IS-IS Protocol Hardware Implementation for VPN Solutions

Size: px
Start display at page:

Download "IS-IS Protocol Hardware Implementation for VPN Solutions"

Transcription

1 IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box 450, Station A, Ottawa, Ontaio, K1N 6N5 CANADA Abstact: - One of the majo poblems elated to the gowth of netwok technology is the limitations it pesents when the potection and the esilience of a netwok has to be assued fo fast ecovey as is the case fo 1 and 10 Gbps links. It is well known that calculating the shotest path equies significant computational time. Steam-based applications (such as voice and video) unning on Gigabit links can suffe damatic packet loss duing link failues, intoducing lage delays on eceiving hosts in the pocess. In ode to alleviate the delay in such netwoks, this pape intoduces hadwae achitectue fo the IS-IS potocol. The achitectue implements mathematical algoithms fo calculating the shotest path in FPGAs. Such an implementation impoves the shotest path computation time, allowing fo a apid calculation of the second path. Key-Wods: - IS-IS, hadwae, FPGA, VPN, netwok, OSPF, Dksta 1 Intoduction In ode to ovecome and enginee some of the pefomance issues of packet based netwoks, hieachical and logical outing achitectue potocols wee developed in the aea of packet netwoks. Some of these potocols include Hieachical Pee Netwokto-Netwok inteface (HPNNI) [1] which is applied to ATM netwoks, Open Shotest Path Fist (OSPF) [2], Intemediate-System to Intemediate-System (IS-IS) [3] and Bode Gateway Potocol (BGP) [4] which ae used to oute taffic in autonomous IP netwoks. Most of these potocols ae based on computing Dksta s, Bell-man Fod s o othe algoithms to find the shotest path fom a souce node to a destination node. OSPF and IS-IS potocols ae well known potocols fo suppoting outing in a netwok laye potocol with datagam sevice. While both potocols have numeous similaities (authentication, flooding mechanisms, small contol packets, etc.), thee ae diffeences that become significant. In the constuction, tansmission and pocessing of link state PDUs (LSPs), OSPF is memoy intensive as moe bits ae tansmitted with lage link state heades and lage link state packets [5]. Consequently, OSPF equies moe bandwidth than IS-IS to tansmit infomation to its neighbos. Howeve, IS-IS packets cannot be easily diffeentiated at lowe (kenel) levels (because IS-IS is tansmitted on top of the data link laye) and most IS-IS fields ae of vaiable length, making packet pasing elatively difficult. Theefoe, the effective tade off between OSPF and IS-IS is that OSPF has optimized pocessing with inceased packet sizes while IS-IS has minimized stoage and bandwidth equiements with slow pocessing time. IS-IS outpefoms OSPF in link state packet aival times which is consideed the most impotant pefomance citeion in analyzing how outing infomation is tansmitted thoughout netwoks [6]. Theefoe, IS-IS is the pefeed potocol fo disseminating outing infomation ove boadcast netwoks. Fo these easons, we pusue the development of hadwae achitectue fo IS-IS. Hadwae achitectues fo IS-IS o outing potocols in geneal can be used to optimize pocessing tasks that othewise seve as significant bottlenecks in compute communications. The achitectue in [7] illustates how the shotest path can be calculated in hadwae using Dksta s algoithm. That shotest path achitectue can be used with any potocol equiing shotest path calculations to optimize outing computations. An IS-IS potocol achitectue is given in [8] illustating seveal modules inteacting with each othe to pefom IS-IS tasks, including a sepaate module to calculate the shotest

2 path. A simila achitectue could be implemented in hadwae with FPGAs to optimize pocessing, addessing the advantage of OSPF compaed to IS-IS, while maintaining low stoage and bandwidth equiements. This pape will pesent a new hadwae achitectue fo the IS-IS potocol. This achitectue allows fo a netwok topology to be diectly enteed o emoved as IS-IS pefoms petinent outing opeations. The pape is oganized in the following manne. Section 2 povides a bief oveview of the IS- IS potocol. Section 3 mathematically descibes the shotest path poblem while section 4 illustates a linea pogamming solution specific to shotest path outing. Section 5 descibes why hadwae should be used to addess taffic shaping in outing potocols. Section 6 descibes the hadwae achitectue of IS-IS as it would be implemented on an FPGA. Section 7 descibes expeimental esults achieved thus fa with espect to calculating the shotest path fo IS-IS. Finally, in Section 8 the conclusion to this wok is listed, summaizing elevant aspects of the achitectue and descibing futue wok. 2 IS-IS Oveview IS-IS is an inteio gateway potocol and link state potocol which uses Dksta s algoithm to find the shotest path between two outes within an aea. In this section of the pape a bief oveview of IS-IS is given by descibing the netwok elements and opeations. Fig.1 shows the netwok elements involved in an IS-IS domain. A host is efeed to as an End System (ES), a oute is called an Intemediate System (IS), and a designated oute is efeed to as a Designated Intemediate System (DIS). The data link inteface addess (MAC addess) is known as a Sub-netwok Point of Attachment (SNPA). The netwok laye addess (IP Addess) is known as a Netwok Sevice Access Point (NSAP). IS-IS has two levels of aea outing; level 1 () and level 2 (L2). In, ISs oute ES IS Y Level 1 Aea A Z L2 DIS Level 2 T L2 Backbone M L2 Fig.1. IS-IS Domain Level 1 Aea B K N within thei own aeas. If the destination is not within the aea then data will be outed to the closest L2 IS. L2 acts as a backbone whee ISs oute towads othe aeas. Cetain ISs can be configued fo both and L2. Routing infomation packets used among ISs ae known as Link PDUs (LSPs). Infomation collected by LSPs is stoed in a Link Database (LSDB). If an IS belongs two levels (L2) then that IS will have two LSDBs; one fo each level. Fig.2 illustates a high level opeation of IS-IS. The hello state illustates the activities pefomed in establishing a connection between two ISs. Fom Fig.1, it is assumed that Y is an IS coming up. Z acts as a DIS (i.e. pefoms the flooding of LSPs) and as a Pseudo-node (PSN) (i.e. the vitual node that emulates a boadcast link). When Y comes up it will be idle and it must establish its adjacencies. Y will send out IS-IS Hello (IIH) packets with a null SNPA. Z eceives IIH packets and checks its LSDB to detemine if an adjacency aleady exists. The IIH packet is ignoed if the adjacency exists; othewise Z ceates a new adjacency and sends an IIH packet to Y. Y eceives the IIH packet fom Z and etuns an acknowledgement. Z etuns an additional IIH packet to completely establish the connection. The next state is the Database (DB) Synchonization state whee exchanges of LSPs occu. The sequence numbe integated with LSPs is used to diffeentiate olde LSPs fom newe LSPs. Fom Fig.2, afte Y has established its adjacency, it will send out its LSP with sequence numbe 1. Upon eceiving the LSP Z sends othe LSPs to Y. Y uses these LSPs to ceate its LSDB. Once databases ae synchonized, all ISs compute the shotest path within thei aea in a state known as Shotest Path Fist (SPF). Hello IDLE INIT Y 1 way 2 way UP Veify CSNP Update LSDB IIH ID = Y SNPA = Null IIH ID = Z SNPA = Y IIH ID = Y SNPA = Z IIH ID = Z SNPA = Y DB Exch LSP ID = Y SeqNum = 1 DB Sych LSP ID = Z SeqNum =, LSP ID = SeqNum = n Update LSDB SPF LSP Update Eo, Missing Y ISs Compute Spanning Tee CSNP, Z, Y PSNP, LSP ID = Z SeqNum =, LSP ID= SeqNum = n Fig.2. IS-IS Opeations Z DIS INIT 1 way 2 way UP Update LSDB DB Exch Time fo Update Pocessing PSNP Flood LSPs

3 The next state is known as LSP Update. In this state two kinds of sequence numbes ae intoduced. The fist kind is the Complete Sequence Numbe PDU (CSNP) and the second kind is the Patial Sequence Numbe PDU (PSNP). CSNPs ae used to detemine if ISs have the cuent copies of all LSPs. PSNPs ae used by ISs to espond to CSNP if the CSNP had a missing LSP. F ig.2 shows an example of this scenaio. Afte a specific peiod of time, Z advetises CSNPs with summaies of all known LSPs. Y discoves that the LSP is missing. Hence, Y sends a PSNP equest fo the missing LSPs. Z pocesses the PSNP and floods LSPs that includes the missing. Y eceives the complete LSPs, updates its LSDB and ecomputes the shotest path. 3 Shotest Path Poblem The following notations can be used to descibe the shotest path poblem; G denotes a gaph, N denotes a set of nodes, A epesents a set of acs, s symbolizes the souce node and t denotes the temination node. G = (N,A) (1) { x ( A} (2) whee x denotes the ac/link connecting the node i to node j. The following VPN specific netwok fom [9] expands this definition to include custome nodes (c), custome edges (ce), povide nodes (pe) and povide edges (p). N = N ce N pe N p N a (3) N ce N pe = (4) N pe N p = (5) N ce N p = (6) whee c denotes the link cost between node i and node j. The equation is minimized subject to the following constaints. 1, i = s x x = 1, i = t (8) { j ( } { j ( j, i) } 0, othewise 0, ( A (9) x Solving the shotest path poblem in softwae typically equies O(n 2 ) o O(nlogn) algoithms. Those algoithms use data stuctues whose opeations un in O(1) to O(n) time. Significant inefficiency can exist depending how which algoithms and data stuctues ae used to solve the shotest path poblem. The use of econfiguable hadwae fo the shotest path poblem helps to alleviate the inefficiency obseved in softwae. 4 Shotest Path Routing Optimal pefomance in tems of bandwidth consumed on each link can be achieved with a set of shotest paths by solving the following linea pogam and dual shown in [10]. The linea pogam can be descibed as min R d j, i) j, i) 0 ( R subject to ji c d = 0, i s, t = 1, i = t ( A 1( A, R R R With this notation, the shotest path poblem is descibed as the minimization of the following equation whee T( s, t ) = d fo assumed taffic matix T, ( c x (7) (10) souce (ingess) node s and destination (egess) node t. is the faction of taffic fo though link (. The dual to the linea pogam is descibed as

4 max t R, t V ( subject to U W U j s whee U 0 i = 0. W U W + 1 c W R,( A (11) denotes the link weight fo link (. The linea pogam and dual shown hee illustate the impotance of efficient pocessing fo shotest path calculations, as a diffeent set of next hops may be geneated souce-destination pai whee taffic may be fowaded. The achitectue in this pape is also linea so efficiency in shotest path outing is of significant impotance. The following section illustates the justification of FPGAs in pefoming taffic shaping tasks though outing potocols 6 Hadwae Achitectue In this section of the pape the IS-IS hadwae achitectue will be pesented as follows; a desciption of the inputs and outputs of the IS-IS system and a system desciption is given fist. Then moe detailed discussions ae given fo the contol unit state machine and the data path. Fig.3 shows the inputs and outputs of the IS-IS system. The IS-IS system takes the following inputs: ingesspacket, which is whee incoming packets will be eceived. afivalue, which will be used to set the OSI NSAP addess (the fist octet), the value of this field indicates the top-level addessing domain associated with the NSAP. aeaaddess, which along with afivalue fom what s called the aeaid. systemid, which is the MAC addess of the IS. nsel, which specifies a use of the netwok laye sevice, if left un-initialized it will be set to zeo. psnid, the ID that will be used by the DIS to act as a PSN. 5 Taffic Shaping and Hadwae dis, which acts as the DIS. IS-IS and othe outing potocols play substantial oles in taffic shaping (alteing taffic to incease netwok efficiency). The potential impovements offeed by econfiguable hadwae (FPGAs, Systemson-Chip) to taffic shaping and othe compute communications tasks is best illustated by examining pefomance equiements. The most estictive taffic shaping equiements come fom high speed devices that must opeate at high ates. The infomation given in [11] illustates that slot duations ange fom 2us to 42us fo connections of at least 155Mbps whee the minimum packet sizes wee 40 bytes to 64 bytes. Taffic shaping at those ates is only achievable with dedicated hadwae. These ates ae of paticula impotance in IP netwoks since packets opeations ae expensive due to vaiable packet size. Futhemoe FPGAs ae pefeable as hadwae implementation devices because they ae econfiguable, so a given platfom can be optimized as much as possible. clock, this signal povides a clocking souce to the system fo synchonization. eset, this signal is used to eset IS-IS system to its default configuation. The IS-IS system povides the following outputs: egesspacket, is the inteface at which IS-IS system will be outputting packets such as LSPs, CSNP, PSNP,etc. is, infoms the IS-IS system use about the state of the IS. The IS-IS system is composed of two majo subsystems, a contol unit and a data path (as shown in Fig.4). The contol unit is composed of 4 pocessos, the Main Pocesso (MP) is esponsible fo invoking and updating the othe 3 pocessos based on feedback fom all othe pocessos. The ingesspacket ISIS Data afivalue System Signals aeaaddess egesspacket systemid Contol Signals nsel psnid dis clock eset Fig.3. IS-IS I/O is

5 Ingess Packet Contol Unit Ingess Packet Pocesso Main pocesso Shotest Path Pocesso Data Path Egess Packet Pocesso Egess Packet Fig.4. IS-IS system view ingess packet pocesso (IPP) is esponsible fo pocessing and buffeing packets eceived on the ingess path. It also updates the MP with status signals on the type of packets eceived. The Shotest Path Pocesso (SPP) is esponsible fo computing the SPF. The Egess Packet Pocesso (EPP) handles all tasks elating to sending packets as the esult of LSP advetisements, esponding o acknowledging packets. 6.1 Contol Unit The contol unit is pesented in the state machine shown in Fig.5. The Hello state is whee the adjacency establishment is achieved. If an adjacency was aleady established then the contol unit ignoes the hello packet and goes back to the IDLE state. If an adjacency was not established then the contol unit emains in the hello state and pefoms all necessay computations. In the DB Exchange state the contol unit eceives and advetises LSPs to make sue that its LSDBs ae synchonized with the latest netwok topology. Upon completing the DB Exchange state, the contol unit pocesses buffeed LSPs and stoes them into the appopiate LSDB, in a state known as LSDB Update. Once the LSDB update state is complete, the SPF state is executed and the shotest path is computed. The contol unit moves to an IDLE state whee it waits fo times to be tiggeed. In the case of a DIS deployment, the tiggeed times foce the contol unit to ente the C/P-SNP Pocessing state whee CSNP packets ae sent out to the netwok. The contol unit stays in the C/P-SNP Pocessing state fo a cetain amount of time to ensue that no PSNPs ae eceived. In a egula IS deployment, the contol unit moves to the C/P-SNP Pocessing state if a CSNP is eceived on the ingess path. In some cases, if a CSNP was missing some LSP summaies, then LSP advetisements will be flooded on the netwok and as a esult the contol unit will go to the LSDB Update state and SPF states. 6.2 Data Path As shown in F ig.6, the data path is composed of ingess components, egess components, LSDBs, system inputs, the SPP data path and the muxdemux components. The ingess and egess components ae buffes that stoe packets. The ingess components ae denoted by in in font of the component name and the egess components ae denoted by eg. Below is bief desciption of each buffe: IIH, buffes hello packets. DB, buffes database packets. LSP-, buffes Level 1 LSP packets. LSP-L2, buffes Level 2 LSP packets CSNP, buffes CSNP packets. PSNP, buffes PSNP packets. Thee ae two majo LSDBs; the active LSDB- and the active LSDB-L2. The active LSDB- stoes the pocessed LSPs fo and the active LSDB-L2 muxdemux Hello snpdone hellodone LSDB Update dbdone lspdbdone DB Exchange ingesspacket systeminputs iniih indb inlsp- SPP datapath egiih egdb eglsp- egesspacket inlsp-l2 eglsp-l2 C/P-SNP Pocessing snpnone snppoc IDLE spfdone SPF incsnp inpsnp active LSDB- egcsnp egpsnp standby LSDB- adjavailable active LSDB-L2 standby LSDB-L2 Fig.5. IS-IS main contol unit Fig.6. IS-IS data path majo components

6 stoes the pocessed LSPs fo L2. The standby LSDBs ae initialized to zeo. It is used duing the deletion (link failues o IS cashes) o the addition of LSPs. In the scenaio of adding a new LSP, the IS-IS system adds the new LSP to the standby LSDB, copies the active LSDB to the standby LSDB, then it activates the standby LSDB and deactivates the active LSDB (the standby LSDB becomes active and the active LSDB becomes standby). In the scenaio of deleting a LSP, the modification (eplacing LSPs with zeos) is done on the active LSDB, then the IS-IS system copies the active LSDB (skipping peviously inseted zeos) to the standby LSDB, then it activates the standby LSDB and deactivates the active LSDB. The switching between active and standby LSDBs occus wheneve necessay. The system inputs component ae egistes whee the IS-IS inputs ae stoed. The SPP data path descibed in [7] is used hee. The muxdemux component epesents multiplexes and demultiplexes (fo egulating data flow) that wee hidden fom F ig.6 to simplify the data path diagam. 7 Expeimental Results Simulation esults have been accumulated thus fa with espect to calculating the shotest path fo IS-IS. Othe aspects of IS-IS hadwae implementation ae not completed and consequently no esults can be given at this time. Netwoks of seven nodes o less wee used to geneate esults. Hadwae simulations wee pefomed using Cadence softwae while softwae benchmaks wee found with Java implementations of Dksta s algoithm. The shotest path was calculated in appoximately clock cycles in hadwae simulations. In softwae, those netwoks had thei shotest paths detemined in about 0.2 ms on a 267 MHz with a standad deviation of appoximately 8% ove 50 samples pe netwok. Those esults indicate that the shotest path can be calculated in appoximately 200 cycles in hadwae and the equivalent netwok has its shotest path calculated in cycles in a typical softwae envionment. 8 Conclusion The IS-IS hadwae achitectue pesented in this pape is flexible in adapting to netwok topology changes. The achitectue is scalable though FPGA implementation. Delays fo steam-based applications can be minimized by using this achitectue as demonstated in the expeimental esults achieved fo computing the shotest path. Refeences: [1] ATM Foum Technical Committee, Pivate Netwok-Netwok Inteface Specification, Mach [2] J.Moy, OSPF Anatomy of an Intenet Routing Potocol, Addison-Wesley, Febuay [3] White, Russ, IS-IS: Deployment in IP Netwoks, Addison-Wesley, [4] Y. Rekhte, P. Goss, Application of the Bode Gateway Potocol in the intenet, RFC 1772, Mach [5] Pelman, Radia, A Compaison Between Two Routing Potocols: OSPF and IS-IS, IEEE Netwok Magazine, Vol.5, No.5, 1991, pp [6] Shaon, Oan, Dissemination of Routing Infomation in Boadcast Netwoks: OSPF vesus IS- IS, IEEE Netwok, Vol.15, No.1, 2001, pp. 64. [7] Abou-Gabal, Mohamed, Petekin, Raymond, Ionescu, Dan, Lambi Cistian, Goza, Voicu, A Shotest Path Pocesso fo Taffic Engineeing of VPN Sevices, PERIODICA POLITECHNICA, Tansactions on AUTOMATIC CONTROL and COMPUTER SCIENCE, Vol.49, No.63, [8] Yang, Meong, Hahm, Jinho, Kim, Youngsun, and Kim, Sangha, Design and Implementation of the IS-IS Routing Potocol with Taffic Engineeing, APCC 2003, the 9th Asia-Pacific Confeence on Communications, Vol.3, 2003, pp [9] Lambi Cistian, Ionescu, Dan, Ionescu, Bogdan. Sevice Contol in Connection Oiented Netwoks, Recent Advances in Communications and Compute Science (WSEAS), 2003, pp [10] Sidhaan, Ashwin, Guein, Roch, Diot, Chistophe, Achieving Nea-Optimal Taffic Engineeing Solutions fo Cuent OSPF/IS-IS Netwoks, INFOCOM Twenty-Second Annual Joint Confeence of the IEEE Compute and Communications Societies, Vol.3, 2003, pp [11] Ophanoudakis, T, Leligou, H.-C., Konaos, Geoge, Chaopoulos, Ch. Accuate Schedule Implementation fo Shaping Flows of Vaiable Length Packets in High-Speed Netwoking Applications, Recent Advances in Communications and Compute Science (WSEAS), 2003, pp. 96.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Performing real-time image processing on distributed computer systems

Performing real-time image processing on distributed computer systems Pefoming eal-time image pocessing on distibuted compute systems RADU DOBRESCU, MATEI DOBRESCU, DAN POPESCU "Politehnica" Univesity of Buchaest, Faculty of Contol and Computes, 313 Splaiul Independentei,

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

MAC Protocol for Supporting QoS in All-IP HiperLAN2

MAC Protocol for Supporting QoS in All-IP HiperLAN2 MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Monte Carlo Simulation for the ECAT HRRT using GATE

Monte Carlo Simulation for the ECAT HRRT using GATE Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information