Computer Networks Framing
|
|
- Tracy Sutton
- 7 years ago
- Views:
Transcription
1 Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial layer and the detail of how ommuniation signals are sent and reeived. In doing so, we are simply going to assume (a orret assumption) that we are apable of sending bits over a single link. Using this abstration, the DLC layer beomes responsible for reliable transmission of pakets over a single link. Reliable transmission of pakets means that every paket is delivered one, only one, without errors, and in order. To ahieve this goal, the DLC layer performs three operations: Framing: determines start and end of pakets (all we see is a string of bits) and their order by inserting paket headers Error detetion: determines when errors exist using paket trailers Error orretion: retransmits pakets ontaining errors 2 Framing The main problem is to deide where suessive pakets start and end. Therefore, the DLC enapsulates the paket into a frame by adding its own header and trailer. header paket trailer frame Figure : From paket to frame Moreover, if there is a period of idle fills between suessive frames (a synhronous bit pipe keeps on sending even if there is no data), it beomes also neessary to separate
2 idle fills from frames. Even when idle fills are replaed by dead periods (intermittent bit pipe), the problem is not simplified, beause often there are no dead periods. For instane, where is the data in the following string of bits: Charater based framing Charater based odes, suh as ASCII (7 bits and parity bit), provide binary representation for keyboard haraters and terminal ontrol haraters. The idea in harater based framing is that suh odes an also provide representation for various ommuniation haraters: SYN: a string of SYN haraters provide idle fill between frames when a sending DLC has no data to send (but a synhronous modem requires bits) STX: start of text ETX: end of text frame SYN SYN STX header paket ETX CRC SYN SYN trailer added by DLC for error detetion (later) Figure 2: Charater based frame One disadvantage of harater based framing is that the frame must ontain an integer number of haraters; otherwise, the haraters annot be read orretly. This also raises a question: how do we send binary data? For instane, a paket is a binary string of arbitrary length. Even more important is that a paket may possibly ontain, say the ETX harater, whih ould be wrongly interpreted as end of frame. To solve these problems, a speial ontrol harater DLE (Data Link Esape) is inserted before any intentional use of the ommuniation ontrol haraters. The DLE harater is not inserted before the possible appearane of these haraters as part of the binary data. Of ourse this raises another question: what if DLE itself appears in the data? Well, then we an insert a DLE before eah appearane of DLE in the data. For example DLE ETX (but not DLE DLE ETX) is end of frame, and DLE DLE ETX (but not DLE DLE DLE ETX) is DLE ETX in the data. frame SYN SYN DLE STX header paket DLE ETX CRC SYN SYN Figure 3: The DLE esape harater Charater based framing adds too muh overhead; for instane, at least 6 haraters/paket need to be added for synhronous bit pipes: SYN SYN DLE STX... DLE ETX. This was the primary framing method from 960 to 975, e.g. ARPANET.
3 2.2 Length field The basi problem as seen so far is to inform the reeiving DLC where eah idle fill ends and where eah frame ends. In priniple, an idle fill is easy to identify beause it is represented by a fixed string. The end of a frame, however, is harder to indiate beause the frame onsists of arbitrary and unknown bit string. Therefore, one solution is to inlude a length field of ertain number of bits in the header (e.g. DECNET). length Idle fill paket CRC Idle fill header paket CRC header Figure 4: Length field in header As it an be seen from the above figure, one synhronized, DLC an always tell where the next frame starts. However, one drawbak of this tehnique is the diffiulty to reover from errors in the length field; for instane, a resynhronization is needed after suh an error. Another drawbak of this tehnique is that the length field restrits the paket size; the length field must ontain at least log 2 MaxF ramesize + bits (that s the overhead). Therefore, if L is the size of the length field in bits, then L > log 2 MaxF ramesize and MaxF ramesize < 2 L bits. 2.3 Fixed length pakets/frames In networks with fixed length pakets, the length field is impliit (not needed) beause all pakets (and hene frames) have the same size. An example of suh networks is ATM, where all pakets are 53 bytes long. This framing tehnique requires synhronization upon initialization. Another drawbak is that message length often not a multiple of paket size. In this ase, the last paket of the message will ontain idle fills (what happens to the overhead?) 2.4 Bit oriented framing In harater based framing, DLE ETX indiates the end of the frame, and it is avoided within the frame itself by doubling eah DLE harater in the data. In bit oriented framing, a speial binary flag indiates the end of the frame, and it is avoided within the frame itself by using a tehnique alled bit stuffing. Therefore, the onept is the same, but the main differene is that a flag, unlike DLE ETX, an be of any length (later we see how to set that length to minimize the overhead). Standard protools use 00 as the binary flat, we denote it by The same flag an be used to indiate the start of the frame Standard DLCs have also an abort apability in whih a frame an be aborted by sending seven or more onseutive s (5 onseutive s mean the link is idle). Therefore, 0, i.e. 0 6 is the atual bit string that must be avoided in the data by bit stuffing.
4 Bit stuffing was invented by IBM in 970, and works as follows: The sender DLC inserts (stuffs) a 0 after eah appearane of five onseutive s, and appends the flag (without stuffing) at the end of the frame. The reeiver DLC deletes the first 0 after eah string of five onseutive s. If six onseutive s are seen, this is interpreted as the end of the frame. stuffed bits Figure 5: Bit stuffing Something to think about: whih ones of the above stuffed bits an be avoided (provided the reeiver s rule for deleting stuffed bits is hanged aordingly)? Assume that the flag has the pattern 0 j 0. How long should the flag be. Let us onsider the overhead. On one hand, if j inreases, we have less stuffing but a longer flag. On the other hand, if j dereases, we have more stuffing but a shorter flag. For the sake of our analysis, let us assume a random string of bits with p(0) = p() = /2. Therefore, insertion after the i th bit ours with probability (/2) j. 0. {{.. j Also another type of insertion after the i th bit ours with probability (/2) 2j 0. {{... {{.. j j Sine (/2) 2j << (/2) j, we an ignore suh event and events of insertion due to yet longer strings of s. The probability of stuffing after the i th bit is approximately 2 j, whih is also E[# stuffed i], the expeted number of insertions after the i th bit. By the linearity of expetation, E[# stuffed bits K] K2 j (be areful at boundary), where K is the length of the frame. Therefore, E[# stuffed bits] = E[K]2 j E[overhead] = E[K]2 j + j + 2 {{ {{ stuffed flag
5 Minimizing with respet to j, we need smallest j suh that E[K]2 j + j + 2 < E[K]2 (j+) + (j + ) + 2 j j + Figure 6: Minimizing overhead E[k]2 (j+) < The smallest j that satisfies the above inequality is j = log 2 E[k]. We an show that (homework?): log 2 E[K] E[overhead] log 2 E[K] What is the best overhead? Length field based framing and bit oriented framing are omparable in their overhead, log 2 K where K is the length of the frame. Can we do better? Information theory tells us NO. Essentially, we are enoding information about the length of the frame at the sending DLC and transmitting it to the reeiving DLC. At least we need a number of bits equal to the entropy H = K max k= p(k) log 2 p(k) When distribution is uniform, i.e. p =, H = log Maximum paket size Reall that the transport layer is the one responsible for breaking messages into pakets. So how should the transport layer hoose the maximum paket size? Pratially speaking, this is not a big deal sine IP fragments pakets further if neessary. Usually paket size is about 500 bytes (from Ethernet). But theoretially speaking, for a given overhead of V bits, what is the best maximum paket size? Let M be the message length. Then we have M + M V
6 bits to send V V V Rest V M The overhead per message is V. If inreases, we have a small overhead per message; therefore, less bits to transmit. But sine the message might need to traverse many links, a larger paket size may result in a slower delivery time, beause eah intermediate node must wait until it ompletely reeives a paket before relaying it. reeiver j sender Figure 7: Traversing links This additional total waiting time an be omputed as: ( + V )(j ) where is the apaity of a link in bps (bandwidth). Therefore, small overhead per message, larger wait bigger overhead, but smaller wait Whih value of ahieves the best tradeoff? Let us minimize the time to deliver the message. The time needed for the message to traverse j links is: (Kmax + V )(j ) T = + M + M V + P + Q where P and Q are the propagation delay and the queuing delay respetively. Therefore, the expeted value of T is approximately given by: (Kmax + V )(j ) E[T ] = + and we need to minimize E[M] + E[M] V + P + Q (j ) + E[M] V By taking the first derivative with respet to and setting it to zero, we get E[M]V = j Referenes Dimitri Bertsekas and Robert Gallager, Data Networks Larry Peterson and Brue Davie, Computer Networks: A Systems Approah
Sebastián Bravo López
Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that
More informationChannel Assignment Strategies for Cellular Phone Systems
Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious
More informationStatic Fairness Criteria in Telecommunications
Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi
More informationarxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA
LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationChapter 1 Microeconomics of Consumer Theory
Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some
More information5.2 The Master Theorem
170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended
More informationHierarchical Clustering and Sampling Techniques for Network Monitoring
S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are
More informationComputer Networks Network architecture
Computer Networks Network architecture Saad Mneimneh Computer Science Hunter College of CUNY New York - Networks are like onions - They stink? - Yes, no, they have layers Shrek and Donkey 1 Introduction
More informationDecimal numbers. Chapter
Chapter 6 Deimal numbers Contents: A B C D E F G H I Plae value Ordering deimal numbers Adding and subtrating deimal numbers Multiplying and dividing by powers of 0 Multiplying deimal numbers Dividing
More informationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401
IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,
More informationWeighting Methods in Survey Sampling
Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter
More informationWireless Transmission Systems. Instructor
Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,
More informationPerformance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19
More information1.3 Complex Numbers; Quadratic Equations in the Complex Number System*
04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x
More informationClassical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk
Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples
More informationChapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112
More informationCapacity at Unsignalized Two-Stage Priority Intersections
Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways
More informationDispersion in Optical Fibres
Introdution Optial Communiations Systems Dispersion in Optial Fibre (I) Dispersion limits available bandwidth As bit rates are inreasing, dispersion is beoming a ritial aspet of most systems Dispersion
More informationOperating Systems and Computer Networks / Datenverarbeitung 2 / Data Processing 2
Computer Networks / Datenverarbeitung 2 / Data Processing 2 Exercise 7: Network Transmission & Code Efficiency Faculty of Question 7.1 Code Efficiency Block Length S S S Y Y O N N H 5 characters S T X
More informationA Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T
9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth
More informationProgramming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html
CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.
More informationA Comparison of Service Quality between Private and Public Hospitals in Thailand
International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor
More informationFOOD FOR THOUGHT Topical Insights from our Subject Matter Experts
FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene
More informationHow To Fator
CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems
More informationA Keyword Filters Method for Spam via Maximum Independent Sets
Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2
More informationCIS570 Lecture 4 Introduction to Data-flow Analysis 3
Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to
More informationUNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE
UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationDSP-I DSP-I DSP-I DSP-I
DSP-I DSP-I DSP-I DSP-I Digital Signal Proessing I (8-79) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:
More informationFindings and Recommendations
Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants
More informationOpen and Extensible Business Process Simulator
UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,
More information10.1 The Lorentz force law
Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been
More informationUSA Mathematical Talent Search. PROBLEMS / SOLUTIONS / COMMENTS Round 3 - Year 12 - Academic Year 2000-2001
USA Mathematial Talent Searh PROBLEMS / SOLUTIONS / COMMENTS Round 3 - Year - Aademi Year 000-00 Gene A. Berg, Editor /3/. Find the smallest positive integer with the property that it has divisors ending
More informationAngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction
AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros
More informationAsymmetric Error Correction and Flash-Memory Rewriting using Polar Codes
1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes
More informationImpedance Method for Leak Detection in Zigzag Pipelines
10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria
More informationDeadline-based Escalation in Process-Aware Information Systems
Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands
More informationTHE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES
Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess
More informationTrade Information, Not Spectrum: A Novel TV White Space Information Market Model
Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,
More informationDataflow Features in Computer Networks
Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department
More informationBig Data Analysis and Reporting with Decision Tree Induction
Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,
More informationIsaac Newton. Translated into English by
THE MATHEMATICAL PRINCIPLES OF NATURAL PHILOSOPHY (BOOK 1, SECTION 1) By Isaa Newton Translated into English by Andrew Motte Edited by David R. Wilkins 2002 NOTE ON THE TEXT Setion I in Book I of Isaa
More information) ( )( ) ( ) ( )( ) ( ) ( ) (1)
OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples
More informationApplied Data Communication Lecture 14
Applied Data Communication Lecture 14 Character oriented Data Link Character-oriented data link control Asynchronous Synchronous Kristjan Sillmann reaalajasüsteemide õppetool TTÜ automaatikainstituut character-oriented
More informationIn this chapter, we ll see state diagrams, an example of a different way to use directed graphs.
Chapter 19 State Diagrams In this hapter, we ll see state diagrams, an example of a different way to use direted graphs. 19.1 Introdution State diagrams are a type of direted graph, in whih the graph nodes
More informationSuggested Answers, Problem Set 5 Health Economics
Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all
More informationData Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationImproved SOM-Based High-Dimensional Data Visualization Algorithm
Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang
More informationcos t sin t sin t cos t
Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the
More informationFixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb
Fixed-inome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates
More informationOpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1
OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements
More informationSupply chain coordination; A Game Theory approach
aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université
More informationi_~f e 1 then e 2 else e 3
A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms
More informationRobust Classification and Tracking of Vehicles in Traffic Video Streams
Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams
More informationSOFTWARE ENGINEERING I
SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation
More informationPetri nets for the verification of Ubiquitous Systems with Transient Secure Association
Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando Rosa-Velardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid
More informationOptimal Sales Force Compensation
Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the
More informationWORKFLOW CONTROL-FLOW PATTERNS A Revised View
WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au
More informationRecovering Articulated Motion with a Hierarchical Factorization Method
Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu
More informationIntuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com
Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of
More information4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT
4.15 USNG METEOSAT SECOND GENEATON HGH ESOLUTON VSBLE DATA FO THE MPOVEMENT OF THE APD DEVELOPPNG THUNDESTOM PODUCT Oleksiy Kryvobok * Ukrainian HydroMeteorologial nstitute Kyiv, Ukraine Stephane Senesi
More informationUnderstanding SAE J1939. by Simma Software, Inc.
Understanding SAE J1939 by Simma Software, Inc. Contact E-mail: jrsimma at simmasoftware dot com Phone: 888-256-3828 For J1939 source code, see J1939 Software Starting Notes Ask questions anytime. This
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More information3 Game Theory: Basic Concepts
3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and
More informationRetirement Option Election Form with Partial Lump Sum Payment
Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option
More informationUser s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities
File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationINCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS
Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online
More informationA Holistic Method for Selecting Web Services in Design of Composite Applications
A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,
More informationAn Enhanced Critical Path Method for Multiple Resource Constraints
An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities
More informationSolving the Game of Awari using Parallel Retrograde Analysis
Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationElectrician'sMathand BasicElectricalFormulas
Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial
More informationPrice-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate
Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationAvailability, Reliability, Maintainability, and Capability
Availability, Reliability, Maintainability, and Capability H. Paul Barringer, P.E. Barringer & Assoiates, In. Humble, TX Triplex Chapter Of The Vibrations Institute Hilton Hotel Beaumont, Texas February
More informationWorking with the IFS in RPG IV. Scott Klement
Working with the IFS in RPG IV Sott Klement Working with the IFS in RPG IV by Sott Klement This ebook is intended to help an experiened RPG IV programmer learn how to read, write and manipulate douments
More informationSoft-Edge Flip-flops for Improved Timing Yield: Design and Optimization
Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of
More informationRESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism
RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS Shool of Publi Poliy The University of Mihigan Ann Arbor, Mihigan 48109-1220 Disussion Paper No. 475 The Evolution and Utilization of the GATT/WTO Dispute Settlement
More informationChapter 5 Single Phase Systems
Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude
More informationAUDITING COST OVERRUN CLAIMS *
AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationDATA COMMUNICATION (Basics of data communication, OSI layers.)
DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code
More informationINCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS
Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File
More informationVOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR. A Thesis by. Hong-Tuan Nguyen Vu
VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR A Thesis by Hong-Tuan Nguyen Vu Eletrial Engineer, Polytehni University of HCMC, 1993 Submitted to the College of
More informationBayes Bluff: Opponent Modelling in Poker
Bayes Bluff: Opponent Modelling in Poker Finnegan Southey, Mihael Bowling, Brye Larson, Carmelo Piione, Neil Burh, Darse Billings, Chris Rayner Department of Computing Siene University of Alberta Edmonton,
More informationA Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems
A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition
More informationTo the Graduate Council:
o the Graduate Counil: I am submitting herewith a dissertation written by Yan Xu entitled A Generalized Instantaneous Nonative Power heory for Parallel Nonative Power Compensation. I have examined the
More informationSignalling Control System Serial Train Information Interface
Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for
More informationIn order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method
BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight
More informationOptimal Online Buffer Scheduling for Block Devices *
Optimal Online Buffer Sheduling for Blok Devies * ABSTRACT Anna Adamaszek Department of Computer Siene and Centre for Disrete Mathematis and its Appliations (DIMAP) University of Warwik, Coventry, UK A.M.Adamaszek@warwik.a.uk
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationPattern Recognition Techniques in Microarray Data Analysis
Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu
More informationFIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero
FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University
More informationA Reputation Management Approach for Resource Constrained Trustee Agents
A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More information