Performance enhancement of IEEE DCF using novel backoff algorithm

Size: px
Start display at page:

Download "Performance enhancement of IEEE DCF using novel backoff algorithm"

Transcription

1 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 RESEARCH Open Access Performnce enhncement of IEEE using novel ckoff lgorithm Cho-Yu Kuo 1, Yi-Hung Hung 2* nd Kun-Cheng Lin 3 Astrct In the IEEE distriuted coordintion function (), the inry eponentil ckoff lgorithm selects rndom ckoff numer from uniform proility distriution to void the prolem of pcket collision. In this rticle, we present novel ckoff lgorithm tht uses inominl distriution rther thn uniform distriution to determine the ckoff vlue. Simultion results show tht the proposed lgorithm outperforms the originl IEEE lgorithm. Keywords: Binry eponentil ckoff, IEEE 82.11, Crrier sense multiple ccess/collision voidnce (CSMA/CA) Introduction Advnces in wireless communiction technology hve incresed the demnd for wireless networks. The IEEE stndrd defines the specifictions for medium ccess control (MAC) nd the physicl lyers in wireless locl re network. The IEEE stndrd provides two mechnisms for the MAC protocol: the point coordintion function (PC) nd the distriuted coordintion function (). The PC utilizes sic ccess mechnism tht supports contention-free services. Therefore, the PC requires se sttion tht coordintes chnnel ccess mong nodes. On the other hnd, the utilizes n ccess mechnism tht supports contention-sed services. The ccess mechnism dicttes tht ll the nodes should rndomly ccess chnnels using the crrier sense multiple ccess/collision voidnce mechnism. This mechnism employs the cknowledgment (ACK) feture to detect trnsmission filures. In other words, if n ACK response is not received, it implies tht pcket trnsmission hs filed. Nodes will wit for n interfrme spce (IS), nd then, they will invoke the inry eponentil ckoff (BEB) lgorithm [1] tht uses n uniform rndom distriution clled contention window (cw) size to generte rndom ckoff vlue within the rnge of [, cw 1]. * Correspondence: ehhwng@mil.ntcu.edu.twl 2 Deprtment of Mthemtics Eduction, Ntionl Tichung University of Eduction, Tichung, Tiwn ull list of uthor informtion is ville t the end of the rticle In this study, the initil vlue of cw is set to cw min (the minimum contention window) nd the cw vlue will e douled when the pcket trnsmission fils. or node to otin ckoff vlue, it hs to first determine whether the chnnel is in use. If the chnnel is not usy, then the ckoff vlue will decrese y 1 in every time slot nd the node will trnsmit the dt when the ckoff vlue reches zero. However, if the chnnel is usy, the ckoff counter will freeze. When the chnnel is in n idle stte, it will wit for IS (DIS) time period, nd then, the ckoff vlue will egin decresing gin. If the pcket trnsmission continues to fil, the cw vlue will increse to cw m (the mimum contention window); when the node receives n ACK pcket, cw will e reset to cw min. If node receives n error pcket, it hs to wit for n etended IS (EIS) time. Then, the node determines whether the chnnel is in n idle stte gin. If it is, then fter DIS time period, the ckoff vlue will decrese y 1 fter ech idle slot. Recent studies hve reveled tht mny commercil network interfce crds re dopted with non-uniform distriution for generting ckoff vlues during contention periods in order to otin etter performnce [2,3].The p-persistent-sed model in [4] shows tht the ckoff vlue is smpled y using the p vlue in geometric distriution. In [4], it ws proved tht the nlyzed result ws slightly etter thn the simultion result (uniform distriution). In ddition, Li et l. [5] hve pointed out tht very little reserch hs een done on the proility distriution of slot selection. Even though 212 Kuo et l.; licensee Springer. This is n Open Access rticle distriuted under the terms of the Cretive Commons Attriution License ( which permits unrestricted use, distriution, nd reproduction in ny medium, provided the originl work is properly cited.

2 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 2 of 11 some improvements hve een proposed y Li et l. [5], however, they did not consider how to improve the performnce of throughput nd collision proility under the sme cw men vlue. All of these perspectives hve inspired us to eplore whether the throughput efficiency will remin the sme under different distriutions ut with the sme cw men vlue. Hence, in this rticle, we present novel ckoff lgorithm tht uses inominl distriution rther thn uniform distriution to minimize the degrding effect of rndom numer genertors. Simultion results demonstrte tht the proposed lgorithm outperforms the IEEE lgorithm. The reminder of this rticle is orgnized s follows. In the following section, the ckground nd the nlyticl model for the IEEE lgorithm re riefly reviewed. In Section The inominl ckoff lgorithm, the proposed inominl ckoff lgorithm is descried. In Section Simultions, the ccurcy of the proposed inominl ckoff lgorithm is verified vi simultion eperiments. inlly, the rticle ends with some conclusions. Bckground nd relted study In recent reserches, two types of contention window vlue djustments hve een presented to improve network performnce. The first type stticlly djusts the contention window size when continuous pcket collision is detected [1,5,6]. The other type dynmiclly djusts the contention window size on the sis of the type of network environment [4,7-9]. It is not esy to ccurtely estimte the contention window size in the second type of djustment ecuse network environments my chnge rpidly. Thus, this type is generlly not suitle for rel networks. Hence, in this study, we focus on the first type. Binchi nd Tinnirello [1] developed n nlyticl model to determine whether the men contention window size dopted y the BEB lgorithm for different distriutions is equl; if so, the network throughput will lso e equl. Thus, the performnce of ech modified BEB lgorithm could e emined y pplying it to the prolem of finding the men contention window size. Yun et l. [5] proposed rndom wlking ckoff (RWBO) lgorithm to enhnce the performnce of the IEEE In the RWBO lgorithm, the BEB lgorithm decreses the ckoff vlue y 1 with proility p d ( < p d < 1). Similrly, the performnce of the RWBO lgorithm cn e nlyzed y pplying it to different distriutions such s uniform nd geometric distriutions to determine network throughputs. Cli et l. [4] proposed n IEEE lgorithm tht uses geometric distriution to pproimte uniform distriution. Simultion results demonstrted tht the performnce of the geometric distriution ws slightly etter thn the uniform distriution under the sme men vlue for the contention window. This implied tht dopting different distriution function would likely e to influence network performnces. Although few studies hve ddressed the prolem of different proility distriution functions for the BEB lgorithm, the nlyticl model in [11] clerly eplins the effects of proility distriution functions when the sme men contention window size is used. Hu et l. [11] introduced the concept of post-usy slot, i.e., the slot fter usy slot. After node hs trnsmitted dt in usy slot, it my hve the opportunity to trnsmit dt in the post-usy slot (this phenomenon is clled short-term non-uniform ccess in [11]). urther, this phenomenon cnnot e nlyzed ccurtely using the model given in [1,12,13], ecuse the collision proility p is neither constnt nor independent, s ssumed for the nlyticl model given in [1,12,13]. In ccordnce with the specifictions, fter DIS time period, the ckoff counter t sttion will decrese the count y 1 only fter nother idle ckoff slot hs elpsed. Hence, only successful trnsmitting sttion my ccess the post-usy slot fter the DIS. However, ssumption 1 in ref. [12] implies tht the ccess proility of ech post-usy slot is identicl. Hence, the phenomenon of short-term non-uniform ccess cnnot e nlyzed using the p-persistent-sed model. Thus, Hu et l. proposed non-p-persistentsed model to nlyze this phenomenon. The min underlying concept for the non-p-persistent-sed model is descried s follows: The nodes tht contend for the post-usy slot cn e divided into two groups: one group comprises nodes tht hve trnsmitted dt in the previous usy slot, nd the other group comprises nodes tht hve not trnsmitted dt in the previous usy slot. In the BEB lgorithm, the nodes in the former group otin zero ckoff vlue from the distriution function nd the nodes in the ltter group otin non-zero ckoff vlue from the distriution function. In other words, the different proility distriutions dopted y the BEB lgorithm ffect the proility of node ccessing the post-usy slot. Therefore, it is necessry to nlyze the non-p-persistent-sed model for the effects of the different proility distriutions dopted y the BEB lgorithm. The inominl ckoff lgorithm In this study, we ssume tht (1) ech node is in sturted condition (i.e., it lwys hs pcket to trnsmit) nd (2) the chnnel is free from errors. Pcket loss occurs only ecuse of collisions during the pcket

3 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 3 of 11 trnsmission process, nd the hidden terminl prolem is not considered. Suppose X is the selected ckoff vlue for the BEB lgorithm. The proility tht X = is.5 on the stte spce {, W} (W = min {2 k cw min 1, cw m 1}, k =, 1,..., L, nd L is the retry limit), nd hence, the proility density function is given s follows: f X ðþ¼ :5 X 2 f ; W g X =2 f; Wg : ð1þ Thus, the proposed lgorithm is given s follows: Bckoff Time ¼ ðcmþ SlotTime: Here, (cw) = cw uniform distriution either over or 1 (5% ech), where cw is n integer within the rnge of vlues for the PHY chrcteristics, CWmin, nd CWm, nd CWmin cw CWm. SlotTime ¼ slot time: As the men contention window size for uniform distriution nd inominl distriution re equl, i.e., ((cw 1)/2), it is possile to differentite etween the effects of these two proility distriution functions on the network performnce using the non-p-persistentsed model. However, the ccess proility of the inomil lgorithm for ech slot is different, where oth the p-persistent-sed model nd the non-p-persistent-sed model cnnot e used for n nlysis. Therefore, we use the following emple to illustrte how the inomil lgorithm performs in the ckoff process. Due to the chrcteristic of inomil lgorithm, when the cw vlue is 31, the node cn only choose etween nd 31 s its ckoff vlue, wheres the proility of it choosing other vlues s ckoff vlue is. At this time, we my regrd ech slot s 31 independent chnnels, where collision will only hppen when the different nodes enter n identicl chnnel. On the contrry, when different nodes enter different chnnels, collision will not e possile. As shown in igure 1, if two nodes wnt to trnsmit dt simultneously. In the eginning, oth the nodes will set their cw vlue to 31, if nodes 1 nd 2 oth choose the ckoff vlue of t the sme time, then nodes 1 nd 2 will collide (oth nodes hve to doule their ckoff vlues, which mens tht the cw vlue will e set to 63). If node 1 chooses s its ckoff vlue nd node 2 chooses 63 s its ckoff vlue, then oth these nodes will e in different chnnels. When the ckoff vlue of node 1 is, node 2 will not e le to decrese its ckoff vlue progressively. At this time, the ckoff vlue of node 2 will e frozen; the node will hve to wit until node 1 complete its dt trnsmission nd then compete gin in the net round. When node 1 reselects its ckoff vlue s 31 (the ckoff vlue of node 1 is then 31, nd the ckoff vlue of node 2 is 63), node 1 will trnsmit its dt successfully fter processing 31 empty slots; then, the ckoff vlue of node 2 will ecome = 32. If node 1 gin chooses 31 s its ckoff vlue, node 1 will gin trnsmit its dt successfully fter processing those 31 empty slots; consequently, the ckoff vlue of node 2 will ecome = 1. If node 1 yet gin chooses 31 s its ckoff vlue, it will process 1 empty slot nd the ckoff vlue of node 2 will ecome. Then, node 2 will strt its dt trnsmission, nd the ckoff vlue of node 1 will ecome 31 1 = 3. By oserving the repetition of such process, we otin the following results: When the ckoff vlue of node 1 is nd the ckoff vlue of node 2 is 1, the dt trnsmission of node 1 will succeed. And in the net round, when node 1 chooses 31 s its ckoff vlue nd now the ckoff vlue of node 2 is 1. After one slot, then the ckoff vlue of node 2 is nd the ckoff vlue of node 1 is 3, the dt trnsmission of node 2 will succeed. When the ckoff vlue of node 2 is 31 nd the ckoff vlue of node 1 is 3, then oth the nodes will trnsmit dt in different chnnels without ny collision Node 1 Node (Bckoff vlue) (Bckoff vlue) Successful dt trnsmission iled dt trnsmission reeze node s reduction on ckoff vlue igure 1 Emples of two nodes.

4 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 4 of 11 etween the nodes. Therefore, fter the initil collision process nd different nodes choosing different ckoff vlues in the inomil lgorithm, ech node would enter into different chnnels to reduce the proility of collision. We then use igure 2 to illustrte the ckoff phenomenon of the inomil lgorithm. When cw is set to 31, the nodes will hve 1% proility of remining in the sme chnnel (if the ckoff vlue is or 31, then mod 31 = nd 31 mod 31 = ). When cw is set to 63, the nodes will hve 5% proility of remining in the sme chnnel (ckoff vlue is ) nd 5% chnce of switching to the net chnnel (if the ckoff vlue is 63, then 63 mod 31 = 1). When cw is set to 127, the nodes will hve 5% proility of remining in the sme chnnel (ckoff vlue is ) nd 5% chnce of switching to the net three chnnels (if the ckoff vlue is 127, then 127 mod 31 = 3); When cw is set to 255, the nodes will hve 5% proility of remining in the sme chnnel (the ckoff vlue is ) nd 5% chnce of switching to the net seven chnnels (if the ckoff vlue is 255, then 255 mod 31 = 7). When cw is set to 511, the nodes will hve 5% proility of remining in the sme chnnel (the ckoff vlue is ) nd 5% chnce of switching to the net 15 chnnels (if the ckoff vlue is 511, then 511 mod 31 = 15). When cw is set to 123, the nodes will hve 1% proility of remining in the sme chnnel (if the ckoff vlue is or 123, then mod 31 = nd 123 mod 31 = ). Therefore, the trnsition digrm of the stte cn e drwn s given in igure 2. The stte vlue of, in igure 2, illustrtes tht the node will hve 5% proility of remining in the sme chnnel nd 5% proility of switching to net chnnel(s) (31 chnnels form circultion chnnel, nd the chnnel is clculted y using the modulo method). Simultions Environmentl settings In the simultions, we use two performnce indices throughput nd conditionl collision proility with different node to ssess the performnce of ech lgorithm [12]. We define the throughput s follows [1-12]: P s pylod throughput¼ ; P i t slot þp s t success þp c t col ð2þ where P i is the proility tht slot is idle, P s is the proility tht slot trnsmits dt successfully, P c is the proility tht slot is in collision stte, pylod is the time spent to trnsmit dt, t slot is n idle slot time (SlotTime), nd t success is the time spent to trnsmit pcket successfully. Notly, t success = DATA + SIS + ACK + DIS when the lgorithm does not utilize the RTS/CTS method. urther, t col is the time spent during pcket collision. Notly, t col =DATA m + DIS when the lgorithm does not utilize the RTS/CTS method. DATA m is the mimum witing time when pcket collision occurs. The normlized throughput performnce indictor used in this study is the sme s the throughput defined y the formul shown in Eqution (2). The conditionl collision proility with different nodes, P cc, is defined s the collision proility tht node ttempts to trnsmit dt. A high P cc vlue does not men tht P c is high. or instnce, if four nodes re trnsmitting dt simultneously in the sme slot, the numer of colliding nodes with P cc is 4; however, the numer of collisions with P c is 1. In igure 3, ssume tht there re 15 slots, with the numer in slot representing the trnsmitting dt in tht slot. Thus, there re eight ville empty slots, three slots where dt re trnsmitted successfully nd four slots with dt collisions. Therefore, P s = 3/15, P c = 4/15, P i = 8/15, nd P cc =( )/( ) = 11/14. Moreover, conditionl collision proility with different node is used insted of the collision proility when node is trnsmitting dt to show the effect of pcket collision. In generl, it is difficult to detect the stte (idle, dt trnsmission, collision) of slot. This is ecuse, in wireless environment, the informtion of ech node S,,+1,+3,+7,+15, S S: Successful dt trnsmission : iled dt trnsmission igure 2 Trnsition digrm of the stte in the proposed lgorithm.

5 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 5 of 11 igure 3 Stte of virtul slot. needs to e collected nd compiled to determine whether the slot is in the idle, collision, or dt trnsmission stte nd clculte the P i, P s, nd P c vlues. However, in some cses, inconsistent informtion will pper for some nodes. or emple, node tht receives n error pcket hs to enter n EIS time, nd then, DIS time efore entering the ckoff stge. If the slot is in the usy stte when entering the ckoff stge, the node will not e le to distinguish whether this slot hs entered the EIS time. Therefore, the slot sttus of this node could e different from other nodes nd result in informtion inconsistencies etween these nodes. Becuse this phenomenon mkes it difficult to clculte the P i, P s, nd P c vlues, we cn only use the P cc vlue to represent the collision stte. We use NS2 [14] ( network simultor) s our simultion tool nd use the network environment prmeters presented in Tle 1 s simultion prmeters. Eperiments re repeted 1 times using different seeds, nd the results of these 1 runs re verged to otin the simultion results. Eperiment I: fied contention window size We fi the contention window size cw t 32 to compre the performnce of the proposed scheme with uniform distriution, s shown in igure 4 d. igure 4 represents of igure 4, nd igure 4d represents of igure 4c. igure 4 shows tht the performnce of the proposed inominl lgorithm is worse thn the uniform distriution when the is Tle 1 Simultion prmeters Dt rte 11 Mps PCLP dt rte 1 Mps Bsic rte 1 Mps Slot time 2 μs SIS 1 μs DIS 5 μs EIS SIS + DIS + (ACK length)/sic rte PHY heder 192 MAC heder 224 ACK length PHY heder CW min 32 CW m 124 Pcket size 5 B + PHY heder + MAC heder less thn 54. The proposed inomil lgorithm in igure 4 d performed poorer thn the uniform distriution due to the fied cw size. This result cn e epected ecuse the proposed inominl lgorithm hs only one chnnel. Therefore, the proposed inominl lgorithm will hve higher collision proility nd stndrd devition thn the uniform distriution. As for igure 4, the proposed inominl lgorithm will only chieve higher throughput thn the uniform distriution when the re higher thn 54. This result is cused y the effect of EIS (equivlent to 18 slots (EIS = = 364 μs) [12]), which increses the proility of incresing the numer of chnnels. Once node enters into EIS nd there re no nodes trnsmitting during this time period, the node tht entered into EIS will hve the opportunity to switch to different chnnels. Therefore, when the numer of nodes increses, the proility of nodes switching to different chnnel lso increses. Hence, the proposed inomil lgorithm chieves higher throughput thn the uniform distriution when the numer of nodes re higher thn 54. Eperiment II: comprison etween different distriutions This section compres the normlized throughput nd the conditionl collision proility for the RWBO + BEB, uniform, geometric, nd inominl distriutions for the sme men cw. The men cw for ech distriution (Tle 2) is computed in ccordnce with the RWBO + BEB(.25) [5]. igure 5 shows tht the normlized throughput nd conditionl collision proility with different nodes of the inominl ckoff lgorithm re pprently etter thn other distriutions. In prticulr, the conditionl collision proility of the inominl ckoff lgorithm is 24% smller thn other distriutions. urther, the throughput of the inominl ckoff lgorithm is 6% etter thn other distriutions. This result shows the impct of different distriutions on the network performnce. igure 5 represents of igure 5, nd igure 5d represents of igure 5c. As we cn see from igure 5,d, the smpling chnges in the proposed lgorithm is lrger thn other methods. This is ecuse the node tht uses inomil ckoff lgorithm must serch for chnnels first. As result, in the proposed lgorithm is lrger thn other methods. However, igure 5 shows tht the mimum stndrd devition for inominl is only

6 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 6 of 11 normlized throughput c.35 d.3.8 the conditionl collision proility igure 4 Normlized throughput nd conditionl collision proility with different node. () cw=cw min =cw m = 32: normlized throughput with different node. () cw=cw min =cw m = 32: stndrd devition (normlized throughput). (c) cw=cw min =cw m = 32: conditionl collision proility with different node. (d) cw=cw min =cw m = 32: stndrd devition (conditionl collision proility)..34 nd igure 5d shows tht the mimum stndrd devition for inominl is only.128. The reson for this is ecuse the inominl collision proility is lredy smll, so the chnges in smpling dt will e reltively lrger. Results presented in igure 6 re derived from igure 5. However, we re unle to eperiment with lrge mount of nodes in our simultions due to NS2 nd hrdwre (i.e., CPU, memory) constrints. Therefore, the results presented in igure 6 re produced y self-written simultion progrm. Clcultions used in this simultion progrm re sed on slot. Tht is, we ssume tht node is in success or collision stte only uses one slot time. Hence, we simply investigte the percentge of slots tht is in idle, success, or collision sttes. Ech simultion is repeted 1 times with 1,, slots, nd verge proility is clculted for ech sttes. In ddition, from the result oserved from igure 5, we cn see tht the simultion results for ll distriutions re similr ecept for the inomil distriution. Therefore, simultion conducted in Tle 2 Men of RWBO + BEB(.25) set for vrious distriutions Retrnsmitting pcket numer Men of RWBO + BEB (.25) 124 (248) (1/125) (248) (54) (1/253) (54) 2 58 (116) (1/59) (116) 3 12 (24) (1/121) (24) (488) (1/245) (488) (8184) (1/493) (8184)

7 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 7 of 11 RWBO+BEB(.25).3.3 normlized throughput RWBO+BEB(.25) c d RWBO+BEB(.25) the conditionl collision proility RWBO+BEB(.25) igure 5 Comprison of normlized throughput nd conditionl collision proility with different nodes for different distriutions. () Normlized throughput with different nodes. () Stndrd devition (normlized throughput). (c) Conditionl collision proility with different nodes. (d) Stndrd devition (conditionl collision proility). igure 6 only compres etween the inominl distriution nd the uniform distriution. igure 6 shows tht when the reches 1, in the uniform distriution, the proility of idle, success, or collision stte seems likely to tend to fied vlue of their respective. As for igure 6, when the numer of nodes reches 14 in the inominl distriution, sme phenomenon ppers to hppen erlier thn the 1 (idle) (success) (collision) 1 (idle) (success) (collision) proility proility igure 6 Comprison of the proility for different in idle, success, nd collision sttes with different distriutions. () Proility of nodes in idle, success, nd collision sttes (uniform). () Proility of nodes in idle, success, nd collision sttes (inominl).

8 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 8 of 11 Tle 3 Ech node uses CBR Trffic to set its time for sending dt, = 2, 4, 6,...,16 Node numer Strt time (s) End time (s) uniform distriution. Therefore, from igure 6 nd Eqution (2) we cn infer tht when the reches 14 in igure 5, the result of the inominl distriution my lso rrive t flt horizontl line grdully. urthermore, y compring oth igure 6,, when the reches 144 in the uniform distriution, the proility of success stte in the uniform distriution is only slightly higher thn the proility of success stte in the inominl distriution out.23. When the numer of nodes reches 6 in the uniform distriution, the proility of collision stte in the uniform distriution is only slightly higher thn the proility of collision stte in the inominl distriution out.3. Therefore, from Eqution (2), we cn infer tht when the increses, the normlized throughput in the inominl distriution will chieve etter result thn the uniform distriution. Eperiment III: chnging in simultion process with different distriutions In this eperiment, the performnce of the proposed lgorithm is evluted y chnging the in the simultions. We ssume tht the nodes trnsfer dt to ech other using CBR trffic (11 Mps). Tle 3 shows the trnsfer time for ech node. The simultion time is 7 s. When we use the prmeters for ech distriution given in Tle 2 nd the network prmeters given in Tle 3, the performnce of the proposed lgorithm is etter thn the other methods in chnging network environment (igure 7). In prticulr, the conditionl collision proility of the inominl ckoff lgorithm is 3 19% smller thn the other distriutions. In ddition, the throughput of the inominl ckoff lgorithm is slightly normlized throughput RWBO+BEB(.25) RWBO+BEB(.25) c.2 d the conditionl collision proility RWBO+BEB(.25) RWBO+BEB(.25) igure 7 Comprison of normlized throughputs nd conditionl collision proility with different nodes for different distriutions in dynmic environment. () Normlized throughput with different nodes. () Stndrd devition (normlized throughput). (c) Conditionl collision proility with different node. (d) Stndrd devition (conditionl collision proility).

9 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 9 of 11 etter ( 5%) thn the other methods. As the men cw is lrge, the performnce of the inominl ckoff lgorithm is improved slightly. This result shows the impct of different distriutions on the network performnce. igure 7 represents of igure 7, nd igure 7d represents of igure 7c. As we cn see from igure 7,d, the smpling chnges in the proposed lgorithm re similr to other methods. igure 7 shows tht the mimum stndrd devition for inominl is only.53 nd igure 7d shows tht the mimum stndrd devition for inominl is only.78. This is ecuse the numer of chnnel is 248, which is wy lrger thn the numer of node used in the eperiment. As result, the stndrd devition will e reltively low. Eperiment IV: comprison with We set the contention window size cw within the rnge cw = [cw min = 32, cw m = 124] to compre the performnce of the proposed scheme with, s shown in igure 8,c. igure 8c shows tht the proposed inominl lgorithm cn decrese the conditionl collision proility (6 39%), nd igure 8 shows tht it hs etter throughput (2 14%) thn the IEEE Thus, the inominl lgorithm cn decrese the conditionl collision proility nd gives etter throughput thn the IEEE igure 8 represents of igure 8, nd igure 8d represents of igure 8c. As we cn see from igure 8,d, the smpling chnges in the proposed lgorithm re lrger thn method. This is ecuse the node tht uses inomil ckoff lgorithm must serch for chnnels first nd the numer of chnnel is 32 where the numer of node is etween 2 nd 1. As result, in the proposed lgorithm is lrger thn method. However, igure 8 shows tht the mimum stndrd devition for inominl is only.118 nd igure 8d shows tht the mimum stndrd devition for inominl is only.365. In igure 9, the -is represents the nd the y-is represents the E[cw] vlue mesured in the normlized throughput c.4.35 d the conditionl collision proility igure 8 Normlized throughput nd conditionl collision proility. () Normlized throughput with different nodes. () Stndrd devition (normlized throughput). (c) Conditionl collision proility with different nodes. (d) Stndrd devition (conditionl collision proility).

10 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 1 of 11 igure 9 E[cw] for nd inominl method. simultion eperiment relted to the results shown in igure 8. The inominl (idel) curve represents the idel inominl results. In igure 9, the inominl (idel) curve only shows the ovious vlue chnges in E[cw] t the point where the is 32. This is ecuse cw min = 32, when there re only 31 chnnels, nd only when the is ove 32, there will e 2 or more nodes contending for one chnnel; then, only this normlized throughput c.6 d.4.5 the conditionl collision proility igure 1 Comprison of normlized throughputs nd conditionl collision proility with different nodes in dynmic environment. () Normlized throughput with different nodes. () Stndrd devition (normlized throughput). (c) Conditionl collision proility with different nodes. (d) Stndrd devition (conditionl collision proility).

11 Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 Pge 11 of 11 sitution will cuse the vlue of E[cw] to increse. rom the comprison result etween the inominl curve nd the inominl (idel) curve shown in igure 9, due to shorter eperiment time for the inominl curve, the collision tht hppens t the eginning when the nodes re serching for chnnels hs lrger influence on the incrementtion of inominl curve E[cw] vlue. Moreover, s epected, the inominl curve will ecome closer nd closer to the inominl (idel) curve s the simultion time increses. This phenomenon will lso slightly improve the performnce of the inominl method relted to the results shown in igure 8. Eperiment V: comprison with for chnging in the simultion process In this eperiment, the performnce of the proposed lgorithm is evluted y chnging the in the simultions. We ssume tht the nodes trnsfer dt to ech other using CBR trffic (11 Mps). Tle 3 lists the trnsfer time for ech node. The simultion time is 7 s. When we use the network prmeters given in Tle 3, the performnce of the proposed lgorithm is found to e etter thn the IEEE for chnging network environment (igure 1). In prticulr, the conditionl collision proility of the inominl ckoff lgorithm is 16 4% smller thn the IEEE In ddition, the throughput of the inominl ckoff lgorithm is slightly etter (4 11%) thn the IEEE Since the men cw is lrge, the performnce of the inominl ckoff lgorithm is slightly improved. Thus, the inominl lgorithm cn decrese the conditionl collision proility nd it gives etter throughput thn the IEEE igure 1 represents of igure 1, nd igure 1d represents of igure 1c. As we cn see from igure 1,d, the smpling chnges in the proposed lgorithm is lrger thn method. This is ecuse the node tht uses inomil ckoff lgorithm must serch for chnnels first nd the numer of chnnel is 32 where the numer of node is etween 8 nd 64. As result, in the proposed lgorithm is lrger thn method. However, igure 1 shows tht the mimum stndrd devition for inominl is only.13 nd igure 1d shows tht the mimum stndrd devition for inominl is only.55. The reson for this is ecuse the inominl collision proility is lredy smll, so the chnges in smpling dt will e reltively lrger. Conclusions In this rticle, we proposed novel ckoff lgorithm tht uses inominl distriution, insted of uniform distriution, to select the ckoff vlue. After the initil collision process nd fter different nodes hve chosen different ckoff vlues in the inomil lgorithm, ech node enters different chnnels to reduce the proility of collision. Simultion results showed tht the proposed lgorithm performs etter thn the IEEE lgorithm for conditionl collision proility nd normlized throughput. We pln to study the ehvior of the inomil ckoff lgorithm further s our future study nd lso pln to propose mthemticl model to nlyze the performnce of this type of lgorithm. Competing interests The uthors declre tht they hve no competing interests. Author detils 1 Deprtment of Computer Science nd Engineering, Ntionl Chung Hsing University, Tichung, Tiwn. 2 Deprtment of Mthemtics Eduction, Ntionl Tichung University of Eduction, Tichung, Tiwn. 3 Deprtment of Mngement Informtion Systems, Ntionl Chung Hsing University, Tichung, Tiwn. Received: 18 June 211 Accepted: 8 August 212 Pulished: 23 August 212 References 1. IEEE Computer Society, IEEE Stndrd 82.11: Wireless LAN Medium Access Control (MAC) nd Physicl Lyer (PHY) Specifictions (IEEE Press, New York, 1999) 2. G. Binchi, A. Di Stefno, C. Giconi, A. Scglione, L. Scli, G. Terrzzino, I. Tinnirello, Eperimentl ssessment of the ckoff ehvior of commercil IEEE network crds, in Proceedings of the Annul Joint Conference of the IEEE Computer nd Communictions Societies (INOCOM), Anchorge, Alsk, USA, My 27, pp Bich, M. Comisso, A. Dorni, A prcticl method for verifying the uniformity of the ckoff distriution in network crds, in Proceedings of IEEE Interntionl Conference on Communictions (ICC), Cpe Town, South Afric, My 21, pp Cli, M. Conti, E. Gregori, Dynmic tuning of the IEEE protocol to chieve theoreticl throughput limit. IEEE/ACM Trns. Netw. 8(6), (2) 5. L. Yun, L. Ke-Ping, Z. Wei-Ling Zho, C. Qin-Bin, A novel rndom ckoff lgorithm to enhnce the performnce of IEEE Wirel. Personl Commun. 36(1), (26) 6. H. Minooei, H. Nojumi, Performnce evlution of new ckoff method for IEEE Comput. Commun. 3(18), (27) 7. R. Bruno, M. Conti, E. Gregori, A simple protocol for the dynmic tuning of the ckoff mechnism in IEEE networks. Comput. Netw. 37(1), (21) 8. Y. Chetoui, N. Boudllh, Adjustment mechnism for the IEEE contention window: n efficient ndwidth shring scheme. Comput. Commun. 3(13), (27) 9. B.J. Kwk, N.-O. Song, L.E. Miller, Performnce nlysis of eponentil ckoff. IEEE/ACM Trns. Netw. 13(2), (25) 1. G. Binchi, I. Tinnirello, Remrks on IEEE performnce nlysis. IEEE Commun. Lett. 9(8), (25) 11. C. Hu, H. Kim, J.C. Hou, Short-term non-uniform ccess in IEEE complint WLANs: study on its impct on the sturtion performnce. Comput. Netw. 52, (28) 12. G. Binchi, Performnce nlysis of the IEEE distriuted coordintion function. IEEE J. Sel. Ares Commun. 18(3), (2) 13. J. Jeong, S. Choi, C. Kim, Achieving weighted firness etween uplink nd downlink in IEEE sed WLANs, in Proceedings of 2nd ACM Interntionl Conference on Qulity of Service in Heterogeneous Wired/Wireless Networks (QShine), Lke Vist, lorid, USA, Aug. 25, pp Network Simultor 25 Accessed 1 Oct 21 doi:1.1186/ Cite this rticle s: Kuo et l.: Performnce enhncement of IEEE using novel ckoff lgorithm. EURASIP Journl on Wireless Communictions nd Networking :274.

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

High Priority Traffic in HCF on Wireless Networks

High Priority Traffic in HCF on Wireless Networks High Priority Trffic in HC on Wireless Networks Mo Add, Amnd Pert, Gordon Erly School of Comuting, University of Portsmouth, Lion Terrce, Portsmouth, UK {mo.dd, mnd.ert, gordon.erly }@ort.c.uk Abstrct

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

EXPONENTIAL & POWER GRAPHS

EXPONENTIAL & POWER GRAPHS Eponentil & Power Grphs EXPONENTIAL & POWER GRAPHS www.mthletics.com.u Eponentil EXPONENTIAL & Power & Grphs POWER GRAPHS These re grphs which result from equtions tht re not liner or qudrtic. The eponentil

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Video-rate Image Segmentation by means of Region Splitting and Merging

Video-rate Image Segmentation by means of Region Splitting and Merging Video-rte Imge Segmenttion y mens of Region Splitting nd Merging Knur Anej, Florence Lguzet, Lionel Lcssgne, Alin Merigot Institute for Fundmentl Electronics, University of Pris South Orsy, Frnce knur.nej@gmil.com,

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific Registering s HPE Reseller Quick Reference Guide for new Prtners in Asi Pcific Registering s new Reseller prtner There re five min steps to e new Reseller prtner. Crete your Appliction Copyright 2017 Hewlett

More information

arxiv: v1 [math.co] 18 Sep 2015

arxiv: v1 [math.co] 18 Sep 2015 Improvements on the density o miml -plnr grphs rxiv:509.05548v [mth.co] 8 Sep 05 János Brát MTA-ELTE Geometric nd Algeric Comintorics Reserch Group rt@cs.elte.hu nd Géz Tóth Alréd Rényi Institute o Mthemtics,

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

A Study of Quality of Service Resource Allocation Schemes for Mobile Health

A Study of Quality of Service Resource Allocation Schemes for Mobile Health RESEARCH ARTICLE A Study of Qulity of Service Resource Alloction Schemes for Moile Helth Idris Krim nd Tr Ali Yhiy* Deprtment of Computer Science nd Engineering, University of Kurdistn Hewler, Kurdistn

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

6.3 Definite Integrals and Antiderivatives

6.3 Definite Integrals and Antiderivatives Section 6. Definite Integrls nd Antiderivtives 8 6. Definite Integrls nd Antiderivtives Wht ou will lern out... Properties of Definite Integrls Averge Vlue of Function Men Vlue Theorem for Definite Integrls

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

FastRoute: A Step to Integrate Global Routing into Placement

FastRoute: A Step to Integrate Global Routing into Placement FstRoute: A Step to Integrte Glol Routing into Plcement Min Pn nd Chris Chu Deprtment of Electricl nd Computer Engineering Iow Stte University, Ames, IA 00 Emil: {pnmin, cnchu}@istte.edu ABSTRACT Becuse

More information

Registering as an HPE Reseller

Registering as an HPE Reseller Registering s n HPE Reseller Quick Reference Guide for new Prtners Mrch 2019 Registering s new Reseller prtner There re four min steps to register on the Prtner Redy Portl s new Reseller prtner: Appliction

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

Essential Question What are some of the characteristics of the graph of a rational function?

Essential Question What are some of the characteristics of the graph of a rational function? 8. TEXAS ESSENTIAL KNOWLEDGE AND SKILLS A..A A..G A..H A..K Grphing Rtionl Functions Essentil Question Wht re some of the chrcteristics of the grph of rtionl function? The prent function for rtionl functions

More information

Slicer Method Comparison Using Open-source 3D Printer

Slicer Method Comparison Using Open-source 3D Printer IOP Conference Series: Erth nd Environmentl Science PAPER OPEN ACCESS Slicer Method Comprison Using Open-source 3D Printer To cite this rticle: M K A Mohd Ariffin et l 2018 IOP Conf. Ser.: Erth Environ.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Some necessary and sufficient conditions for two variable orthogonal designs in order 44

Some necessary and sufficient conditions for two variable orthogonal designs in order 44 University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering n Informtion Sciences 1998 Some necessry n sufficient conitions for two vrile orthogonl esigns in orer

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle Textiles nd Light ndustril Science nd Technology (TLST) Volume 3, 2014 DO: 10.14355/tlist.2014.0301.01 http://www.tlist-journl.org Anlysis of Computed Diffrction Pttern Digrm for Mesuring Yrn Twist Angle

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks

More information

AVolumePreservingMapfromCubetoOctahedron

AVolumePreservingMapfromCubetoOctahedron Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

An evolutionary approach to inter-session network coding

An evolutionary approach to inter-session network coding An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg

More information

Agenda & Reading. Class Exercise. COMPSCI 105 SS 2012 Principles of Computer Science. Arrays

Agenda & Reading. Class Exercise. COMPSCI 105 SS 2012 Principles of Computer Science. Arrays COMPSCI 5 SS Principles of Computer Science Arrys & Multidimensionl Arrys Agend & Reding Agend Arrys Creting & Using Primitive & Reference Types Assignments & Equlity Pss y Vlue & Pss y Reference Copying

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Ranking of Hexagonal Fuzzy Numbers for Solving Multi Objective Fuzzy Linear Programming Problem

Ranking of Hexagonal Fuzzy Numbers for Solving Multi Objective Fuzzy Linear Programming Problem Interntionl Journl of Computer pplictions 097 8887 Volume 8 No 8 Decemer 0 nking of egonl Fuzzy Numers Solving ulti Ojective Fuzzy Liner Progrmming Prolem jrjeswri. P Deprtment of themtics Chikknn Government

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels

Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels Dedlock-Free Fully Adptive Routing in Irregulr Networks without Virtul Chnnels Dong Xing School of Softwre Tsinghu University Beijing 100084, Chin dxing@tsinghu.edu.cn Zhigng Yu Dept. of Computer Science

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Scalability of Wireless ad hoc Networks by Simulation

Scalability of Wireless ad hoc Networks by Simulation Pper #135 Sclility of Wireless d hoc Networks y Simultion John S. Osmundson Deprtments of Informtion Sciences nd Systems Engineering Nvl Postgrdute School 1 University Circle onterey, C 93943-5000 josmundson@nps.nvy.mil

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information