Chapter 3 MEDIA ACCESS CONTROL
|
|
- Barrie Willis
- 5 years ago
- Views:
Transcription
1 Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/2 Moivaion Moivaion Hidden erminal problem Can we apply media access mehods from fixed neworks? Example CSMA/CD Carrier Sense Muliple Access wih Collision Deecion send as soon as he medium is free, lisen ino he medium if a collision occurs (original mehod in IEEE 802.3) A sends o B, C canno receive A C wans o send o B, C senses a free medium (CS fails) collision a B, A canno receive he collision (CD fails) A is hidden for C Problems in wireless neworks signal srengh decreases a leas proporional o he square of he disance senders apply CS and CD, bu he collisions happen a receivers A B C Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/3 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/4
2 Moivaion Exposed erminal problem Moivaion - near and far erminals B sends o A, C wans o send o D C has o wai, CS signals a medium in use since A is ouside he radio range of C waiing is no necessary C is exposed o B Terminals A and B send, C receives he signal of erminal B hides A s signal C canno receive A A B C A B C D This is also a severe problem for CDMA neworks precise power conrol Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/5 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/6 Access mehods SDMA/FDMA/TDMA FDD/FDMA - general scheme, example GSM SDMA (Space Division Muliple Access) segmen space ino secors, use direced anennas Use cells o reuse frequencies f 960 MHz 24 FDMA (Frequency Division Muliple Access) assign a cerain frequency o a ransmission channel permanen (radio broadcas), slow hopping (GSM), fas hopping (FHSS, Frequency Hopping Spread Specrum) MHz 95 MHz MHz 200 khz TDMA (Time Division Muliple Access) assign a fixed sending frequency for a cerain amoun of ime MHz Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/7 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/8
3 TDD/TDMA - general scheme, example DECT TDMA Moivaion 47 µs downlink uplink We have a sysem wih n saions (0,,2,,n ) and one shared channel The channel is a perfec broadcas channel, ha is, if any single saion ransmis alone, he ransmission can be received by every oher saion. There is no hidden or exposed erminal problem. If wo or more ransmi a he same ime, he ransmission is garbled. Round robin algorihm: saion k sends afer saion k (mod n) If a saion does no need o ransmi daa, hen i sends ε There is a maximum message size m ha can be ransmied How efficien is round robin? Wha if a saion breaks or leaves? All deerminisic TDMA proocols have hese (or worse) problems Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/9 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/0 TDMA Sloed Aloha Queuing Theory he basic basics in a nushell We assume ha he saions are perfecly synchronous In each ime slo each saion ransmis wih probabiliy p. n P = Pr[Saion succeeds] = p( p) P = Pr[any Saion succeeds] = np! dp n 2 maximize P : = n( p) ( pn) = 0 dp pn = n hen, P = ( ) n e In sloed aloha, a saion can ransmi successfully wih probabiliy a leas /e. How quickly can an applicaion send packes o he radio ransmission uni? This quesion is sudied in queuing heory. Simples M/M/ queuing model (M=Markov): Poisson arrival rae λ, exponenial service ime wih mean /µ λ In our ime slo model, his means ha he probabiliy ha a new packe is received by he buffer is λ; he probabiliy ha sending succeeds is µ, for any ime slo. To keep he queue bounded we need ρ = λ/µ <. In he equilibrium, he expeced number of packes in he sysem is N = ρ/( ρ), he average ime in he sysem is T = N/λ. μ Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/ Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/2
4 Sloed Aloha vs. Round Robin Adapive sloed aloha Sloed aloha uses no every slo of he channel; he round robin proocol is beer. + Wha happens in round robin when a new saion joins? Wha abou more han one new saion? Sloed aloha is more flexible. Example: If he acual number of saions is wice as high as expeced, here is sill a successful ransmission wih probabiliy 30%. If i is only half, 27% of he slos are used successfully. Idea: Change he access probabiliy wih he number of saions How can we esimae he curren number of saions in he sysem? Assume ha saions can disinguish wheher 0,, or more han saions send in a ime slo. Idea: If you see ha nobody sends, increase p. If you see ha more han one sends, decrease p. Model: Number of saions ha wan o ransmi: n. Esimae of n: ˆn Transmission probabiliy: p = / ˆn Arrival rae (new saions ha wan o ransmi): λ; noe ha λ < /e. Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/3 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/4 Adapive sloed aloha 2 Adapive sloed aloha Q&A ˆn n We have o show ha he sysem sabilizes. Skech: Q: Wha if we do no know λ, or λ is changing? A: Use λ = /e, and he algorihm sill works P ( λ ) P 2 P + P 0 ( P + P )λ 0 2 n Q: How do newly arriving saions know ˆn? A: We send ˆn wih each ransmission; new saions do no send before successfully receiving he firs ransmission. Q: Wha if saions are no synchronized? A: Aloha (non-sloed) is wice as bad nˆ nˆ + λ, if success or idle nˆ nˆ + λ +, if collision e 2 Q: Can saions really lisen o all ime slos (save energy by urning off)? Q: Can saions really disinguish beween 0,, and more han sender? A: No. One can use sysems ha only rely on acknowledgemens Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/5 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/6
5 Backoff Proocols Backoff proocols rely on acknowledgemens only. Binary exponenial backoff, for example, works as follows: If a packe has collided k imes, we se p = 2 -k Or alernaively: wai from random number of slos in [..2 k ] I has been shown ha binary exponenial backoff is no sable for any λ > 0 (if here are infiniely many poenial saions) [Proof skech: wih very small bu posiive probabiliy you go o a bad siuaion wih many waiing saions, and from here you ge even worse wih a poenial funcion argumen sadly he proof is oo inricae o be shown in his course ] Ineresingly when here are only finie saions, binary exponenial backoff becomes unsable wih λ > 0.568; Polynomial backoff however, remains sable for any λ <. Demand Assigned Muliple Access (DAMA) Channel efficiency only 36% for Sloed Aloha, and even worse for Aloha or backoff proocols. Pracical sysems herefore use reservaion whenever possible. Bu: Every scalable sysem needs an Aloha syle componen. Reservaion: a sender reserves a fuure ime-slo sending wihin his reserved ime-slo is possible wihou collision reservaion also causes higher delays ypical scheme for saellie sysems Examples for reservaion algorihms: Explici Reservaion (Reservaion-ALOHA) Implici Reservaion (PRMA) Reservaion-TDMA Muliple Access wih Collision Avoidance (MACA) Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/7 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/8 DAMA: Explici Reservaion Aloha mode for reservaion: compeiion for small reservaion slos, collisions possible reserved mode for daa ransmission wihin successful reserved slos (no collisions possible) i is imporan for all saions o keep he reservaion lis consisen a any poin in ime and, herefore, all saions have o synchronize from ime o ime DAMA: Packe Reservaion MA (PRMA) a cerain number of slos form a frame, frames are repeaed saions compee for empy slos according o he sloed aloha principle once a saion reserves a slo successfully, his slo is auomaically assigned o his saion in all following frames as long as he saion has daa o send compeiion for his slos sars again as soon as he slo was empy in he las frame collisions Aloha Aloha Aloha Aloha reserved reserved reserved reserved reservaion ACDABA-F frame ACDABA-F frame 2 AC-ABAFframe 3 A---BAFD frame 4 ACEEBAFD frame ime-slo A C D A B A F A C A B A A B A F A B A F D A C E E B A F D collision a reservaion aemps Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/9 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/20
6 DAMA: Reservaion TDMA Muliple Access wih Collision Avoidance (MACA) every frame consiss of n mini-slos and x daa-slos every saion has is own mini-slo and can reserve up o k daaslos using his mini-slo (i.e. x = nk). oher saions can send daa in unused daa-slos according o a round-robin sending scheme (bes-effor raffic) Use shor signaling packes for collision avoidance Reques (or ready) o send : a sender requess he righ o send from a receiver wih a shor packe before i sends a daa packe Clear o send CTS: he receiver grans he righ o send as soon as i is ready o receive N mini-slos Nk daa-slos n=6, k=2 Signaling packes conain sender address receiver address packe size reservaions for daa-slos oher saions can use free daa-slos based on a round-robin scheme Example: Wireless LAN (802.) as DFWMAC Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/2 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/22 MACA examples MACA varian: DFWMAC in IEEE802. MACA avoids he problem of hidden erminals A and C wan o send o B A sends firs C wais afer receiving CTS CTS CTS from B A B C MACA avoids he problem of exposed erminals B wans o send o A, and C o D now C does no have o wai for i canno receive CTS from A CTS A B C D ACK sender idle RxBusy ime-ou or NAK fi wai for ACK wai for he righ o send CTS fi daa ime-ou fi ACK: posiive acknowledgemen NAK: negaive acknowledgemen RxBusy: receiver busy receiver idle ime-ou daa or corrup fi daa fi ACK NAK wai for daa fi CTS fi RxBusy Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/23 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/24
7 Polling mechanisms Inhibi Sense Muliple Access (ISMA) If one erminal can be heard by all ohers, his cenral erminal (a.k.a. base saion) can poll all oher erminals according o a cerain scheme Use a scheme known from fixed neworks Example: Randomly Addressed Polling base saion signals readiness o all mobile erminals erminals ready o send can now ransmi a random number wihou collision wih he help of CDMA or FDMA (he random number can be seen as dynamic address) he base saion now chooses one address for polling from he lis of all random numbers (collision if wo erminals choose he same address) he base saion acknowledges correc packes and coninues polling he nex erminal his cycle sars again afer polling all erminals of he lis Curren sae of he medium is signaled via a busy one he base saion signals on he downlink (base saion o erminals) wheher he medium is free erminals mus no send if he medium is busy erminals can access he medium as soon as he busy one sops he base saion signals collisions and successful ransmissions via he busy one and acknowledgemens, respecively (media access is no coordinaed wihin his approach) Example: for CDPD (USA, inegraed ino AMPS) Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/25 Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/26 Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segmen space ino spread he specrum cells/secors using orhogonal codes Terminals Signal separaion Advanages Disadvanages Commen only one erminal can be acive in one cell/one secor cell srucure, direced anennas very simple, increases capaciy per km² inflexible, anennas ypically fixed only in combinaion wih TDMA, FDMA or CDMA useful segmen sending ime ino disjoin ime-slos, demand driven or fixed paerns all erminals are acive for shor periods of ime on he same frequency synchronizaion in he ime domain esablished, fully digial, flexible guard space needed (mulipah propagaion), synchronizaion difficul sandard in fixed neworks, ogeher wih FDMA/SDMA used in many mobile neworks segmen he frequency band ino disjoin sub-bands every erminal has is own frequency, uninerruped filering in he frequency domain simple, esablished, robus inflexible, frequencies are a scarce resource ypically combined wih TDMA (frequency hopping paerns) and SDMA (frequency reuse) all erminals can be acive a he same place a he same momen, uninerruped code plus special receivers flexible, less frequency planning needed, sof handover complex receivers, needs more complicaed power conrol for senders sill faces some problems, higher complexiy, lowered expecaions; will be inegraed wih TDMA/FDMA [J.Schiller] Disribued Compuing Group MOBILE COMPUTING R. Waenhofer 3/27
Chapter 3 MEDIA ACCESS CONTROL
Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationCOSC 3213: Computer Networks I Chapter 6 Handout # 7
COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:
More information! errors caused by signal attenuation, noise.!! receiver detects presence of errors:!
Daa Link Layer! The Daa Link layer can be furher subdivided ino:!.! Logical Link Conrol (LLC): error and flow conrol!.! Media Access Conrol (MAC): framing and media access! differen link proocols may provide
More information4 Error Control. 4.1 Issues with Reliable Protocols
4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can
More informationMOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:
MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationMOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationAssignment 2. Due Monday Feb. 12, 10:00pm.
Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how
More informationMobile Communications
Mobile Communications Semester B, Mandatory modules, ECTS Units: 3 George Pavlides http://georgepavlides.info Book: Jochen H. Schiller, Mobile Communications Second Edition, Addison- Wesley, Pearson Education
More informationExercise 3: Bluetooth BR/EDR
Wireless Communicaions, M. Rupf. Exercise 3: Blueooh BR/EDR Problem 1: Blueooh Daa Raes. Consider he ACL packe 3-DH5 wih a maximum user payload of 1021 byes. a) Deermine he maximum achievable daa rae in
More informationWireless LANs: MAC. Wireless LAN: MAC. IEEE protocol stack. Module W.lan MAC
Wireless LANs: W.lan.3-2 Wireless LAN: 802.11MAC Dr.M.Y.Wu@CSE Shanghai Jiaoong Universiy Shanghai, China Module W.lan.3 Dr.W.Shu@ECE Universiy of New Mexico Albuquerque, NM, USA managemen PANs & Blueooh:
More informationCommunication Networks
Communicaion Neworks Chaper 10 Wireless Local Area Neworks According o IEEE 802.11 Communicaion Neworks: 10. IEEE 802.11 651 10. WLANs According o IEEE 802.11 Overview Organizaion of a WLAN according o
More informationLow-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany
Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,
More informationPage 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs
EEC173/ECS152C, Winer 2006 Key Poins from Las Lecure Wireless LANs 802.11 Frame forma 802.11 MAC managemen Synchronizaion, Handoffs, Power MAC mehods: DCF & PCF CSMA/CA wih posiive ACK Exponenial backoff
More informationScheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012
EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationMobile Computing IEEE Standard 9/10/14. CSE 40814/60814 Fall 2014
Mobile Compuing CSE 40814/60814 Fall 2014 IEEE IEEE (Ins4ue of Elecrical and Elecronics Engineers) esablished he 802.11 Group in 1990. Specifica4ons for sandard ra4fied in 1997. Ini4al speeds were 1 and
More informationImproving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services
Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585
More informationVideo streaming over Vajda Tamás
Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.
More informationNetwork management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);
QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is
More informationAML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves
AML7 CAD LECTURE Space Curves Inrinsic properies Synheic curves A curve which may pass hrough any region of hreedimensional space, as conrased o a plane curve which mus lie on a single plane. Space curves
More informationSelf-organized mobile networks IEEE Prof. JP Hubaux. Reminder on frequencies and wavelenghts. 1 µm 300 THz. 1 m 300 MHz.
Self-organized mobile neworks IEEE 802.11 Prof. JP Hubaux 1 Reminder on frequencies and wavelenghs wised pair coax cable opical ransmission 1 Mm 300 Hz 10 km 30 khz 100 m 3 MHz 1 m 300 MHz 10 mm 30 GHz
More informationAnnouncements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram
nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion
More information4. Minimax and planning problems
CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems
More informationMotor Control. 5. Control. Motor Control. Motor Control
5. Conrol In his chaper we will do: Feedback Conrol On/Off Conroller PID Conroller Moor Conrol Why use conrol a all? Correc or wrong? Supplying a cerain volage / pulsewidh will make he moor spin a a cerain
More informationIt is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = );
Mah 467 Homework Se : some soluions > wih(deools): wih(plos): Warning, he name changecoords has been redefined Problem :..7 Find he fixed poins, deermine heir sabiliy, for x( ) = cos x e x > plo(cos(x)
More informationChapter 8 LOCATION SERVICES
Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home
More informationCS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II
CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152
More informationPerformance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks
Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks
More informationAn efficient approach to improve throughput for TCP vegas in ad hoc network
Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc
More informationSpline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification
Las Time? Adjacency Daa Srucures Spline Curves Geomeric & opologic informaion Dynamic allocaion Efficiency of access Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen
More informationWireless Transmission and Mobility
Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an
More informationCS422 Computer Networks
CS422 Compuer Neworks Lecure 2 Physical Layer Dr. Xiaobo Zhou Deparmen of Compuer Science CS422 PhysicalLayer.1 Quesions of Ineress How long will i ake o ransmi a message? How many bis are in he message
More informationLess Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks
Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research
More informationImplementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)
Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationMedia Access Control. Chapter 6. Ad Hoc and Sensor Networks. Roger Wattenhofer 6/1
Media Access Control Chapter 6 Ad Hoc and Sensor Networks Roger Wattenhofer 6/1 Home Automation Light Temperature Sun-Blinds Fans Energy Monitoring Audio/Video Security Intrusion Detection Fire Alarm Ad
More informationImage segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding
Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same
More informationData Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2
Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,
More informationQuantitative macro models feature an infinite number of periods A more realistic (?) view of time
INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communicaion Technology according o IEEE Local wireless neworks WLAN 802.11 WiFi 802.11a 802.11h 802.11i/e/ /w 802.11b 802.11g Mobile Communicaions Chaper 7: Wireless LANs Characerisics IEEE 802.11
More informationPROCESS AUTOMATION MANUAL TIMER RELAY KF**-DU-EX1.D ISO9001
PROCESS AUTOMATION MANUAL TIMER RELAY KF**-DU-EX1.D ISO9001 Wih regard o he supply of producs, he curren issue of he following documen is applicable: The general erms of delivery for producs and services
More informationNEWTON S SECOND LAW OF MOTION
Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationDelay in Packet Switched Networks
1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link
More informationOutline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state
Ouline EECS 5 - Componens and Design Techniques for Digial Sysems Lec 6 Using FSMs 9-3-7 Review FSMs Mapping o FPGAs Typical uses of FSMs Synchronous Seq. Circuis safe composiion Timing FSMs in verilog
More informationMATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008
MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationA Matching Algorithm for Content-Based Image Retrieval
A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using
More informationLHP: An end-to-end reliable transport protocol over wireless data networks
LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.
More informationMIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch
CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple
More informationSam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.
8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged
More informationMultiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples
Wireless Ad Hoc & Sensor Networks Medium Access Control Outline Multiple Access Technique Application Transport Protocol Network Protocol Media Access Protocol Physical Channel (Radio) WS 2010/2011 Prof.
More informationCENG 477 Introduction to Computer Graphics. Modeling Transformations
CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World
More informationMOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS
NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationDCF/DSDMA: Enhanced DCF with SDMA Downlink Transmissions for WLANs
DCF/DSDMA: Enhanced DCF wih SDMA Downlink Transmissions for WLANs Ruizhi Liao, oris ellala, Crisina Cano and Miquel Oliver NeTS Research Group Deparmen of Informaion and Communicaion Technologies Universia
More informationShortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.
Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah
More informationEP2200 Queueing theory and teletraffic systems
EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help
More informationCurves & Surfaces. Last Time? Today. Readings for Today (pick one) Limitations of Polygonal Meshes. Today. Adjacency Data Structures
Las Time? Adjacency Daa Srucures Geomeric & opologic informaion Dynamic allocaion Efficiency of access Curves & Surfaces Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen
More informationA MAC layer protocol for wireless networks with asymmetric links
A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of
More informationDefinition and examples of time series
Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is
More informationLast Time: Curves & Surfaces. Today. Questions? Limitations of Polygonal Meshes. Can We Disguise the Facets?
Las Time: Curves & Surfaces Expeced value and variance Mone-Carlo in graphics Imporance sampling Sraified sampling Pah Tracing Irradiance Cache Phoon Mapping Quesions? Today Moivaion Limiaions of Polygonal
More informationAn Adaptive Spatial Depth Filter for 3D Rendering IP
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod
More informationWhy not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems
Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationIn fmri a Dual Echo Time EPI Pulse Sequence Can Induce Sources of Error in Dynamic Magnetic Field Maps
In fmri a Dual Echo Time EPI Pulse Sequence Can Induce Sources of Error in Dynamic Magneic Field Maps A. D. Hahn 1, A. S. Nencka 1 and D. B. Rowe 2,1 1 Medical College of Wisconsin, Milwaukee, WI, Unied
More informationPART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR
. ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral
More informationChapter Six Chapter Six
Chaper Si Chaper Si 0 CHAPTER SIX ConcepTess and Answers and Commens for Secion.. Which of he following graphs (a) (d) could represen an aniderivaive of he funcion shown in Figure.? Figure. (a) (b) (c)
More informationReal Time Integral-Based Structural Health Monitoring
Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy
More informationCoded Caching with Multiple File Requests
Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a
More informationVoltair Version 2.5 Release Notes (January, 2018)
Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For
More informationPacket Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers
Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering
More informationOpportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links
1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding
More informationPo,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl
Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728
More informationA time-space consistency solution for hardware-in-the-loop simulation system
Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong
More informationGauss-Jordan Algorithm
Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried
More informationA High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios
A High Efficiency MAC Proocol for WLANs: Providing Fairness in Dense Scenarios Luis Sanabria-Russo, Jaume Barcelo, Boris Bellala, Francesco Gringoli arxiv:42.395v2 [cs.ni] Nov 5 Absrac Collisions are a
More informationComputational Geometry in Wireless Networks - Routing. Presented by Heather M. Michaud
Compaional Geomery in Wireless Neworks - Roing Presened by Heaher M. Michad 1 Ad Hoc Wireless Neworks No fixed pre-exising infrasrcre Nodes can be saic or mobile Assme nodes don move dring roing or opology
More informationToday. Curves & Surfaces. Can We Disguise the Facets? Limitations of Polygonal Meshes. Better, but not always good enough
Today Curves & Surfaces Moivaion Limiaions of Polygonal Models Some Modeling Tools & Definiions Curves Surfaces / Paches Subdivision Surfaces Limiaions of Polygonal Meshes Can We Disguise he Faces? Planar
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationY. Tsiatouhas. VLSI Systems and Computer Architecture Lab
CMOS INEGRAED CIRCUI DESIGN ECHNIQUES Universiy of Ioannina Clocking Schemes Dep. of Compuer Science and Engineering Y. siaouhas CMOS Inegraed Circui Design echniques Overview 1. Jier Skew hroughpu Laency
More informationMAC Theory. Chapter 7. Ad Hoc and Sensor Networks Roger Wattenhofer
MAC Theory Chapter 7 7/1 Seeing Through Walls! [Wilson, Patwari, U. Utah] Schoolboy s dream, now reality thank to sensor networks... 7/2 Rating Area maturity First steps Text book Practical importance
More informationSchedule. Curves & Surfaces. Questions? Last Time: Today. Limitations of Polygonal Meshes. Acceleration Data Structures.
Schedule Curves & Surfaces Sunday Ocober 5 h, * 3-5 PM *, Room TBA: Review Session for Quiz 1 Exra Office Hours on Monday (NE43 Graphics Lab) Tuesday Ocober 7 h : Quiz 1: In class 1 hand-wrien 8.5x11 shee
More informationUsing CANopen Slave Driver
CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationFIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS
FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2
More informationAnnouncements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions
Announcemens For 02.05.09 The Logic o Boolean Connecives Truh Tables, Tauologies & Logical Truhs 1 HW3 is due nex Tuesday William Sarr 02.05.09 William Sarr The Logic o Boolean Connecives (Phil 201.02)
More informationOptimal Crane Scheduling
Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationScattering at an Interface: Normal Incidence
Course Insrucor Dr. Raymond C. Rumpf Office: A 337 Phone: (915) 747 6958 Mail: rcrumpf@uep.edu 4347 Applied lecromagneics Topic 3f Scaering a an Inerface: Normal Incidence Scaering These Normal noes Incidence
More informationUX260 QUICK START GUIDE
UX260 QUICK START GUIDE Transferring Music Playing Music Blueooh Pairing Taking a Picure/ Recording a Video www.lgusa.com Geing o Know Your Phone Camera BACK SIDE Lef Sof Key Speakerphone Key Talk Key
More informationDesign and Application of Computer-aided English Online Examination System NONG DeChang 1, a
3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi
More informationModeling of IEEE in a Cluster of Synchronized Sensor Nodes
Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,
More informationChapter 4 Sequential Instructions
Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More information4/20/09. Wireless LANs. Mobile Communication Technology according to IEEE (examples) Characteristics of wireless LANs. WiFi. ZigBee
Wireless LANs Characerisics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Blueooh / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Mobile Communicaion Technology according o IEEE (examples)
More information