Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Size: px
Start display at page:

Download "Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links"

Transcription

1 Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire, telematics, etertaimet, multimedia, pre-crash warig, highway guidace, remote diagostic, etc. will sigificatly icrease the complexity of a vehicle s software modules. From time to time, the vehicle s software may eed to be updated due to may reasos such as the itroductio of ew features i vehicles, chagig the avigatio map, fixig software bugs, etc. Software updates must be doe i secure modes to avoid ay future disasters due to malfuctios of the vehicle. I this paper, we propose a architecture for secure software uploads i vehicles. We provide a detailed descriptio of the secure software upload process. Key words Software update, security, key maagemet, itelliget vehicles. I. INTRODUCTION ABOUT half a cetury ago a vehicle was mostly a mechaical device. Today, a sigificat part of a vehicle s maufacturig cost goes towards the implemetatio of electroic compoets. The demad for drive-by-wire, telematics, etertaimet, multimedia, precrash warig, highway guidace, remote diagostic, etc. will sigificatly icrease the complexity of i-vehicle commuicatio etworks, hardware ad software modules. From time-to-time, it will be ecessary to upgrade vehicles software modules. For example, the map of a vehicle s avigatio system may eed to be updated whe ew roads, houses ad offices are built. A compay may eed to moitor its ewly desiged vehicles, via wireless commuicatio liks, to determie the performace of the vehicles i terms of fuel efficiecy, emissio ad other drivig coditios. The compay ca the improve, if Mauscript received December 5, 004. Syed Masud Mahmud is with the Departmet of Electrical ad Computer Egieerig, Waye State Uiversity, Detroit, MI 480 USA (Phoe: ; fax: ; smahmud@eg.waye.edu). Shobhit Shaker is with the Departmet of Electrical ad Computer Egieerig, Waye State Uiversity, Detroit, MI 480 USA ( sshaker@waye.edu). Iria Hossai is with the Departmet of Electrical ad Computer Egieerig, Waye State Uiversity, Detroit, MI 480 USA. ( ihossai@waye.edu) ecessary, the performace of its vehicles by remotely adjustig some software parameters i the vehicles electroic modules. Updatig software modules i the future itelliget vehicles, o a regular basis, will be required to keep the vehicles compatible with the ifrastructure of the itelliget trasportatio system. Remote software upload, via wireless commuicatio liks, has may advatages over upload at a service statio. Some of the advatages are as follows: The cosumers do ot eed to take their vehicles to service statios. Thus, remote software upload operatios will save cosumers valuable time. The persoel at the service statios do ot eed to sped time o vehicles o a idividual basis elimiatig labor costs from the auto maufacturers as well as from the cosumers. The auto maufacturers ca immediately fix bugs or upload ew features i software modules without beig delayed for a log period of time, which may save a sigificat amout of moey from legal costs. To upload software i vehicles, it is critically importat that this be doe i a secure eviromet. Otherwise, the system would be susceptible to security attacks, which will compromise its safety ad fuctioality. This paper presets a mechaism for secure software upload i a itelliget vehicle. The scope of this paper is software upload for oe vehicle oly. Thus, if the same software eeds to be uploaded i multiple vehicles, the the upload operatio must be repeated for each vehicle oe at a time. The rest of the paper is orgaized as follows. Sectio II presets some basic materials o secure commuicatios. Sectio III describes our architecture. Sectio IV shows system requiremets, ad Sectio V presets the coclusios. II. SOME BASIC MATERIALS Durig the last several years, iterest i usig the wireless commuicatio techologies have grow sigificatly. Bluetooth features are becomig very commo i cell phoes, PDAs, laptops, etc. More ad more homes are gettig broadbad coectios ad usig Wi-Fi techology for wireless i-home etworkig. The /05/$

2 automotive idustry has also started itroducig wireless techology, such as Bluetooth, for its i-vehicle etworkig []. If secure wireless etworks ca be implemeted at reasoable costs, the cosumers demad for i-vehicle wireless etworks may icrease sigificatly. The govermet may also madate auto compaies to have wireless etworks i vehicles so that the vehicles ca commuicate with each other to issue pre-crash warigs; ad law-eforcig authorities ca moitor vehicles emissio, speed ad other items related to violatios of traffic laws. Auto compaies ad suppliers must use secure wireless liks to upload software i their vehicles. Otherwise, hackers may tamper with software code durig the uploadig process, leadig to possible disasters durig the operatio of the vehicles. The curret techiques that are used for settig up a secure commuicatio lik are maily cliet-server based techiques such as SSL ad VPN. Brief descriptios of these techiques are show below. A. SSL (Secure Socket Layer) The SSL protocol is the Web stadard for ecryptig commuicatios betwee users ad SSL (secure socket layer) eabled e-commerce sites []. The SSL layer rus o the top of TCP/IP layer. The SSL security protocol provides data ecryptio, server autheticatio, message itegrity, ad optioal cliet autheticatio for a TCP/IP coectio. The SSL protocol icludes two sub protocols [3]: the SSL record protocol ad the SSL hadshake protocol. The SSL record protocol defies the format used to trasmit the data. The SSL hadshake protocol ivolves usig the SSL record protocol to exchage a series of messages betwee a SSL eabled server ad SSL eabled cliet whe they first establish a coectio. This exchage of messages is desiged to facilitate the actios like: autheticatio of the server to the cliet, autheticatio of the cliet to the server, selectio of cryptographic algorithms that they both support, use of public key ecryptio techiques to geerate shared secrets, etc. B. VPN (Virtual private etwork) VPN is a private etwork that uses a public etwork (usually the Iteret) to coect remote sites or users together [4]. Istead of usig a dedicated, real-world coectio such as a leased lie, a VPN uses "virtual" coectios routed through the Iteret from the compay's private etwork to the remote site or employee. VPN maily uses IPSec (iteret protocol ad security) protocol, which i tur uses the tuelig method for makig data packets immue to attacks. IPSec ca ecrypt data betwee various devices, such as router-to-router, firewall-to-router, PC-to-router, PC-to-server, etc. Tuelig is the process of placig a etire packet withi aother packet ad sedig it over a etwork. The etwork ad both parties uderstad the protocol of the outer packet, called the tuel iterface. C. Symmetric ad Public Key Ecryptio There are maily two types of ecryptio techiques: the symmetric-key ad public-key ecryptios [5]. I the symmetric-key ecryptio, both parties use the same key to ecrypt ad decrypt messages. I this ecryptio techique, both parties must have the same key i their system before they are goig to exchage messages. The public-key ecryptio uses a combiatio of a private key ad a public key. A computer (say X) ca sed its public key to other computers with which it wats to establish commuicatios, but it will securely keep its ow private key. A message that is ecrypted by the public key of X, ca oly be decrypted by X usig its private key. The ecryptio/decryptio process usig public/private key mechaism is very time-cosumig compared to that usig symmetric key mechaism. Normally, two parties use the public/private key techique to exchage their symmetric key. For example, if aother computer (say Y), which has the public key of X, wats to establish a secure commuicatio lik with X, the Y geerates a symmetric key ad seds it to X after ecryptig it usig the public key of X. X the uses its private key to decrypt the message set by Y, ad collects the symmetric key from the decrypted message. After that, X ad Y commuicate usig the symmetric key geerated by Y. III. THE PROPOSED ARCHITECTURE FOR SECURE SOFTWARE UPLOAD Here we preset ad discuss the architecture for secure software upload i vehicles electroic modules. We assume that all the vehicles are equipped with wireless iterface uits to commuicate with the ifrastructure of the Itelliget Trasportatio System (ITS). A compay s server ca commuicate with a selected group of vehicles via either the cellular etwork or the ITS ifrastructure. Sice the cell phoe towers cover almost all the road systems of the coutry, the same tower ca also be used as the Itelliget Trasportatio Tower (ITT). A. Autheticatio Keys We assume that at the time of maufacturig a vehicle, a set of autheticatio keys is istalled i the vehicle. The same set of keys is also kept i a cetral server. Every time a vehicle is goig to be autheticated by a ITT, the ITT gets the set of keys of the vehicle from the cetral server, ad uses oe key to autheticate the vehicle. Differet autheticatio keys are used to autheticate the vehicle at differet times. Whe all the keys of the set are used for autheticatig the vehicle, a ew set of keys is geerated ad set to the vehicle. The ew set of keys is also kept i the cetral server. Successive autheticatios of the vehicle are doe usig the ew set of keys. After autheticatig the 588

3 vehicle, the ITT or the cetral server issues a symmetric key to the vehicle. The ITT ad/or the cetral server ca securely commuicate with the vehicle usig the symmetric key. B. Key Maagemet for Software Upload Assume that automotive compay X wats to upload software i oe of its vehicles (say Vehicle V). Let Y be the supplier of the software. X geerates a set of lik keys (P, P,.., P N ) ad seds it to Y usig a secure lik such as SSL or VPN. Note that the lik keys will be used to establish secure liks betwee Supplier Y ad the target Vehicle V. X the securely seds the same set of lik keys to Vehicle V usig either the cellular etwork or the ifrastructure of ITS. Now, both Vehicle V ad the Supplier Y have the same set of lik keys. The supplier ad the vehicle ca establish a secure lik usig oe of these lik keys, say P. Other lik keys will be used to establish future secure liks betwee the vehicle ad the supplier. Sice a give lik key is ot goig to be used more tha oce, both the supplier ad the vehicle delete the key P from the set of lik keys after they have established a secure lik for the first time. After that, the supplier ad the vehicle geerate some symmetric ecryptio keys. Usig these ecryptio keys, the supplier ca sed ecrypted software to the vehicle. Figure shows the key trasfer ad software upload process. Sice each vehicle has its ow set of keys, either the vehicle or the software vedor ca sed ay uauthorized software to other vehicles without the coset of the automotive compay. Automotive Compay X Step: Lik keys P, P,.. P N, are set i secure mode usig SSL, VPN or other techology. Supplier Y Step: Lik keys P, P,.. P N, are set i secure mode usig the previously exchaged symmetric ecryptio key. Vehicle V Step3: a. A secure lik is established usig oe lik key. b. The supplier ad the vehicle exchage a set of symmetric ecryptio key(s). c. The supplier seds software i ecrypted mode. Figure : Key trasfer ad software upload process. C. Sedig Multiple Copies of the Software ca Sigificatly Improve the Security Level To icrease the security level of the software upload process, we recommed that the supplier should sed at least two copies of the software to the vehicle. These two or more copies of the software must be set after some radom time itervals. First, the supplier will establish a secure lik with the vehicle usig oe of the lik keys, ad the sed a copy of the software. After a radom time iterval, the supplier will agai establish a secure lik with the vehicle usig aother lik key, ad sed the secod copy of the software. The vehicle must have memory buffers to keep copies of the software. After receivig both copies of the software, the vehicle checks whether the two copies are exactly same. Sice the two copies of the software are set from the supplier to the vehicle at two differet times, it is very ulikely that a hacker will be able to chage both copies of the software exactly at the same poit i the code. Thus, it is very ulikely that the two copies of the software will be exactly same if oe or both of them are chaged. If the two copies of the software are the same, the vehicle seds a positive ackowledge sigal to both X (automotive compay) ad Y (supplier). If the two copies of the software are ot same, the the vehicle asks the supplier to retrasmit the umatched packets. To avoid hackers from detectig a predicted order of packet trasmissio, the packets of the software ca be set i some radom orders. I that case, eve if a hacker ca chage oe packet of the first copy of the software, it will be difficult for the hacker to detect the same packet i the secod copy of the software. As a result, it will be more difficult for the hacker to chage the same packet i both copies of the software. After receivig two idetical copies of the software, the vehicle iitiates a process for replacig the old software of a module by a copy of the ew software. The process of replacig the old software is iitiated whe the vehicle is ot i motio ad the igitio is off. If the vehicle is i motio, the it may issue a warig to the driver idicatig that ew software is ready to be loaded i a module. The the driver may stop the vehicle ad tur the igitio off at his/her coveiece. The vehicle the keeps a backup copy of the old software i a temporary buffer. After that, the vehicle loads the ew software ito a module. The backup 589

4 copy ca be used to udo the upload operatio if there are ay problems with the vehicle s fuctioality after the upload operatio. After successfully uploadig the software i a vehicle, the automotive compay (X) decides whether or ot to keep the remaiig lik keys i the vehicle. If X determies that Y has o more software to upload, the X seds a sigal to the vehicle to delete the remaiig lik keys. This way, the vehicle ca keep itself protected from ay isider attacks by the employees of Y. I the future, if Y wats to upload aother software i the vehicle, the X issues aother set of lik keys to both Vehicle V ad Supplier Y, ad the etire process of software upload is repeated. D. Oly Oe Copy of the Software Appeded with a Message Digest (MD). If oly oe copy of the software is to be set, the the security level of the upload process ca be icreased by appedig a message digest (MD) with the software. The supplier ca create a 8-bit message digest of the software usig the MD5 algorithm [6]. The supplier ca the ecrypt the message digest ad sed it alog with the software. O the other had, the vehicle ca also create a 8-bit message digest based o the software received by the vehicle. After that, the vehicle ca decrypt the message digest set by the supplier ad compare it with its calculated message digest. If both match, the the vehicle ca accept the software. This particular techique, which uses a message digest (MD), has some disadvatages over the other techique that seds at least two copies of the software. If a hacker ca successfully chage oe packet of the software, the the decrypted message digest will ot match with the vehicle s calculated message digest. As a result, the supplier will eed to retrasmit the etire software, because the supplier does ot kow which particular packet is chaged. If a hacker ca successfully chage a packet of every trasmissio, the the vehicle will ever be able to upload the software. E. Two Copies of the Software with a Message Digest (MD) A better way of uploadig software i a vehicle would be sedig two copies of the software alog with the message digest i each copy. If some packets of the first copy (icludig the message digest) do ot match with the correspodig packets of the secod copy, the the vehicle asks the supplier to sed the umatched packets. After receivig two idetical copies of the software, alog with the message digest, the vehicle calculates a message digest based o the software received from the supplier. The vehicle the compares this calculated message digest with the message digest received from the supplier. If they match, the vehicle accepts the software. If they do ot match, the the hacker was able to chage both copies of some packets (icludig the message digest). The vehicle the asks the supplier oly to sed oe or more copies of ecrypted message digest. The supplier seds the additioal copy(copies) of the message digest after some radom time iterval. After receivig the additioal copy of the message digest, the vehicle compares it with the calculated message digest. If they match, the vehicle accepts the software. Otherwise, the vehicle rejects the software. Figure shows the flow diagram of the software upload process where two copies of the software are set alog with the message digest (MD) i each copy. Yes Yes Vehicle received two copies of the software. Yes Are the two copies same? Received MD = Computed MD? Vehicle requests retrasmissio of MD Received MD = Computed MD? Vehicle accepts the software. Figure : Software upload algorithm. F. Uploadig Software i Multiple Vehicles Software upload i oly oe vehicle will be ecessary if a particular vehicle has some uique problems with its fuctioality. Uploadig software oly i oe vehicle is a uicast process. The scope of our curret work, preseted i this paper, is software upload i oe vehicle oly. However, if the automotive compay wats to add ew features to a large umber of vehicles, the software upload operatios will be required for multiple vehicles. Uploadig software i multiple vehicles is a multicast process. May differet multicast algorithms have bee desiged for mobile devices [7], [8]. Some of these algorithms ca be used to exted our work for software upload i multiple vehicles. We ited to do that i our future work. G. Protectio of Keys i the Servers of the Automotive Compay ad the Software Vedor All keys must be appropriately protected i the servers of No No No Vehicle requests retrasmissio of umatched packets. Vehicle receives umatched packets. Vehicle rejects the software. 590

5 both the automotive compay ad the software vedor. However, this is ot a uique problem with our work. The same problem exists i all security systems. For example, the systems that use private- ad public-key mechaisms must guard the private keys. Whatever techiques ad mechaisms are used to guard the private keys of a system, similar techiques ad mechaisms could be used to protect the vehicle keys i the servers of the automotive compay ad the software vedor. The keys must be kept i tamper resistat devices. However, sice the scope of this paper does ot deal with the protectio of keys i servers, we do ot wat to discuss this issue ay further. H. The Wireless Gateway of a Vehicle A vehicle must have a wireless gateway for it to receive software via wireless liks. This wireless gateway would be like a ECU (electroic cotrol uit) of the vehicle. The wireless gateway should have access to the vehicle s wired bus (e.g. a CAN bus) so that software ca be set to the targeted ECU from the wireless gateway. Whe the igitio is off, the wireless gateway should be i a low power receive mode to avoid battery draiig. Upo detectio of a sigal for software upload, the wireless gateway will switch itself to the full power mode to commuicate with the earest ITT. After receivig the software the wireless gateway ca save the software i its ow buffer. Later o, whe the igitio is tured o, the software ca be trasferred to the targeted ECU. IV. SYSTEM REQUIREMENTS I this sectio, we show the requiremets of memory size, badwidth ad legth of ecryptio keys for secure software upload operatios. A. Memory Requiremet A vehicle eeds two memory buffers: oe to keep a backup copy of the curret software ad aother oe to keep a copy of the ew software. The size of each buffer should be at least equal to the logest code of a vehicle module. Normally, the egie cotrol module cotais the logest code. A buffer size of 5 Mbytes should be good eough to hold the software of the egie cotrol module. Thus, the two buffers together eed at most 0 Mbytes. B. Badwidth Requiremet Ulike vehicle-to-vehicle commuicatio for pre-crash warig that requires high badwidth, the badwidth requiremet of a vehicle s wireless lik for uploadig software is ot a serious issue. The software does t eed to be trasmitted from the supplier to the vehicle i a short period of time (say withi a few miutes). The supplier ca take as much time as eeded to sed the software to the vehicle. Sice the trasfer process of the two copies of the software from the supplier to the vehicle is trasparet to the driver of the vehicle, a very low badwidth (say Kbyte/sec) lik may be good eough. To avoid ay badwidth limitatios for the overall system, icludig the supplier, cellular ad ITS ifrastructure, the software ca be trasmitted at off peak hours (say after midight) whe there may be very little traffic from other types of commuicatio services. C. Size of Ecryptio Keys Loger ecryptio keys eed more CPU time to do ecryptio ad decryptio tha that eeded by shorter ecryptio keys. However, loger keys provide better security tha shorter keys. Let us compare the key legths for two differet cases of software upload process to provide the same level of security. I oe case, loger keys are used ad oly oe copy of the software is set from the supplier to the vehicle. I the secod case, shorter keys are used, but two copies of the software are set from the L L supplier. Let ad be the legth of keys for the first ad secod case, respectively. The probability that a packet L k of the first case will be chaged is, where k idicates how fast the hacker ca decrypt iformatio compared to the vehicle. For example, if k = the the hacker ca decrypt iformatio twice as fast as the vehicle. Let be the total umber of packets i the software. The probability that the vehicle will receive all packets i clea form is ( k ). The, the probability that at least oe packet will be chaged by the hacker is ( p = k ) Similarly, for the secod case, where two copies of the software are set, the probability that the first copy will be chaged is ( k ) (). The probability that the secod copy of the software will be chaged i the same packet, as i the first copy, is k. Hece, the probability that tampered software will be uploaded i the vehicle for the secod case is p ( ( ) ) k k = () To have the same level of security for both cases, we have to make p =, i.e. k = ( ( k ) ) k p ( ). ( ) Hece, L k k +... = ( ) k k +... k (3) Most of the e-commerce trasactios through the iteret use 8-bit keys. However, for ay reasoable key size 59

6 (say 40 bits or loger), the values of k ad L k are very small. Igorig the higher order terms of L Equatio (3) we get k = k L, i.e. = k. Hece, L log k L = + (4) ad Equatio (4) shows the relatioship betwee L to have the same level of security. I geeral, we ca show that if the supplier decides to sed m copies of the software, the the followig relatioship must hold to achieve the same level of security. L ( m ) log k L m = + (5) m m where, L is the legth of ecryptio keys whe m copies of the software are to be set. Table I shows the size of L m m eeded to achieve the same level of security for differet values of k (speed ratio of hacker s computer) ad m (umber of copies of the software to be set by the supplier). Table I: Size of L m L to achieve the same security level for differet values of k ad m. Size of L (i bits) for L = 8 bits m k m = m = 3 m = I the above aalysis, it is assumed that the hacker stays with the vehicle all the time. However, it may ot be possible for the hacker to stay with the vehicle 4 hours a day ad 7 days a week. If the duplicate copies of the software are set after some radom ad log average time itervals (say 4 to 48 hours), the the hacker may ot stay ear the vehicle whe the vehicle will be receivig the duplicate copies of the software. Thus, i real-life, a much higher level of security ca be achieved by sedig two or more copies of the software to the vehicle. D. Trade off betwee m ad m+ Copies of the Software Whe m+ copies of the software are set, the legth of the keys is shorter tha whe m copies of the software are set. Shorter keys eed less time to do ecryptios ad decryptios of the software. However, sedig m+ copies of the software eed more time tha sedig m copies of the software. I our future work we would like to evaluate the trade off betwee m ad m+ copies of the software by cosiderig various performace parameters such as FEMA, cost/beefit ad time to deploy the upgraded software. V. CONCLUSIONS I this paper, we have preseted architecture for secure software upload i vehicles. We proposed that the supplier should sed at least two copies of the software to the vehicle. We have give a detailed descriptio of key exchage mechaisms ad software upload process. If two or more copies of the software are set, the shorter keys ca be used to obtai the same level of security that ca be obtaied with loger keys whe oly oe copy of the software is set. I other words, with the same size of keys, a sigificatly higher level of security ca be obtaied if two copies of the software are set to the vehicle, istead of oly oe copy. The level of security ca be further icreased if the time iterval betwee the trasmissio of two copies of the software is a radom umber with a very log average value. Sice differet autheticatio keys are used for differet vehicles, either a vehicle or the software vedor ca upload software i ay other vehicles without the coset of the automotive compay. REFERENCES [] Top 0 Techo-Cool Cars, IEEE Spectrum, February 003, pp [] A Frier, P. Karlto, ad P. Kocher, The SSL 3.0 Protocol, Netscape, Nov [3] M.S Bhiogade, Secure Socket layer, IS 00 Proc. of the iformig sciece IT Educatio Cof., Jue 9-, 00, Cork, Irelad, pp g058secur.pdf [4] How Virtual Private Networks Work. Website of how stuff works. [5] Hadbook of Applied Cryptography By A. Meezes, P. Va Oorschot ad S. Vadstoe. CRC Press 996. [6] Roald Rivest, The MD5 Message-Digest Algorithm, RFC 3 April 99. [7] Sug-Ju Lee, Routig ad Multicastig Strategies i Wireless Mobile Ad hoc Networks, Ph. D. Dissertatio, Uiv. of Califoria Los Ageles, 000. [8] Thomas Kuz ad Ed Cheg, O-Demad Multicastig i Ad-Hoc Networks: Comparig AODV ad ODMRP, Proc. of the d Iteratioal Cof. o Distributed Computig Sys. (ICDCS 0), IEEE Comp. Society,

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

A mechanical device. Today, a significant part of a

A mechanical device. Today, a significant part of a Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Syed Masud Mahmud, Member, IEEE, Shobhit Shanker, Student Member, IEEE Irina Hossain, Student Member, IEEE Abstruct- The

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV. Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

BIKE MS: 2015 PARTICIPANT CENTER GUIDE BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Authenticating Aviation Augmentation System Broadcasts

Authenticating Aviation Augmentation System Broadcasts Autheticatig Aviatio Augmetatio System Broadcasts Sherma C. Lo, Staford Uiversity Per K. Ege, Staford Uiversity BIOGRAPHY Sherma C. Lo is curretly a seior research egieer at the Staford Uiversity Global

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT

HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 1 MAKING A COMPLAINT FEBRUARY 2010 HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 2 ABOUT THIS BOOKLET This booklet outlies

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

IPv6 Routing Protocols. ISP Training Workshops

IPv6 Routing Protocols. ISP Training Workshops IPv6 Routig Protocols ISP Traiig Workshops 1 Iitial IPv6 Cofiguratio for Cisco IOS 2 IPv6 Cofiguratio o Cisco IOS p To eable IPv6 the followig global commads are required: Router(cofig)# ipv6 uicast-routig

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Math Section 2.2 Polynomial Functions

Math Section 2.2 Polynomial Functions Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Position and Velocity Estimation by Ultrasonic Sensor

Position and Velocity Estimation by Ultrasonic Sensor Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information