Computer Networks Framing


 Tracy Sutton
 2 years ago
 Views:
Transcription
1 Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial layer and the detail of how ommuniation signals are sent and reeived. In doing so, we are simply going to assume (a orret assumption) that we are apable of sending bits over a single link. Using this abstration, the DLC layer beomes responsible for reliable transmission of pakets over a single link. Reliable transmission of pakets means that every paket is delivered one, only one, without errors, and in order. To ahieve this goal, the DLC layer performs three operations: Framing: determines start and end of pakets (all we see is a string of bits) and their order by inserting paket headers Error detetion: determines when errors exist using paket trailers Error orretion: retransmits pakets ontaining errors 2 Framing The main problem is to deide where suessive pakets start and end. Therefore, the DLC enapsulates the paket into a frame by adding its own header and trailer. header paket trailer frame Figure : From paket to frame Moreover, if there is a period of idle fills between suessive frames (a synhronous bit pipe keeps on sending even if there is no data), it beomes also neessary to separate
2 idle fills from frames. Even when idle fills are replaed by dead periods (intermittent bit pipe), the problem is not simplified, beause often there are no dead periods. For instane, where is the data in the following string of bits: Charater based framing Charater based odes, suh as ASCII (7 bits and parity bit), provide binary representation for keyboard haraters and terminal ontrol haraters. The idea in harater based framing is that suh odes an also provide representation for various ommuniation haraters: SYN: a string of SYN haraters provide idle fill between frames when a sending DLC has no data to send (but a synhronous modem requires bits) STX: start of text ETX: end of text frame SYN SYN STX header paket ETX CRC SYN SYN trailer added by DLC for error detetion (later) Figure 2: Charater based frame One disadvantage of harater based framing is that the frame must ontain an integer number of haraters; otherwise, the haraters annot be read orretly. This also raises a question: how do we send binary data? For instane, a paket is a binary string of arbitrary length. Even more important is that a paket may possibly ontain, say the ETX harater, whih ould be wrongly interpreted as end of frame. To solve these problems, a speial ontrol harater DLE (Data Link Esape) is inserted before any intentional use of the ommuniation ontrol haraters. The DLE harater is not inserted before the possible appearane of these haraters as part of the binary data. Of ourse this raises another question: what if DLE itself appears in the data? Well, then we an insert a DLE before eah appearane of DLE in the data. For example DLE ETX (but not DLE DLE ETX) is end of frame, and DLE DLE ETX (but not DLE DLE DLE ETX) is DLE ETX in the data. frame SYN SYN DLE STX header paket DLE ETX CRC SYN SYN Figure 3: The DLE esape harater Charater based framing adds too muh overhead; for instane, at least 6 haraters/paket need to be added for synhronous bit pipes: SYN SYN DLE STX... DLE ETX. This was the primary framing method from 960 to 975, e.g. ARPANET.
3 2.2 Length field The basi problem as seen so far is to inform the reeiving DLC where eah idle fill ends and where eah frame ends. In priniple, an idle fill is easy to identify beause it is represented by a fixed string. The end of a frame, however, is harder to indiate beause the frame onsists of arbitrary and unknown bit string. Therefore, one solution is to inlude a length field of ertain number of bits in the header (e.g. DECNET). length Idle fill paket CRC Idle fill header paket CRC header Figure 4: Length field in header As it an be seen from the above figure, one synhronized, DLC an always tell where the next frame starts. However, one drawbak of this tehnique is the diffiulty to reover from errors in the length field; for instane, a resynhronization is needed after suh an error. Another drawbak of this tehnique is that the length field restrits the paket size; the length field must ontain at least log 2 MaxF ramesize + bits (that s the overhead). Therefore, if L is the size of the length field in bits, then L > log 2 MaxF ramesize and MaxF ramesize < 2 L bits. 2.3 Fixed length pakets/frames In networks with fixed length pakets, the length field is impliit (not needed) beause all pakets (and hene frames) have the same size. An example of suh networks is ATM, where all pakets are 53 bytes long. This framing tehnique requires synhronization upon initialization. Another drawbak is that message length often not a multiple of paket size. In this ase, the last paket of the message will ontain idle fills (what happens to the overhead?) 2.4 Bit oriented framing In harater based framing, DLE ETX indiates the end of the frame, and it is avoided within the frame itself by doubling eah DLE harater in the data. In bit oriented framing, a speial binary flag indiates the end of the frame, and it is avoided within the frame itself by using a tehnique alled bit stuffing. Therefore, the onept is the same, but the main differene is that a flag, unlike DLE ETX, an be of any length (later we see how to set that length to minimize the overhead). Standard protools use 00 as the binary flat, we denote it by The same flag an be used to indiate the start of the frame Standard DLCs have also an abort apability in whih a frame an be aborted by sending seven or more onseutive s (5 onseutive s mean the link is idle). Therefore, 0, i.e. 0 6 is the atual bit string that must be avoided in the data by bit stuffing.
4 Bit stuffing was invented by IBM in 970, and works as follows: The sender DLC inserts (stuffs) a 0 after eah appearane of five onseutive s, and appends the flag (without stuffing) at the end of the frame. The reeiver DLC deletes the first 0 after eah string of five onseutive s. If six onseutive s are seen, this is interpreted as the end of the frame. stuffed bits Figure 5: Bit stuffing Something to think about: whih ones of the above stuffed bits an be avoided (provided the reeiver s rule for deleting stuffed bits is hanged aordingly)? Assume that the flag has the pattern 0 j 0. How long should the flag be. Let us onsider the overhead. On one hand, if j inreases, we have less stuffing but a longer flag. On the other hand, if j dereases, we have more stuffing but a shorter flag. For the sake of our analysis, let us assume a random string of bits with p(0) = p() = /2. Therefore, insertion after the i th bit ours with probability (/2) j. 0. {{.. j Also another type of insertion after the i th bit ours with probability (/2) 2j 0. {{... {{.. j j Sine (/2) 2j << (/2) j, we an ignore suh event and events of insertion due to yet longer strings of s. The probability of stuffing after the i th bit is approximately 2 j, whih is also E[# stuffed i], the expeted number of insertions after the i th bit. By the linearity of expetation, E[# stuffed bits K] K2 j (be areful at boundary), where K is the length of the frame. Therefore, E[# stuffed bits] = E[K]2 j E[overhead] = E[K]2 j + j + 2 {{ {{ stuffed flag
5 Minimizing with respet to j, we need smallest j suh that E[K]2 j + j + 2 < E[K]2 (j+) + (j + ) + 2 j j + Figure 6: Minimizing overhead E[k]2 (j+) < The smallest j that satisfies the above inequality is j = log 2 E[k]. We an show that (homework?): log 2 E[K] E[overhead] log 2 E[K] What is the best overhead? Length field based framing and bit oriented framing are omparable in their overhead, log 2 K where K is the length of the frame. Can we do better? Information theory tells us NO. Essentially, we are enoding information about the length of the frame at the sending DLC and transmitting it to the reeiving DLC. At least we need a number of bits equal to the entropy H = K max k= p(k) log 2 p(k) When distribution is uniform, i.e. p =, H = log Maximum paket size Reall that the transport layer is the one responsible for breaking messages into pakets. So how should the transport layer hoose the maximum paket size? Pratially speaking, this is not a big deal sine IP fragments pakets further if neessary. Usually paket size is about 500 bytes (from Ethernet). But theoretially speaking, for a given overhead of V bits, what is the best maximum paket size? Let M be the message length. Then we have M + M V
6 bits to send V V V Rest V M The overhead per message is V. If inreases, we have a small overhead per message; therefore, less bits to transmit. But sine the message might need to traverse many links, a larger paket size may result in a slower delivery time, beause eah intermediate node must wait until it ompletely reeives a paket before relaying it. reeiver j sender Figure 7: Traversing links This additional total waiting time an be omputed as: ( + V )(j ) where is the apaity of a link in bps (bandwidth). Therefore, small overhead per message, larger wait bigger overhead, but smaller wait Whih value of ahieves the best tradeoff? Let us minimize the time to deliver the message. The time needed for the message to traverse j links is: (Kmax + V )(j ) T = + M + M V + P + Q where P and Q are the propagation delay and the queuing delay respetively. Therefore, the expeted value of T is approximately given by: (Kmax + V )(j ) E[T ] = + and we need to minimize E[M] + E[M] V + P + Q (j ) + E[M] V By taking the first derivative with respet to and setting it to zero, we get E[M]V = j Referenes Dimitri Bertsekas and Robert Gallager, Data Networks Larry Peterson and Brue Davie, Computer Networks: A Systems Approah
Sebastián Bravo López
Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that
More informationChannel Assignment Strategies for Cellular Phone Systems
Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious
More informationRelativity Worked Solutions
Physis Option Problems  Relativisti Addition of Veloities (from Gianoli 6 th edition 43. (I A person on a roket traveling at.5 (with respet to the Earth observes a meteor ome from behind and pass her
More informationStatic Fairness Criteria in Telecommunications
Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, email: vesatimonen@hutfi
More informationRestricted Least Squares, Hypothesis Testing, and Prediction in the Classical Linear Regression Model
Restrited Least Squares, Hypothesis Testing, and Predition in the Classial Linear Regression Model A. Introdution and assumptions The lassial linear regression model an be written as (1) or (2) where xt
More informationarxiv:astroph/0304006v2 10 Jun 2003 Theory Group, MS 50A5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA
LBNL52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astroph/0304006v2 10 Jun 2003 Theory Group, MS 50A5101 Lawrene Berkeley National Laboratory
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationChapter 1 Microeconomics of Consumer Theory
Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deisionmakers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some
More informationHierarchical Clustering and Sampling Techniques for Network Monitoring
S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are
More informationChapter 38A  Relativity. A PowerPoint Presentation by Paul E. Tippens, Professor of Physics Southern Polytechnic State University
Chapter 38A  Relativity A PowerPoint Presentation by Paul E. Tippens, Professor of Physis Southern Polytehni State University 27 Objetives: After ompleting this module, you should be able to: State and
More information5.2 The Master Theorem
170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended
More informationTELECOMMUNICATION SYSTEMS AND TECHNOLOGIES Vol. I  Analog and Digital Transmission of Data  Simon Haykin ANALOG AND DIGITAL TRANSMISSION OF DATA
ANALOG AND DIGITAL TRANSMISSION OF DATA Simon MMaster University, Canada Keywords: Modulation and demodulation, Coherent detetion, Amplitude modulation, Double sidebandsuppressed arrier modulation, Single
More informationComputer Networks Network architecture
Computer Networks Network architecture Saad Mneimneh Computer Science Hunter College of CUNY New York  Networks are like onions  They stink?  Yes, no, they have layers Shrek and Donkey 1 Introduction
More informationSequences CheatSheet
Sequenes CheatSheet Intro This heatsheet ontains everything you should know about real sequenes. It s not meant to be exhaustive, but it ontains more material than the textbook. Definitions and properties
More informationDecimal numbers. Chapter
Chapter 6 Deimal numbers Contents: A B C D E F G H I Plae value Ordering deimal numbers Adding and subtrating deimal numbers Multiplying and dividing by powers of 0 Multiplying deimal numbers Dividing
More informationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401
IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,
More informationWeighting Methods in Survey Sampling
Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiaohih Chang Ferry Butar Butar Abstrat It is said that a welldesigned survey an best prevent nonresponse. However, no matter
More informationAn Iterated Beam Search Algorithm for Scheduling Television Commercials. Mesut Yavuz. Shenandoah University
0080569 An Iterated Beam Searh Algorithm for Sheduling Television Commerials Mesut Yavuz Shenandoah University The Harry F. Byrd, Jr. Shool of Business Winhester, Virginia, U.S.A. myavuz@su.edu POMS 19
More informationCHAPTER 14 Chemical Equilibrium: Equal but Opposite Reaction Rates
CHATER 14 Chemial Equilibrium: Equal but Opposite Reation Rates 14.1. Collet and Organize For two reversible reations, we are given the reation profiles (Figure 14.1). The profile for the onversion of
More informationWireless Transmission Systems. Instructor
Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes  Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,
More informationLecture 5. Gaussian and GaussJordan elimination
International College of Eonomis and Finane (State University Higher Shool of Eonomis) Letures on Linear Algebra by Vladimir Chernyak, Leture. Gaussian and GaussJordan elimination To be read to the musi
More informationClassical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk
Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples
More informationSpecial Relativity and Linear Algebra
peial Relativity and Linear Algebra Corey Adams May 7, Introdution Before Einstein s publiation in 95 of his theory of speial relativity, the mathematial manipulations that were a produt of his theory
More informationDispersion in Optical Fibres
Introdution Optial Communiations Systems Dispersion in Optial Fibre (I) Dispersion limits available bandwidth As bit rates are inreasing, dispersion is beoming a ritial aspet of most systems Dispersion
More informationProgramming Basics  FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html
CWCS Workshop May 2005 Programming Basis  FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.
More informationChapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112
More informationPerformance Analysis of IEEE 802.11 in Multihop Wireless Networks
Performane Analysis of IEEE 80.11 in Multihop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 11 Asahidai, Nomi, Ishikawa, 9319
More informationCapacity at Unsignalized TwoStage Priority Intersections
Capaity at Unsignalized TwoStage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minorstreet traffi movements aross major divided fourlane roadways
More informationA Keyword Filters Method for Spam via Maximum Independent Sets
Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2
More information1.3 Complex Numbers; Quadratic Equations in the Complex Number System*
04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x  2x  22 x  2 2 ; x
More informationINTRODUCTION.
"Explaining the Illusion of the Constant Veloity of Light." Paul Marmet 401 Ogilvie Road, Glouester, Ontario, Canada K1J 7N4 EMail: Paul.Marmet@Ottawa.om ABSTRACT. Considering that photons travel at the
More informationOperating Systems and Computer Networks / Datenverarbeitung 2 / Data Processing 2
Computer Networks / Datenverarbeitung 2 / Data Processing 2 Exercise 7: Network Transmission & Code Efficiency Faculty of Question 7.1 Code Efficiency Block Length S S S Y Y O N N H 5 characters S T X
More informationA Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T
9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth
More informationFOOD FOR THOUGHT Topical Insights from our Subject Matter Experts
FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene
More informationA Comparison of Service Quality between Private and Public Hospitals in Thailand
International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor
More informationExploiting Relative Addressing and Virtual Overlays in Ad Hoc Networks with Bandwidth and Processing Constraints
Exploiting Relative Addressing and Virtual Overlays in Ad Ho Networks with Bandwidth and Proessing Constraints Maro Aurélio Spohn Computer Siene Department University of California at Santa Cruz Santa
More informationCooperative Search and Nogood Recording
Cooperative Searh and Nogood Reording Cyril Terrioux LSS  Equipe NCA (LM) 39 rue JoliotCurie F1343 Marseille Cedex 13 (Frane) email: terrioux@limunivmrsfr Abstrat Within the framework of onstraint
More informationCIS570 Lecture 4 Introduction to Dataflow Analysis 3
Introdution to Dataflow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative dataflow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to
More informationchapter > Make the Connection Factoring CHAPTER 4 OUTLINE Chapter 4 :: Pretest 374
CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems
More informationSymmetric Subgame Perfect Equilibria in Resource Allocation
Proeedings of the TwentySixth AAAI Conferene on Artifiial Intelligene Symmetri Subgame Perfet Equilibria in Resoure Alloation Ludek Cigler Eole Polytehnique Fédérale de Lausanne Artifiial Intelligene
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationTCOM 370 NOTES 997 DIGITAL DATA TRANSMISSION
TCOM 370 NOTES 997 DIGITAL DATA TRANSMISSION Synchronization and Related Topics DIGITAL DATA TRANSMISSION (BASEBAND) "Data" in general is a sequence of binary digits. It may represent a sequence of alphanumeric
More informationExponential Maps and Symmetric Transformations in ClusterSpin. YouGang Feng
Exponential Maps and Symmetri Transformations in ClusterSpin System for Lattie Ising Models YouGang Feng Department of Basi Sienes, College of Siene, Guizhou University, Caijia Guan, Guiyang, 550003
More informationExperimental demonstration of Doppler spectral broadening using the PC sound card
APPARATUS AND DEMONSTRATION NOTES Jeffrey S. Dunham, Editor Department of Physis, Middlebury College, Middlebury, Vermont 05753 This department welomes brief ommuniations reporting new demonstrations,
More informationOpen and Extensible Business Process Simulator
UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano GaríaBañuelos,
More informationNotes on Coaxial Transmission Lines
ELEC344 Mirowave Engineering Handout#4 Kevin Chen Notes on Coaxial Transmission Lines TEM Fields in Coaxial Transmission Lines Beause it is a twowire transmission line, oaxial line an support TEM waves.
More informationChapter 2 Michelson Morley Experiment and Velocity of Light
Chapter 2 Mihelson Morley Experiment and Veloity of Light 2. Attempts to Loate Speial Privileged Frame Sientists tried to determine relative veloity of light with respet to earth. For this purpose, the
More information10.1 The Lorentz force law
Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been
More informationOptical Doppler Effect in a Medium. C. H. Chang, J. H. Hsiao, and T. M. Hong
CHINESE JOURNAL OF PHYSICS VOL. 47, NO. 4 AUGUST 2009 Optial Doppler Effet in a Medium C. H. Chang, J. H. Hsiao, and T. M. Hong Department of Physis, National Tsing Hua University, Hsinhu 30043, Taiwan,
More informationUNIVERSITY AND WORKSTUDY EMPLOYERS WEB SITE USER S GUIDE
UNIVERSITY AND WORKSTUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and WorkStudy Employers
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationAngelCast: Cloudbased PeerAssisted Live Streaming Using Optimized MultiTree Construction
AngelCast: Cloudbased PeerAssisted Live Streaming Using Optimized MultiTree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros
More informationUSA Mathematical Talent Search. PROBLEMS / SOLUTIONS / COMMENTS Round 3  Year 12  Academic Year 20002001
USA Mathematial Talent Searh PROBLEMS / SOLUTIONS / COMMENTS Round 3  Year  Aademi Year 00000 Gene A. Berg, Editor /3/. Find the smallest positive integer with the property that it has divisors ending
More informationDSPI DSPI DSPI DSPI
DSPI DSPI DSPI DSPI Digital Signal Proessing I (879) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:
More informationModule 5. Carrier Modulation. Version 2 ECE IIT, Kharagpur
Module 5 Carrier Modulation Version ECE II, Kharagpur Lesson 4 Binary Phase Shift Keying (BPSK) Modulation Version ECE II, Kharagpur After reading this lesson, you will learn aout Binary Phase Shift Keying
More informationProtocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer
Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger
More informationNetwork Fundamentals
Unit 14: Network Fundamentals Learning Outomes: A andidate following a programme of learning leading to this unit will be able to: identify and desribe the funtions of eah of the seven layers of the OSI
More informationIn this chapter, we ll see state diagrams, an example of a different way to use directed graphs.
Chapter 19 State Diagrams In this hapter, we ll see state diagrams, an example of a different way to use direted graphs. 19.1 Introdution State diagrams are a type of direted graph, in whih the graph nodes
More informationFindings and Recommendations
Contrating Methods and Administration Findings and Reommendations Finding 91 ESD did not utilize a formal written prequalifiations proess for seleting experiened design onsultants. ESD hose onsultants
More informationMirror plane (of molecule) 2. the Coulomb integrals for all the carbon atoms are assumed to be identical. . = 0 : if atoms i and j are nonbonded.
6 Hükel Theory This theory was originally introdued to permit qualitative study of the πeletron systems in planar, onjugated hydroarbon moleules (i.e. in "flat" hydroarbon moleules whih possess a mirror
More informationAsymmetric Error Correction and FlashMemory Rewriting using Polar Codes
1 Asymmetri Error Corretion and FlashMemory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes
More informationTHE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES
Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 225, 998 Washington DC FEDSM98529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess
More informationEE 201 ELECTRIC CIRCUITS LECTURE 25. Natural, Forced and Complete Responses of First Order Circuits
EE 201 EECTRIC CIUITS ECTURE 25 The material overed in this leture will be as follows: Natural, Fored and Complete Responses of First Order Ciruits Step Response of First Order Ciruits Step Response of
More informationDeadlinebased Escalation in ProcessAware Information Systems
Deadlinebased Esalation in ProessAware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands
More informationTrade Information, Not Spectrum: A Novel TV White Space Information Market Model
Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,
More informationApplied Data Communication Lecture 14
Applied Data Communication Lecture 14 Character oriented Data Link Characteroriented data link control Asynchronous Synchronous Kristjan Sillmann reaalajasüsteemide õppetool TTÜ automaatikainstituut characteroriented
More information) ( )( ) ( ) ( )( ) ( ) ( ) (1)
OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples
More informationOptimal Sales Force Compensation
Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moralhazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the
More informationSupply chain coordination; A Game Theory approach
aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah JeanClaude Hennet x and Yasemin Arda xx x LI CNRUMR 668 Université
More informationChemical Equilibrium. Chemical Equilibrium. Chemical Equilibrium. Chemical Equilibriu m. Chapter 14
Chapter 14 Chemial Equilibrium Chemial Equilibriu m Muh like water in a Ushaped tube, there is onstant mixing bak and forth through the lower portion of the tube. reatants produts It s as if the forward
More informationIntuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com
Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of
More informationMedium Access Control (MAC) protocol
Medium Access ontrol (MA) protocol omputers DNS Shared medium PointtoPoint. R R. WLAN AP R LAN. Shared medium AP DNS DNS: Domain Name System Figure 1: Different components of a network The Internet consists
More informationImproved SOMBased HighDimensional Data Visualization Algorithm
Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 19138989 EISSN 19138997 Published by Canadian Center of Siene and Eduation Improved SOMBased HighDimensional Data Visualization Algorithm Wang
More informationThe Quantum Theory of Radiation
A. Einstein, Physikalishe Zeitshrift 18, 121 1917 The Quantum Theory of Radiation A. Einstein (Reeived Marh, 1917) The formal similarity of the spetral distribution urve of temperature radiation to Maxwell
More informationDataflow Features in Computer Networks
Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department
More informationFixedincome Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb
Fixedinome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates
More informationIsaac Newton. Translated into English by
THE MATHEMATICAL PRINCIPLES OF NATURAL PHILOSOPHY (BOOK 1, SECTION 1) By Isaa Newton Translated into English by Andrew Motte Edited by David R. Wilkins 2002 NOTE ON THE TEXT Setion I in Book I of Isaa
More informationData Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
More informationSwitching Circuits & Logic Design
Swithing iruits & Logi Design JieHong Roland Jiang 江介宏 Department of Eletrial Engineering National Taiwan University Fall 23 9 Multiplexers, Deoders, and Programmable Logi Devies www.miraleofthebloodandheart.om
More informationOpenScape 4000 CSTA V7 Connectivity Adapter  CSTA III, Part 2, Version 4.1. Developer s Guide A31003G9310I200176D1
OpenSape 4000 CSTA V7 Connetivity Adapter  CSTA III, Part 2, Version 4.1 Developer s Guide A31003G9310I200176 Our Quality and Environmental Management Systems are implemented aording to the requirements
More informationLectureXXI. Doppler effect & Relativistic dynamics
LetureXXI Speial Theory of Relativity Doppler effet & Relativisti dynamis The Doppler Effet: The Doppler effet of sound (in introdutory physis) is represented by an inreased frequeny of sound as a soure
More informationi_~f e 1 then e 2 else e 3
A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms
More informationRecovering Articulated Motion with a Hierarchical Factorization Method
Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at UrbanaChampaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu
More informationSOFTWARE ENGINEERING I
SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation
More informationcos t sin t sin t cos t
Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More information4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT
4.15 USNG METEOSAT SECOND GENEATON HGH ESOLUTON VSBLE DATA FO THE MPOVEMENT OF THE APD DEVELOPPNG THUNDESTOM PODUCT Oleksiy Kryvobok * Ukrainian HydroMeteorologial nstitute Kyiv, Ukraine Stephane Senesi
More informationTheory of linear elasticity. I assume you have learned the elements of linear
Physial Metallurgy Frature mehanis leture 1 In the next two letures (Ot.16, Ot.18), we will disuss some basis of frature mehanis using ontinuum theories. The method of ontinuum mehanis is to view a solid
More informationImplementation of strategic principles in cost management: Control of cost variations through statistical studies
Afrian Journal of Business Management Vol6 (45), pp 111611117, 14 November 1 Available online at http://wwwaademijournalsorg/ajbm DOI: 15897/AJBM111938 ISSN 1993833 1 Aademi Journals Full Length Researh
More informationImpedance Method for Leak Detection in Zigzag Pipelines
10.478/v1004801000360 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. LayEkuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria
More informationWORKFLOW CONTROLFLOW PATTERNS A Revised View
WORKFLOW CONTROLFLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au
More information3 Game Theory: Basic Concepts
3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and
More informationPetri nets for the verification of Ubiquitous Systems with Transient Secure Association
Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando RosaVelardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid
More informationSuggested Answers, Problem Set 5 Health Economics
Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all
More informationFrom (2) follows, if z0 = 0, then z = vt, thus a2 =?va (2.3) Then 2:3 beomes z0 = z (z? vt) (2.4) t0 = bt + b2z Consider the onsequenes of (3). A ligh
Chapter 2 Lorentz Transformations 2. Elementary Considerations We assume we have two oordinate systems S and S0 with oordinates x; y; z; t and x0; y0; z0; t0, respetively. Physial events an be measured
More information6.3 Point of View: Integrating along the yaxis
math appliation: area between urves 7 EXAMPLE 66 Find the area of the region in the first quadrant enlosed by the graphs of y =, y = ln x, and the x and yaxes SOLUTION It is easy to sketh the region
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationModeling the Constraints of Human Hand Motion
Modeling the Constraints of Human Hand Motion John Lin, Ying Wu, Thomas S. Huang Bekman Institute University of Illinois at UrbanaChampaign Urbana, IL 68 {jylin, yingwu, huang}@ifp.uiu.edu Abstrat Hand
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationOn the recoil and Doppler shifts
Journal of Modern Optis Vol. 00, No. 00, DD Month 200x, 1 5 On the reoil and Doppler shifts Stephen M. Barnett Department of Physis, SUPA, University of Strathlyde, Glasgow G4 0NG, UK and Department of
More information