, Ashraf Soliman. Arab Academy for Science, Technology & Maritime Transort Comuter Engineering

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Performance Analysis of IEEE

Performance Analysis of IEEE Performance Analysis of IEEE 8. Deartment of Electrical and Comuter Engineering Rutgers University, Piscataway, NJ 8854 Abstract. Introduction Existing work includes [Bianchi ], and some roblems that we

More information

Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability

Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability Aligned Beacon ransmissions to Increase IEEE 802.11s Light Slee Mode Scalability Marco Porsch and homas Bauschert echnische Universität Chemnitz, Reichenhainer Str. 70, 09126 Chemnitz, Germany {marco.orsch

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-

More information

CS 5515 Fall Solution to Test è1. Open booksènotes; calculator allowed

CS 5515 Fall Solution to Test è1. Open booksènotes; calculator allowed CS 5515 Fall 1997 Solution to Test è1 Oen booksènotes; calculator allowed 1. Consider a standard DLX IntèFT ieline with 5 stages: IF, ID, EX, M and WB. The execution unit can execute æoating oint or integer

More information

Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm

Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm Pirogue a lighter dynamic version of the Raft distributed consensus algorithm Jehan-François Pâris Darrell D.. Long Deartment of Comuter Science Deartment of Comuter Science University of Houston University

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

A network performance-based device driven communication scheme for 5G networks

A network performance-based device driven communication scheme for 5G networks Received: 29 October 217 Revised: 26 December 217 Acceted: 27 December 217 DOI: 1.12/itl2.27 LETTER A network erformance-based device driven communication scheme for 5G networks Sanjay K. Biswash Dushantha

More information

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks Yoohwan Kim Wing Cheong Lau Mooi Choo Chuah H. Jonathan Chao School of Comuter Science Det. of Information

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam www.kuet.ac.bd Khulna University of Engineering & Technology (KUET) 2 Introduction Components of Wireless

More information

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM Pavel Davidson 1, Jussi Collin 2, and Jarmo Taala 3 Deartment of Comuter Systems, Tamere University of Technology, Finland e-mail: avel.davidson@tut.fi

More information