Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks"

Transcription

1 Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks Niveditha Sundaram Parameswaran Ramanathan Department of Electrical Computer Engineering University of Wisconsin-Madison Madison, WI ( Abstract In this paper, we propose a method to estimate the location of a mobile user We assume that mobile users carry portable devices such as laptops or personal digital assistants equipped with off-the-shelf stard wireless interfaces The infrastructure has a few fixed nodes whose locations are assumed to be known The location estimates rely on neighborhood relationships gathered by each user through message exchanges over a wireless ad hoc network We show that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships We also compare our approach without the non-neighbor constraints with the results from a paper in literature based on the same model Empirical evaluation of our algorithm for several numerical examples are also included I INTRODUCTION There is a growing dem for supporting location-based services to mobile users These services depend on each user knowing his/her current geographic location For example, a mobile user at an airport may want a route to the nearest food court from his/her current location One possible way for a user to keep track of his/her current location is through Global Positioning System (GPS However, GPS typically works only in outdoor environments Also due to issues such as costs, form factors, energy consumption, etc, providing GPS support may not be feasible even in outdoor environments The other approach, especially in indoor environments, is to rely on ultrasound beacons to accurately localize a user [1], [2], [3], [4] These approaches rely on specialized listening hardware at the mobile user to measure the one-way propagation delay of an ultrasound pulse thereby measure the distance to the fixed beacon It has been argued that the beacons the listening devices are not very expensive [2] Despite these advantages, we contend that they are an overkill for many applications For example, mobile users in an airport may not be interested in carrying these listening devices just to accurately determine their location Therefore, in this paper, we focus on The work reported here was supported in part by US Army Research grant DAAD under a subrecipient agreement S01-24 from The Pennsylvania State University Any opinions, findings, conclusions or recommendations expressed in this publication are those of the author(s do not necessarily reflect the views of the US Army Research Office location estimation using off-the-shelf wireless hardware such as Bluetooth In particular, we assume that the mobile users carry a portable device such as a personal digital assistant (PDA or a laptop Furthermore, we assume that there are fixed devices in the infrastructure to offer a variety of services to mobile users over a wireless ad hoc network For example, an airport may deploy Bluetooth access points to provide connectivity information services to its users Our goal is to estimate each user s location using a software application running in the portable devices in the infrastructure without any specialized hardware support other than the stard wireless connectivity The closest related research is the one by Doherty et al in [] As in this paper, the scheme in [] relies exclusively on connectivity-induced constraints It uses a convex optimization based approach to estimate a node s location on a twodimensional surface The constraints in [] are solely based on neighborhood relationships In contrast, in this paper, we also consider non-neighbor relationships to reduce the estimation error The primary problem in considering non-neighbor relationships is that sometimes, physical neighbors may appear to be non-neighbors due to reasons such as poor channel quality obstruction between the users If this happens, the proposed algorithm may produce an incorrect location estimate for a user Arguably, there are applications which can tolerate occasional incorrect location estimates Also, one can use historic information about a user to detect reduce the likelihood of an incorrect estimate For applications that cannot tolerate an incorrect estimate, we also adapt our scheme to ignore nonneighbor relationships We can show that our approach, after ignoring non-neighbor relationships, is provably superior to the one in [] In fact, our approach is an iterative algorithm the solution in [] is equivalent to the result from the first iteration albeit the solution method is quite different The rest of this paper is organized as follows In Section II we formulate the problem discuss our solution Proof of correctness is given in Section III Implementation issues are discussed in Section IV Results of an empirical evaluation of our scheme are presented in Section V The paper concludes in Section VI Bluetooth is a trademark owned by TelefonaktiebolagetL M Ericsson, Sweden

2 > II PROPOSED SOLUTION The problem addressed in this paper can be stated as follows We are given a set of mobile users fixed nodes that can communicate over a wireless ad hoc network The locations of the fixed nodes are known The mobile users observe other users identify neighborhood relationships This information is used to determine the set of all possible locations for each user Our solution approach is based on the following software architecture Each mobile user runs a software client, called LocEst Client, at the application layer This client is responsible for participating in the location estimation algorithm providing the node s location estimate to other applications that need it One of the fixed nodes implements a software server called LocEst Server, that implements the proposed centralized location estimation algorithm The server interacts with the clients provides each client a location estimate of its user LocEst Client: The LocEst Client, at each node, periodically broadcasts a message of the form I am at node This message is only heard by nodes in the radio range of node The LocEst Client at node locally maintains a neighbor set which contains the nodes that are within its radio range Specifically, when node hears a message of the form I am at node, it adds node to the set Likewise, if node does not hear the I am at node message for a preset timeout period, it removes node from the set The LocEst Client periodically sends its neighbor list to the LocEst Server It also periodically queries LocEst Server to receive the current location estimate for its node LocEst Server: The LocEst Server receives the neighbor set from all the nodes Neighbor sets from different nodes can be inconsistent due to incomplete or stale information in each node s neighbor set The inconsistencies can be removed by incorporating certain implementation details in gathering the neighbor sets We discuss these issues in Section IV For now, assume that LocEst Server implements a scheme to make the neighbor sets accurate consistent That is, node belongs to node s neighbor set, if only if, it is within the radio range of node The LocEst Server then executes the algorithm shown in Figure 1 The algorithm produces a location estimation for each node Upon receiving a request from LocEst Client, the LocEst Server responds with the location estimate The basic idea of the algorithm is as follows Let denote the set of nodes whose location is exactly known The algorithm uses multiple iterations to converge on a location estimate for each node The location estimate is not a single number but, given the neighborhood relationships, it is the set of all possible locations where the node can be present If the neighbor set is accurate, Theorem 1 shows that the correct location of each node is always contained in its location estimate Let denote the location estimate of node in the iteration In line 1, the algorithm initializes for each node as follows If, then is set to the known location Otherwise, equals the entire region over which all the nodes are expected to be located In each iteration, the algorithm computes two sets,, for each node Given the current estimate of node s locations, ie,, the set contains the set Algorithm LocEst With NonNeigh 1 2 3! #%$'& if ( *,+-0/1/ + *,+-0/1/ + otherwise 4 done = FALSE 9: 6 while (done == FALSE do 7 done = TRUE 8 foreach node < 9,+-=?> 10 $ /2/4367& if ( $ /2/4867& if otherwise otherwise /1/ + >C/2/D36 /1/ + >C/2/D86 & EGFIHKJML,N*O RQEHTSH JVU L,NWO P Z[ if ( 13 done = FALSE 14 endfor endwhile then such that such that Fig 1 Proposed algorithm for location estimation exploiting non-neighbor information of all possible locations where a neighbor of can be located C6B Likewise, given, the set contains the set of all possible locations where a non-neighbor of can be located \?B After computing, is refined to obtain a new estimate The algorithm continues to iterate until the location estimates cannot be refined any further To better underst the idea in the refinement step, let us look at lines 9, 10, 11 of the algorithm in more detail Line 9 states that a neighbor of node can possibly be at location +, XP RY ]^ thus + belongs to, if there is a location > which is within the radio range of + This is because, node may be at location >, in that case, a neighbor of can be at location + Similarly, line 10 states that a non-neighbor of node can possibly be at location + only if there is a location [_B which is beyond the radio range Again, this is because node may be at location > in that case, a nonneighbor of can be at location + Z9_B Line 11 refines as follows Node can be at location +, thus +, if only if all its neighboring non-neighboring relationships allow to be at location + That is, is the intersection of all locations permitted by the neighbors non-neighbors of node Example: For simplicity, consider a one-dimensional scenario where all nodes locations are in the range %`B Suppose 9_abc%`#dec, P 96Bfgheci`\jkc that, the radio range is 1 Then, the neighbors of cannot be located in (0, 3 (90, 100 because they would be out of range from every possible location for Furthermore, the neighbors could lie in (3, 90 because there is at least one location for in (0, 7 that is within the radio range Consequently, Klhci`Mme Through similar arguments, one can show E:n%`#ce that P Now consider the non-neighbors of A non-neighbor of

3 can be located in (0, 3 (90, 100 because it is out of range from every possible location for Furthermore, the interval (3, 90 cannot be ruled out as a possible location for a nonneighbor because it is out of range for at least one location for For instance, a non-neighbor can be located at 40 because node may be located at 7 location 40 is out of range Ei`Be from 7 Thus, Finally, consider the non-neighbors of In this case, line i`mh]`c%`b 10 will determine [P &, ie, a nonneighbor of cannot be located in (30, 0 This is because every location in (30, 0 is within radio range of every possible location for Therefore, no matter where is, a nonneighbor of cannot be in (30, 0 III PROOF OF CORRECTNESS The following lemmas theorems can be proved about the algorithm in Figure 1 The proofs are shown in the Appendix Theorem 1: For all nodes, for all %`e`#n%` :, where is the true location of node The above theorem implies that correct location of each node is always contained in the location estimate determined by the proposed algorithm ' Lemma 1: If C6, then 6 Lemma 2: If, then Lemma 3: If, for some 9_, for all nodes 6B, then for all nodes B for all Theorem 2: For all nodes, %`e`#n%` The above theorem implies that the error in the location estimation is non-increasing with iteration Therefore, the proposed algorithm is guaranteed to terminate The number of iterations required to terminate can be fairly large in general However, for the numerical examples we have considered, the algorithm terminates in fewer than 1 iterations Also when it terminates, the error in location estimation is not always zero These are shown for several numerical examples in Section V IV IMPLEMENTATION ISSUES A Runtime Complexity The pseudo-code in Figure 1 is a logical description of the algorithm Direct implementation of the pseudo-code can be computationally expensive However, the runtime complexity can be substantially reduced for specific instances of the problem For example, if we assume that the nodes are located in one-dimension, then lines 9 10 can be implemented very efficiently One-dimension may be adequate for location estimation in an airport, since the corridors in the airport are often long but not wide In this case, one can represent the set as a,` ]`` V]` union of intervals, say `BX`D & Then, the following lemma can be proved bb_ Lemma 4: In the one-dimensional case, if `#V`B,` V]` `BX`i &, then R! ` ` $# `! Likewise simplifications are possible for the two-dimensional case B Incomplete Inconsistent Neighbor Sets In proving the correctness convergence of the proposed algorithm we assumed that the neighbor sets of all nodes are complete accurate In this section, we discuss some of the difficulties in satisfying this assumption how one can cope with them Inaccurate non-neighbor set: Note that, node considers node to be a neighbor only if it hears a I am at node message Otherwise, the algorithm as described in Figure 1 will treat as a non-neighbor of thus assume that are not within radio range of each other However, in practice, it is possible that are within radio range but still is unable to hear the message I am at node This can be due to factors such as poor channel quality physical obstruction between Incorrectly assuming that node is a nonneighbor of will result in wrong location estimation of the nodes, ie, the location estimation computed by the algorithm may not contain the true location of the node If the application cannot tolerate occasional location estimation errors, one can modify our algorithm to ignore nonneighbor relationships Specifically, lines 3 10 in Figure 1 can be deleted line 11 can be modified as follows 11 H JML,NWO P In the rest of this paper, we refer to this modified algorithm as Algorithm LocEst Without NonNeigh Note that, this algorithm does not rely on convex optimization techniques Furthermore, we can prove that the solution in [] is equivalent to the output from the first iteration of our algorithm Therefore from Theorem 2, it follows that Algorithm LocEst Without NonNeigh is better than the one in [] Incomplete neighbor set: The neighbor sets can be incomplete due to various reasons For example, node may belong to whereas node may not be in P This may be due to the fact that the LocEst Client at nodes send I am at node % message asynchronously without coordinating with the other nodes the LocEst Server Therefore, it is possible that node just moved into the range of node its LocEst Client sent a I am at node message heard by node However, node may not have seen the I am at node message because it may have been out of range of node when the message was last sent by If the LocEst Server runs the proposed algorithm using such inconsistent neighbor sets, the location estimates may be incorrect The LocEst Server can detect these problems rectify the situation by deleting node from putting on a new list denote &, so that is neither a neighbor nor a nonneighbor of At the same time, must also be put on & P so that is also not considered a neighbor or a non-neighbor of This may result in larger location estimation errors but the estimate will be correct Inconsistent neighbor sets: The LocEst Server does not run the location estimation algorithm continuously Also, the nodes collect the neighbor set information asynchronously only periodically As a result, there can be inconsistencies between the neighbor sets For example, at some point in time, node may have been in the radio range of node, therefore,! P Node may then have moved away

4 from node into the range of node thus P Now suppose that the LocEst Server runs the location estimation algorithm before nodes realize that they have moved out of range of each other Further suppose that the distances between the nodes are such that a node cannot simultaneously be a neighbor of both That is, it is inconsistent to have As a result of this inconsistency, the location estimation algorithm will not be able to find any possible location for (since no location can satisfy both constraints Furthermore, there is no easy way to detect that the problem is between,, because the estimates of all neighbors of,, will also be affected One possible remedy is for the LocEst Server to direct all nodes to verify the neighbor set synchronously when the algorithm fails to find a possible location for a node This can be accomplished by broadcasting a message to all LocEst Clients which in turn can trigger I am at node % from all LocEst Clients within a short time window Note that, this problem will not occur if the nodes are stationary V EVALUATION In this section, we present results from an empirical evaluation of the proposed algorithm The results are obtained from a simulation carried out as follows The parameters of the simulation correspond to an airport application The users (fixed mobile are located in a 120 meter corridor The number of fixed nodes is varied (3, 6, 12 The radio range is assumed to be 10 meters The location of the fixed nodes are such that when there are six fixed nodes each mobile user is guaranteed to be in the range of exactly one of them When there are three fixed nodes some users may not be in the range of any fixed node The location estimation errors presented here are an average obtained from 10,000 distinct runs Successive runs model a scenario where approximately 10% of the mobile users depart approximately the same number of new mobile users arrive In the first run, the location of each mobile user is chosen romly from an uniform distribution in the range (0, 120 In the subsequent runs, the locations for new mobile users are chosen as above the locations of the other mobile users are preserved Figure 2 shows a plot of the average location estimation error as a function of number of mobile users for six different cases Curves with solid lines correspond to Algorithm LocEst With NonNeigh the other three curves correspond to Algorithm LocEst Without NonNeigh For each of these algorithms, the three curves differ in the number of fixed nodes, namely 3, 6, 12 The following observations can be made from these curves As the number of mobile users increases, the average location estimation error decreases in all cases This is because our algorithms exploit the additional neighborhood relationships to reduce the location estimation errors As expected, both algorithms perform better (ie, have smaller location estimation error when the number of fixed nodes increase Algorithm LocEst With NonNeigh has considerably smaller location estimation error than Algorithm Lo- Average Location Estimation Error fixed 3 fixed 6 fixed 6 fixed 12 fixed 12 fixed Number of mobile users Fig 2 Comparison of LocEst With NonNeigh LocEst Without NonNeigh cest Without NonNeigh This shows that it is clearly beneficial to utilize non-neighborhood constraints for location estimation VI CONCLUSIONS In this paper, we presented an algorithm for estimating the location of mobile users The algorithm does not rely on special hardware such as beacons to localize a user It uses nonneighbor information to improve the accuracy of location estimation The algorithm is particularly well-suited for indoor environments where GPS capabilities are not easily available The strength of the algorithm is that the accuracy of location estimation improves when the number of mobile users increases REFERENCES [1] N Bulusu, J Heidemann, D Estrin, GPS-less low cost outdoor localization for very small devices, IEEE Personal Communications Magazine, vol 7, no, pp 28 24, October 2000 [2] N Priyanatha, A Chakraborty, H Balakrishnan, The Cricket location support system, in Proceedings of MOBICOM, Aug 2000, pp [3] P Bahl V N Padmanabhan, RADAR: An in-building RF-based user location tracking system, in Proceedings of INFOCOM, Mar 2000, pp [4] A Ward, A Jones, A Hopper, A new location technique for the active office, IEEE Personal Communications Magazine, vol 4, no, pp 42 47, October 1997 [] L Doherty, K S J Pister, L El Ghaoui, Convex position estimation in wireless sensor networks, in Proceedings of INFOCOM, Apr 2001, pp Appendix Proof of Theorem 1: From the definition of, it follows that e for all nodes (see line 1 Assume, for all nodes, [ B for some Consider any node For each, /1/ P /1/43 (see line 9 Therefore, from the definition of P [6 P P P for each

5 , /1/ P the definition of P [ B P ZP XP Likewise, for each (see line 10, /1/486 Therefore, from for each From the above two observations, The theorem follows by induction for any since for (see line 11 The theorem also holds for : for all `Mni` E C6 Proof of Lemma 1: The lemma holds trivially for any Therefore, consider Consider any + B From line 9, + B implies that there exists a > such that /1/ + >0/1/e36 [AB Since, this implies that there exists a > 4 B such that /2/ + >0/1/e36 Therefore, from line 9, + Proof of Lemma 2: The lemma holds trivially for any Therefore, consider < Consider any + From line 10, + implies that there exists a > such that /2/ + >C/2/486 ' Since, this implies that there exists a > such that /1/ + >C/1/a8 Therefore, from line 10, + Proof of Lemma 3: From Lemmas 3 2 the hypothesis, Z $: for all nodes $ Therefore, from line 11, for any $:Bf Furthermore, for any G Hence, the lemma,, Proof of Theorem 2: Consider For any \6 \ e For all, Z (see lines 9 10 Thus, for all \ \ (see line 11 Consequently, for all nodes The theorem follows from Lemma 3

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

GPS (Global positioning system) enables a device to determine

GPS (Global positioning system) enables a device to determine 1 Application of GPS to Mobile IP and Routing in Wireless Networks Mustafa Ergen,Sinem Coleri,Baris Dundar,Rahul Jain, Anuj Puri Dept. of Electrical Eng. and Computer Sci. University of California, Berkeley

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

REROUTING VOICE OVER IP CALLS BASED IN QOS

REROUTING VOICE OVER IP CALLS BASED IN QOS 1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

CS 103X: Discrete Structures Homework Assignment 3 Solutions

CS 103X: Discrete Structures Homework Assignment 3 Solutions CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering

More information

INCIDENCE-BETWEENNESS GEOMETRY

INCIDENCE-BETWEENNESS GEOMETRY INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 19, NO 3, JUNE 2011 709 Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks Mathieu Leconte, Jian Ni, Member, IEEE, R

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

PulsON RangeNet / ALOHA Guide to Optimal Performance. Brandon Dewberry, CTO

PulsON RangeNet / ALOHA Guide to Optimal Performance. Brandon Dewberry, CTO TIME DOMAIN PulsON RangeNet / ALOHA Guide to Optimal Performance Brandon Dewberry, CTO 320-0318A November 2013 4955 Corporate Drive, Suite 101, Huntsville, Alabama 35805 Phone: 256.922.9229 Fax: 256.922.0387

More information

Ad Hoc Positioning System (APS)

Ad Hoc Positioning System (APS) Ad Hoc Positioning System (APS) Dragos Niculescu and Badri Nath {dnicules, badri}@cs.rutgers.edu Computer Science Department Rutgers University Piscataway, NJ 8855 Abstract Many ad hoc network protocols

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

Hybrid cargo-level tracking system for logistics. Proceedings of the IEEE Vehicular Technology Conference. Copyright IEEE.

Hybrid cargo-level tracking system for logistics. Proceedings of the IEEE Vehicular Technology Conference. Copyright IEEE. Title Hybrid cargo-level tracking system for logistics Author(s) Yang, GH; Xu, K; Li, VOK Citation The 71st IEEE Vehicular Technology Conference (VTC2010- Spring), Taipei, Taiwan, 16-19 May 2010. In Proceedings

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Enable Location-based Services with a Tracking Framework

Enable Location-based Services with a Tracking Framework Enable Location-based Services with a Tracking Framework Mareike Kritzler University of Muenster, Institute for Geoinformatics, Weseler Str. 253, 48151 Münster, Germany kritzler@uni-muenster.de Abstract.

More information

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

SOLUTIONS TO ASSIGNMENT 1 MATH 576

SOLUTIONS TO ASSIGNMENT 1 MATH 576 SOLUTIONS TO ASSIGNMENT 1 MATH 576 SOLUTIONS BY OLIVIER MARTIN 13 #5. Let T be the topology generated by A on X. We want to show T = J B J where B is the set of all topologies J on X with A J. This amounts

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

Handout #1: Mathematical Reasoning

Handout #1: Mathematical Reasoning Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or

More information

Device Discovery in Short-Range Wireless Ad Hoc Networks

Device Discovery in Short-Range Wireless Ad Hoc Networks Device Discovery in Short-Range Wireless Ad Hoc Networks Petar Popovski Tatiana Kozlova Liljana Gavrilovska Ramjee Prasad Center for Personkommunikation, Aalborg University Fredrik Bajers Vej 7A5, DK-922

More information

Basic Proof Techniques

Basic Proof Techniques Basic Proof Techniques David Ferry dsf43@truman.edu September 13, 010 1 Four Fundamental Proof Techniques When one wishes to prove the statement P Q there are four fundamental approaches. This document

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Secure Neighbor Discovery in Wireless Sensor Networks

Secure Neighbor Discovery in Wireless Sensor Networks Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu

More information

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Ahmed E. Kosba, Ahmed Abdelkader Department of Computer Engineering Faculty of Engineering, Alexandria University, Egypt

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100 Application Note 184 Developing Wireless GPIB Test Systems Using the GPIB-ENET/100 Introduction The National Instruments GPIB-ENET/100 expands the options for size, distance, environmental conditions,

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

Bandwidth Measurement in Wireless Networks

Bandwidth Measurement in Wireless Networks Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

Page 331, 38.4 Suppose a is a positive integer and p is a prime. Prove that p a if and only if the prime factorization of a contains p.

Page 331, 38.4 Suppose a is a positive integer and p is a prime. Prove that p a if and only if the prime factorization of a contains p. Page 331, 38.2 Assignment #11 Solutions Factor the following positive integers into primes. a. 25 = 5 2. b. 4200 = 2 3 3 5 2 7. c. 10 10 = 2 10 5 10. d. 19 = 19. e. 1 = 1. Page 331, 38.4 Suppose a is a

More information

THE BANACH CONTRACTION PRINCIPLE. Contents

THE BANACH CONTRACTION PRINCIPLE. Contents THE BANACH CONTRACTION PRINCIPLE ALEX PONIECKI Abstract. This paper will study contractions of metric spaces. To do this, we will mainly use tools from topology. We will give some examples of contractions,

More information

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information

More information

Real Roots of Univariate Polynomials with Real Coefficients

Real Roots of Univariate Polynomials with Real Coefficients Real Roots of Univariate Polynomials with Real Coefficients mostly written by Christina Hewitt March 22, 2012 1 Introduction Polynomial equations are used throughout mathematics. When solving polynomials

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M STRATEGIC WHITE PAPER INTRODUCTION Machine-to-machine (M2M) communications is on the rise. Most mobile network operators (MNOs) are turning to M2M

More information

Mathematical Induction

Mathematical Induction Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How

More information

Reliably computing cellular automaton, in 1-sparse noise

Reliably computing cellular automaton, in 1-sparse noise Reliably computing cellular automaton, in 1-sparse noise Peter Gács Boston University Peter Gács (Boston University) TRG Spring 2010 1 / 23 Ths is the second one of a series of three lectures on reliable

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

4.5 Linear Dependence and Linear Independence

4.5 Linear Dependence and Linear Independence 4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

?kt. An Unconventional Method for Load Balancing. w = C ( t m a z - ti) = p(tmaz - 0i=l. 1 Introduction. R. Alan McCoy,*

?kt. An Unconventional Method for Load Balancing. w = C ( t m a z - ti) = p(tmaz - 0i=l. 1 Introduction. R. Alan McCoy,* ENL-62052 An Unconventional Method for Load Balancing Yuefan Deng,* R. Alan McCoy,* Robert B. Marr,t Ronald F. Peierlst Abstract A new method of load balancing is introduced based on the idea of dynamically

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu

More information

General Framework for an Iterative Solution of Ax b. Jacobi s Method

General Framework for an Iterative Solution of Ax b. Jacobi s Method 2.6 Iterative Solutions of Linear Systems 143 2.6 Iterative Solutions of Linear Systems Consistent linear systems in real life are solved in one of two ways: by direct calculation (using a matrix factorization,

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Positioning with Bluetooth

Positioning with Bluetooth Positioning with Bluetooth Josef Hallberg, Marcus Nilsson, Kåre Synnes Luleå University of Technology / Centre for Distance-spanning Technology Department of Computer Science and Electrical Engineering

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization. Cooperation and Coordination in Distributed Systems Communication Mechanisms for the communication between processes Naming for searching communication partners Synchronization in Distributed Systems But...

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Prof.Devesh Sharma Prof.MamtaSood Subhash patil Santosh Durugkar TIT, Bhopal TIT, Bhopal TIT, Bhopal LGNSCOE,Nasik

More information

Buffer Operations in GIS

Buffer Operations in GIS Buffer Operations in GIS Nagapramod Mandagere, Graduate Student, University of Minnesota npramod@cs.umn.edu SYNONYMS GIS Buffers, Buffering Operations DEFINITION A buffer is a region of memory used to

More information

Fundamentele Informatica II

Fundamentele Informatica II Fundamentele Informatica II Answer to selected exercises 1 John C Martin: Introduction to Languages and the Theory of Computation M.M. Bonsangue (and J. Kleijn) Fall 2011 Let L be a language. It is clear

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

MOST error-correcting codes are designed for the equal

MOST error-correcting codes are designed for the equal IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,

More information

Attacks on neighbor discovery

Attacks on neighbor discovery Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

The Methodology of Application Development for Hybrid Architectures

The Methodology of Application Development for Hybrid Architectures Computer Technology and Application 4 (2013) 543-547 D DAVID PUBLISHING The Methodology of Application Development for Hybrid Architectures Vladimir Orekhov, Alexander Bogdanov and Vladimir Gaiduchok Department

More information