QoS Framework for SIP Signalling

Size: px
Start display at page:

Download "QoS Framework for SIP Signalling"

Transcription

1 QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: ABSTRACT The Session Initition Protocol (SIP) is widely ccepted s the IETF lterntive the ITU-T H.323 teleconferencing protocol to enle cll nd medi session mngement nd control. It is lso used in crrier grde environments, such s the IP Multimedi Susystem (IMS) of the 3rd Genertion Prtnership Project (3GPP) in emerging Universl Moile Telecommunictions System (UMTS) networks. This pper proposes frmework tht enles the Qulity of Service (QoS) provisioning for signlling messges. The contriutions re twofold: Firstly, it defines n overll frmework to enle QoS provisioning for SIP signlling messges in crrier grde networks. Secondly, it outlines existing work tht fits into the frmework nd identifies res tht require further investigtion to implement the concepts in crrier grde networks. KEY WORDS Session Initition Protocol (SIP), Qulity of Service (QoS), Signlling, IP Multimedi Susystem (IMS), Universl Moile Telecommunictions System (UMTS) 1 Introduction Recent yers hve seen the IETF s Session Initition Protocol (SIP) (RFC 3261 [1]) ecome the premier protocol choice for user loction, session setup nd session mngement tsks in IP environments. For exmple, the 3rd Genertion Prtnership Project (3GPP), which is glol inititive to develop stndrds nd specifictions for next genertion Universl Moile Telecommunictions System (UMTS) networks, uses SIP s the signlling protocol for its IP Multimedi Susystem (IMS) in Relese 5 (3GPP Technicl Specifiction (R5) [2], (R5) [3], (R5) [4]). Other exmples include, ut re not limited to, the use of SIP for ir trffic control pplictions [5] nd in IPv6 environments [6]. Where Qulity of Service (QoS) issues for medi trnsport in IP networks hs een in the focus of the reserch community for mny yers, QoS provisioning specificlly for signlling messges hs received less ttention. Signlling messge dely nd session initition dely ws ddressed y Eyers [7] nd Curcio [8]. Erlier work [9] outlined the need for QoS considertions on the SIP lyer to provide equivlent telephony services, in prticulr, if SIP is to e used in 3GPP crrier-grde networks. This need is minly sed on two spects: signlling network resources re shred with other services nd gurntees to customers re only elievle if service levels re defined. This pper introduces n overll frmework tht enles QoS provisioning for SIP signlling trffic. It consists of severl prts, including: Virtul SIP Links (VSLs), which llow the definition of virtul SIP networks, methodologies to clculte the size of signlling flows, dynmic resource lloction schemes nd SIP routing methods. Note tht the IMS is used s n exmple network in this pper, ut the concepts cn e used in ny environment tht requires QoS SIP signlling. 3GPP uses it s own nottion nd introduces numer of SIP proxy servers clled Cll Session Control Function (CSCF). Commercil service providers require these servers to control session signlling messge flows nd enle uthentiction, illing, service provisioning, etc. Proxy CSCFs (s) re the network entry points for the User Equipment (UE). Serving CSCFs (s) hold copy of the user profile, record session stte informtion nd provide higher level session hndling functions. Interrogting CSCFs (s) re network entry points for terminting sessions nd decide the messge routing to s. The contriutions of this work re twofold: Firstly, it outlines the motivtion nd it defines n overll frmework tht enles QoS provisioning for SIP signlling messges in crrier grde networks. Secondly, it summrizes existing work tht fits into the frmework nd identifies res tht require further investigtion to use the concepts in crrier grde networks. Both tsks id the ultimte gol of QoS provisioning for SIP service users in crrier grde networks. The pper is orgnised s follows: It ddresses the SIP signlling lyer first; nd then introduces the Virtul SIP Overly Network in Section (VSON) 2. Section 3 summrises the frmework nd how the different concepts interct. Virtul SIP links re prt of the VSON definition nd re discussed in Section

2 4. VSLs cn use Dynmic Resource Alloction (DRA) which is explined in Section 5. VSLs nd DRA rely on trffic estimtion nd flow nlysis which is discussed in Section 6. Messges on the VSON cn tke lterntive pths; SIP messge routing is discussed in Section 7. Section 8 outlines res tht require further ttention. 2 SIP Lyer Astrction In existing SIP signlling configurtions, IP networks provide trnsport service for SIP messges. Any node tht is connected to the IP network nd hs n IP ddress, is glolly routle. In this sitution, ll nodes re logiclly fully meshed. The sme is true for SIP signlling nodes tht re connected to IP networks. An exmple of such network is shown in Figure 1. It depicts the Trnsport/Network Lyer nd the SIP/Appliction Lyer. The cloud symolises the underlying trnsport network, nd the nodes symolise SIP servers. SIP/Appliction Lyer UE1 UE2 Trnsport/Network Lyer Figure 1. SIP nd Network Lyer The virtul network is reduced to well-defined links nd nodes. Relevnt issues of the underlying network hve to e mpped onto this lyer. This includes, ut is not limited to, delys nd it errors. The VSON defines signlling environment tht enles the gurntee of service levels. Known methodologies cn e pplied nd new strtegies cn e developed for this virtul overly network. The following sections outline issues tht re relevnt to the VSON. These include the definition of the connections etween SIP nodes, possile resource lloction strtegies for this link, signlling trffic mngement nd SIP messge routing. 3 Frmework The concept to provide QoS for SIP signlling consists of severl models nd methods tht interct with ech other. The overll gol is to define virtul SIP overly network with service gurntees s well s predictle nd ccountle ehviour. The relevnt res include: the SIP nodes, the connection etween the nodes nd the messge routing in etween the nodes. SIP nodes re server implementtions tht re similr to other existing Internet services; the connections nd the routing re specific to the VSON. Figure 3 depicts the different locks of the frmework nd their interction. The VSON (4) consists of SIP nodes nd Virtul SIP Links (2). The VSL re dimensioned nd set up y the Dynmic Resource Alloction DRA. The trffic model (1) is used y DRA nd VSL to dimension these resources. Since the VSON defines it s own virtul network, routing strtegies (5) re required on this level. To e le to use such The IP resources of generl-purpose trnsport networks re lso used y services other thn signlling, viz: This network configurtion provides no dedicted signlling trffic resources. To define QoS levels solely for SIP, the SIP lyer hs to e seprted from the trnsport lyer. QoS mesures on the SIP lyer should e uncoupled from used trnsport technologies. On this SIP lyer, service levels cn e defined nd n integrted QoS service concept cn e developed. Figure 2 depicts such trnsport independent virtul SIP overly network VSON 3 5 VSL DRA Routing Trffic Model 6 Figure 3. SIP QoS Frmework SIP/Appliction Lyer UE1 Figure 2. VSON Lyer UE2 scheme in n environment where signlling trffic nd other services shre network resources, it is importnt to gurntee QoS. To enle QoS on the ppliction lyer, the trnsport erers hve to provide QoS methodologies to protect trffic requirements for different services. The service level greements, which define these needs, should e of dynmic nd dptle nture. The detil of the Service Level Agreement (SLA) ssignment process nd implementtion is not in the scope of this work.

3 4 Virtul SIP Links Virtul SIP links re the strction of connections etween SIP nodes. VSLs re logiclly locted on the SIP lyer nd connect two SIP nodes. As outlined erlier, this is possile since the full connectivity provided y the IP network is not necessry to fulfil the functionl requirements of VSONs. The VSL definition is motivted y three min resons: To define required resources, to enle trffic clcultions nd to enhnce the performnce of VSONs. To e le to introduce qulity spect to VSONs, comprle nd predictle prmeters re required to clssify the SIP signlling trffic. A well known method of clssifying trffic is the Leky Bucket (LB) methodology which is used to define VSLs. VSLs do not only define the flow size, ut lso limit the mximum queueing dely. Trffic models require the input of messge loss proilities. If resources re limited nd clssified y LBs, messge loss oundries cn e estimted nd trffic flows cn e clculted [10]. VSLs hve no physicl equivlent. They re logicl origin-destintion ssocitions with distinct trffic requirements. VSLs re defined y their Trffic Specifictions (TSpec), i.e. the men rte, the pek rte, the minimum policed messge size, the urst size nd the constrints of the messge loss proility. These trffic specifictions define leky ucket which enles trffic policing nd shping. Thus, VSLs implement de fcto dmission control for signlling trffic. VSLs mke connections comprle nd ccountle nd they define cler interfce points in the network. VSLs re dimensioned for mximum numer of messges nd defined mximum messge loss proility. Models tht re ddressed in Section 6 id in the clcultion of the LB prmeters. Once the men flow size is known, the required pek rte nd uffer size cn e clculted to comply with minimum messge loss proility. All defining VSL prmeters re known. To deploy VSL these prmeters hve to e ccepted y the trnsport network. The trnsport network requires sufficient QoS technologies nd hs to e le to provide QoS resources. VSLs require no dditionl hrdwre. Softwre modules in SIP servers cn implement their functionlity. In principle the use of VSLs for connections etween SIP nodes is ritrry. Connections with nd without defined QoS conditions cn coexist. If end-toend QoS gurntees re required, ll connections hve to support VSLs. The mechnism of dimensioning nd deploying cn e executed on the fly y Dynmic Resource Alloction (DRA). 5 Dynmic Resource Alloction The im of dynmic resource lloction is twofold. Firstly, it is methodology to enle the QoS provisioning for the virtul SIP signlling network. Secondly, it chieves the dimensioning utomticlly on the fly. DRA uses cpilities tht mixed services IP trnsport networks provide. If the trnsport network supports dynmic service level greements, nodes hve the ility to reserve more/less ndwidth from the trnsport network to dpt to new requirements. Dynmic resource lloction requires severl supporting technologies. The underlying trnsport network hs to support dynmic SLAs i.e. the ility to negotite the resources with the network. It lso requires tht VSLs e used on the SIP lyer. To keep the perceived QoS constnt, the DRA process dimensions VSLs for SIP trffic. To e le to dimension VSLs ppropritely, knowledge out network trffic flows is required. In such context, the dynmic resource lloction methodology llows the utomted configurtion of resources nd ensures QoS for signlling. DRA works s follows [11]: DRA oserves connections of SIP servers nd dpt the resources s required. To chieve such functionlity severl su functions re required: Dt out the VSL stte re collected s messge rrivls per time unit nd verge messge size. If these vlues cross upper or lower threshold limits, the scheme tries to increse or decrese the resource suscription. To ensure tht ctul trends re detected nd not rndom fluctution, the two thresholds need to hve minimum distnce. The distnce is estimted y known sttisticl methods. The ctul size of the resources tht re suscried cn e clculted y using flow model nd methods for VSL dimensioning. The resource suscription is executed if thresholds re crossed. Additionl resources re requested or resources re returned to the trnsport network. If the trnsport network cnnot fulfil n increse-request, the resource suscription remins unchnged. Both dynmic resource lloction nd dynmic routing (Section 7) re processes tht re executed on the fly, so it is importnt tht they operte on different time scles. Frequent fluctutions in user/messge numers cn e hndled y dynmic routing schemes, long-term trffic shifts re hndled y DRA. DRA cn yield considerle resource svings, since unused resources re returned to the trnsport network. This is in prticulr useful if the resources re illed on SLA ses. 6 SIP Flows nd Trffic Estimtion To e le to use the methodology of VSLs nd to get fundmentl understnding of trffic flows in SIP overly networks, it is necessry to hve models tht descrie SIP signlling messge trffic. These models investigte the influence of messge loss on the trnsmission medi on SIP trffic nd ccount for the fct

4 tht SIP messges grow in size when they pss through the network. A SIP fluid flow model does not tke different SIP messges into ccount, ut investigtes how their trffic ggregtes cn e used to nlyse flows. It llows lso the clcultion of the minimum it error requirements for trnsport network connections. Such flow model ws introduced in [12]. A simplified version of this model relies on two prmeters: the numer of messges tht re sent nd the verge size of these messges. Both prmeters re loclly ville in nodes. Thus it is possile to estimte the men flow size. The reminder of this section outlines simplified model tht llows flow size estimtion etween two SIP nodes. Firstly the clcultion of the messge size is shown. The signlling trffic etween two nodes depends on the numer of messges tht re sent etween these nodes, including the numer of messges tht hd to e resent. Figure 4 depicts n exmpleconnection etween two nodes nd. The men size of messges leving node is denoted y m, the numer of originl messges sent on the connection under the ssumption of zero loss is denoted y n,. The connection hs messge loss proility of P E (, ). The numer of messges tht were dropped nd resent on connection, nd eyond re denoted y d, nd the numer of messges tht were dropped eyond nd trversed, is denoted y d,. Depending on d m n, P E (,) d Figure 4. Exmple Connection the locl knowledge, the flow on link, cn either e clculted for node y Eqution (1) or for node y Eqution (2) F L, = m (n, + d, ) In the cse of node, d, node, d, is known. ( F L, = m n, (1) is known nd in the cse of 1 + P E(, ) + d, 1 P E (, ) ) (2) The estimtion of the verge messge size m is discussed next. SIP messges consist of messge heder nd messge ody. The messge ody is usully used for the session description which uses the Session Description Protocol (SDP). SIP messges pper with nd without messge ody, nd therefore vry considerly in size. Stte full servers tht re trversed y requests re recorded in the vi heder field nd in some cses in the route-record field of the messge. This cuses the SIP messges to grow while they pss through the network. Since the oservtions here re locl the messge size chnge hs no impct in this context. The current messge size estimte is of interest. A locl node cn clculte recursive men of ll processed messges online. Eqution (3) shows the clcultion. m(t + 1) = m(t) + M(t + 1) m(t) n (3) The verging count is denoted y n, i.e. the numer of smples tht re considered, the current messge size is M nd m is verge. This vlue is simpler to clculte thn the moving verge. It does not require memory for the pst n vlues. More recent mesurements hve lrger impct thn older mesurements. This simple model llows the trffic estimtion etween two SIP nodes y dynmiclly mesuring strightforwrd prmeters, i.e. messge size, messge numer nd the numer of dropped messges. The estimtes help the dimensioning of signlling resources etween these nodes s outlined in Section 5. 7 SIP Messge Routing Messges on the VSON lyer cn tke lterntive routes to their destintion, nd therefore messge routing is required. Most SIP messge routing decisions re mde during the registrtion of users, since intermedite nodes record registrtion stte nd/or session stte informtion. Once ssocitions re formed they re persistent for susequent requests. In principle, messge routing depends on two fctors: Firstly the connectivity on the VSON lyer, i.e. VSLs re defined etween nodes nd secondly, it depends on opertor-specific policies nd routing strtegies. The first depends in generl on functionl specifictions nd the network structure, e.g. for 3GPP, the defined network entry point for UEs re s, the lter cn e specific to opertors or single networks. SIP messge routing cn e divided into two res: Routing decisions tht resemle lod lncing schemes/server ssignment prolems; nd routing prolems tht cn e solved y shortest pth like routing methodologies. For 3GPP, the first re relevnt for routes from s to s nd the lter concern routing decisions tht re required for routes from UEs/s/s to s. First lod lncing nd overflow routing is ddressed. The chllenge of efficient messge routing is similr to existing server/resource lloction prolems which include server lod lncing, hsh routing nd we cching schemes. In recent yers, these res hve

5 een mjor reserch trgets. The SIP Messge Overflow Routing Scheme (SMORS) is introduced [13]. It trgets efficient messge routing for high volume SIP servers, in the 3GPP IMSs context nd it specificlly ddresses messge routing etween s nd S- CSCFs. SMORS ssigns users/messges to servers on the sis of generic routing informtion. If threshold is reched, new users/messges re overflown to dditionl servers. The principl concept of overflow routing is not new nd hs een extensively studied in the context of Pulic Switched Telephone Networks (PSTNs). SMORS hs severl enefits: It is fst nd requires little processing for susequent messge routing, it hs lod lncing, ckup provisioning nd overflow routing cpilities. One mjor dvntge of this scheme is tht the user-to- ssignment is flexile. s cn e ssigned, y user priority, service suscription or lpheticlly y user nme. The ssignments do not hve to e clculted t runtime; these ssocitions cn e pre-clculted. Shortest pth-like routing protocols nd methodologies in the IP routing context re well-understood nd remin continuing focus of the reserch community. Shortest pth routing lgorithms find pths etween n Origin-Destintion Node Pir (OD-pir) tht stisfy miniml optimistion metric. Trditionl routing protocols such s Open Shortest Pth First (OSPF) use sclr metrics to optimise the pths. Mny possile lterntive metrics re known, ut the inverse of the cpcity is most commonly used in IP networks. Fctors tht hve n impct on the messge routing on the VSL lyer re the hierrchicl nd logicl setup defined y the network structure, the vilility of resources in nodes to hndle dditionl requests, resource vilility for dditionl signlling trffic on the trnsmission medi, the close proximity of nodes nd the qulity on the connection. The routing process should consider these fctors. [14] proposed multidimensionl metric. During defined stges in the network opertion one metric within the multidimensionl metric will dominte the others. If, for exmple, two pths hve the sme numer of ville users nd similr delys of cceptle length, the pth with the mximum reliility should e selected. On the other hnd, core network connections re likely to hve similr reliilities. In this cse, the pth selection is minly sed on dely which is mesure for distnce in this context. If the numer of ville users on certin pth gets smller, routing hs to tke this into ccount. It is importnt to note tht in the comined metric, one metric domintes the others t given time, the metric is not simple weighted verge clcultion. 8 Further Work This pper mentioned numer of models nd methodologies tht cn work together to provide QoS for SIP signlling messges nd improve the service experience of users. This section outlines res for further reserch directions. 8.1 Trnsport Protocol One issue tht hs considerle impct on QoS issues is the trnsport protocol tht is used. In principle, the SIP protocol is trnsport protocol independent. The drwck of the defult trnsport protocol UDP is its unreliility nd the disdvntge of TCP is the protocols long connection set up time. UDPs unreliility cn cuse prolems in SIP overly networks with the high numer of intermedite links nd SIP s end-toend reliility [9]. The Strem Control Trnsmission Protocol (SCTP) [15] could e n lterntive, with considerle dvntges for the session setup times nd throughput. Internet Drft [16] discusses the SCTP protocol in conjunction with its use in SIP. It suggests tht most of the enefits of SCTP occur under loss conditions. The sitution in QoS signlling domins is different from the sitution in generl Internet environments, therefore further study is required to investigte the impct of trnsport protocols on SIP QoS. 8.2 QoS Network VSLs ssume tht the trnsport network cn provide QoS resources to signlling trffic. Further study should investigte the interction etween VSLs nd the trnsport network, nd possile implictions. Furthermore, VSLs use dynmic SLAs. DRA ssumes tht these exist nd cn e used. Further study hs to focus on the exct implementtion of these dynmic SLAs, which my include SLA negotition nd further issues. 8.3 Generic Overly Networks Recent yers hve seen mny new peer-to-peer services emerge, mny of which define their own overly network. Overly networks re lso wy to provide dvnced services vi the pulic Internet tht re not provided y the network. In future IP networks, these services will e le to use QoS functionlities s well. Results such s the VSL principle, dynmic resource lloction nd routing might e pplicle in this context s well. These efforts cn lso include dislocted corporte computer networks which use IP resources to connect vrious sites, s well s pplictions tht define their own overly network nd intend to pply QoS

6 principles. Oviously, this outlines wide reserch re with numer of interesting reserch prolems to solve. 9 Conclusions This pper introduced frmework tht enles QoS provisioning for SIP signlling service in dvnced crrier grde networks. It outlined numer of technologies nd schemes tht cn id the QoS effort. Future work hs to investigte the prcticlity of these models in live networks. The mjor im of this pper ws to introduce some of these issues nd possile solutions. These issues might gin importnce, s more nd more commercil services will use SIP s session control nd mngement. Providing QoS for SIP signlling is core issue in providing QoS for consumers of future emerging (wireless) networks. Acknowledgements The uthors would like to thnk Ericsson AsiPcificL Austrli nd the Austrlin Telecommunictions Coopertive Reserch Centre (ATcrc) for their finncil support for this work. References [1] J.Rosenerg, H.Schulzrinne, G.Cmrillo, A. Johnston, J. Peterson, R. Sprks, M. Hndley, nd E. Schooler. SIP: Session Initition Protocol. IETF, June RFC 3261 (Osoletes RFC 2543). [2] 3rd Genertion Prtnership Project. IP Multimedi (IM) Susystem - Stge 2 (Relese 5), Jnury G TR V [3] 3rd Genertion Prtnership Project. Signlling flows for the IP multimedi cll control sed on SIP nd SDP - Stge 3 (Relese 5), Decemer GPP TR V [4] 3rd Genertion Prtnership Project. Internet Protocol (IP) multimedi cll control protocol sed on Session Initition Protocol (SIP) nd Session Description Protocol (SDP) - Stge 3 (Relese 5), Jnury GPP TR V [5] K.Drilion, W.Kmpichler, nd K.Gschk. Eventsed rdio communiction signlling using the session initition protocol. In The 11th IEEE Interntionl Conference on Networks (ICON 2003), Sydney, Austrli, Septemer [6] J.Fiedler D.Sislem. SIP nd IPv6: Why nd how? Interntionl Symposium on Applictions nd the Internet (SAINT2003), Orlndo, USA, Jnury [7] T.Eyers nd H.Schulzrinne. Predicting Internet Telephony Cll Setup Dely. In In IPTel 2000 (First IP Telephony Workshop), April [8] I.D.D. Curcio nd M. Lundn. SIP cll setup dely in 3G networks. In The Seventh IEEE Symposium on Computers nd Communictions (ISCC 02), Tormin/Girdini Nxos, Itly, July [9] A.A. Kist nd R.J. Hrris. SIP Signlling Dely in 3GPP. In Proceedings of Sixth Interntionl Symposium on Communictions Interworking of IFIP - Interworking 2002, Perth Austrli, Octoer 13-16, Octoer [10] A.A. Kist nd R.J. Hrris. Using virtul SIP links to enle QoS for signlling. In The 11th IEEE Interntionl Conference on Networks (ICON 2003), Sydney, Austrli, Septemer [11] A.A. Kist nd R.J. Hrris. Dynmic resource lloction in 3GPP SIP overly networks. In Fourth Interntionl Conference on Informtion, Communictions & Signl Processing nd Fourth Pcific-Rim Conference on Multimedi (ICICS- PCM 2003), Singpore, Decemer [12] A.A. Kist nd R.J. Hrris. A simple model for clculting SIP signlling flows in 3GPP networks. In Second IFIP-TC6 Networking Conference 2002, Pis, Itly My 19-24, My [13] A.A. Kist nd R.J. Hrris. SIP messge overflow routing scheme (SMORS). In 2003 Austrlin Telecommunictions, Networks nd Applictions Conference (ATNAC), Melourne, Austrli, Decemer [14] A.A. Kist nd R.J. Hrris. SIP routing methodologies in 3GPP. In First Interntionl Working Conference on Performnce Modelling nd Evlution of Heterogeneous Networks (HET-NETs 03), Ilkley, West Yorkshire, U.K, July [15] R. Stewrt, Q. Xie, K. Morneult, C. Shrp, H. Schwrzuer, T. Tylor, I. Rytin, M. Kll, L. Zhng, nd V. Pxson. Strem Control Trnsmission Protocol. IETF, Octoer RFC [16] J. Rosenerg, H. Schulzrinne, nd G. Cmrillo. The Strem Control Trnsmission Protocol s Trnsport for the Session Initition Protocol. IETF, Novemer Internet Drft <drft-ietfsip-sctp-04.txt> (work in progress).

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Introduction. Producer s Surplus. Total Costs: Fixed and Variable

Introduction. Producer s Surplus. Total Costs: Fixed and Variable Introduction Producer s Surplus Philip A. Viton Novemer 12, 2014 We hve seen how to evlute consumer s wtp for mrket-induced price chnge: we mesure it (with pproprite cutions, primrily tht we tret it s

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

Chapter 6. Common Non-System Configuration

Chapter 6. Common Non-System Configuration Chpter 6 Common Non-System Configurtion This chpter provides instructions for configuring commnds tht pper in more thn one protocol in the SP201. Use the sections in this chpter tht re pplicle to your

More information

Mathematics for Chemists 2 Lecture 1: Integral calculus I. Indefinite and definite integrals, basic calculation of integrals

Mathematics for Chemists 2 Lecture 1: Integral calculus I. Indefinite and definite integrals, basic calculation of integrals Mthemtics for Chemists 2 Lecture 1: Integrl clculus I Indefinite nd definite integrls, sic clcultion of integrls Johnnes Kepler University Summer semester 2012 Lecturer: Dvid Sevill Integrl clculus I 1/19

More information

Linear Functions. (1) Let F denote the Fahrenheit temperature and C the Celsius temperature of an object. F and C are related by

Linear Functions. (1) Let F denote the Fahrenheit temperature and C the Celsius temperature of an object. F and C are related by Liner Functions A. Definition nd Exmples A function f is liner if it cn be expressed in the form f ( x) = mx + b where m nd b re constnts nd x is n rbitrry member of the domin of f. Often the reltionship

More information

Technical Specification Group Services and System AspectsTSGS#15(02)0135 Meeting #15, Jeju-do, Korea, 5-14 March 2002

Technical Specification Group Services and System AspectsTSGS#15(02)0135 Meeting #15, Jeju-do, Korea, 5-14 March 2002 Technicl Specifiction Group Services nd System AspectsTSGS#15(02)0135 Meeting #15, Jeju-do, Kore, 5-14 Mrch 2002 Source: TSG SA WG2 Title: CRs on 23.221 v.5.3.0 Agend Item: 7.2.3 The following Chnge Requests

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

DEFINITE INTEGRALS, FUNDAMENTAL THEOREM OF CALCULUS, ANTIDERIVATIVES

DEFINITE INTEGRALS, FUNDAMENTAL THEOREM OF CALCULUS, ANTIDERIVATIVES DEFINITE INTEGRALS, FUNDAMENTAL THEOREM OF CALCULUS, ANTIDERIVATIVES MATH 152, SECTION 55 (VIPUL NAIK) Corresponding mteril in the book: Section 5.3, 5.4 Difficulty level: Hrd. Wht students should definitely

More information

Small Business Networking

Small Business Networking Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Deterministic Finite Automata

Deterministic Finite Automata Deterministic Finite Automt Bkhdyr Khoussinov Computer Science Deprtment, The University of Aucklnd, New Zelnd mk@cs.ucklnd.c.nz In this lecture we introduce deterministic finite utomt, one of the foundtionl

More information

Chapter 3. Quadrature Formulas

Chapter 3. Quadrature Formulas Chpter 3 Qudrture Formuls There re severl different methods for obtining the re under n unknown curve f(x) bsed on just vlues of tht function t given points. During our investigtions in this clss we will

More information

3 T( E) = a E a E a E. The transfer function can be decomposed into two terms by sliding the numerator leftward and the denominator rightward.

3 T( E) = a E a E a E. The transfer function can be decomposed into two terms by sliding the numerator leftward and the denominator rightward. ARMA Modeling ARMA (Autoregressive Moving Averge) modeling is technique which fits discrete trnsfer function of specified order to dt using the lest squres method. nce the discrete trnsfer function prmeters

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Step-by-Step Pricing Instructions - wiadvisor

Step-by-Step Pricing Instructions - wiadvisor Step-y-Step Pricing Instructions - wiadvisor Complete Prior to Pricing Wizrd Set-up Weinr 1. Schedule your Pricing Wizrd Set-up Weinr 2. Verify tht you will e using of the following pproved (nd common)

More information

Tests for One Poisson Mean

Tests for One Poisson Mean Chpter 412 Tests for One Poisson Men Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson distribution

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

A Study on Autonomous Cooperation between Things in Web of Things

A Study on Autonomous Cooperation between Things in Web of Things A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, 305-700,

More information

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM) Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University

More information

Inf1A: Non-deterministic Finite State Machines

Inf1A: Non-deterministic Finite State Machines Lecture 3 InfA: Non-deterministic Finite Stte Mchines 3. Introduction In this lecture we del with non-deterministic Finite Stte Mchines, clss of mchines which re generliztion of deterministic Finite Stte

More information

1 What You Need To Know About Basic Maths

1 What You Need To Know About Basic Maths 1 Wht You Need To Know About Bsic Mths Before we cn strt on ny of the more interesting stuff, I thought I d mke sure tht everyone hs the bsic mthemticl bckground necessry to red nd understnd everything

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Net Change and Displacement

Net Change and Displacement mth 11, pplictions motion: velocity nd net chnge 1 Net Chnge nd Displcement We hve seen tht the definite integrl f (x) dx mesures the net re under the curve y f (x) on the intervl [, b] Any prt of the

More information

Using Virtual SIP Links to Enable QoS for Signalling

Using Virtual SIP Links to Enable QoS for Signalling Using Virtual SIP Links to Enale QoS for Signalling Alexander A. Kist and Richard J. Harris RMIT University Melourne BOX 2476V, Victoria 31, Australia Telephone: (+) 61 (3) 9925-5218, Fax: (+) 61 (3) 9925-3748

More information

The Analytic Hierarchy Process

The Analytic Hierarchy Process The Anlytic Hierrchy Process The Anlytic Hierrchy Process (AHP), introduced by Thoms Sty (980), is n effective tool for deling with complex decision mking, nd my id the decision mker to set priorities

More information

Building Finite Automata From Regular Expressions

Building Finite Automata From Regular Expressions Building Automt From Regulr Expressions We mke n FA from regulr expression in two steps: Trnsform the regulr expression into n NFA. Trnsform the NFA into deterministic FA. The first step is esy. Regulr

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-276 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t processor.support@nlog.com nd dsptools.support@nlog.com Or visit

More information

LiveEngage Agent Guide. Version 1.0

LiveEngage Agent Guide. Version 1.0 Agent Guide Version 1.0 Tle of Contents Contents LOGGING IN... 3 NAVIGATING LIVEENGAGE... 4 Visitor List, Connection Are, Enggement Br & Going Online... 4 ENGAGEMENT OPTIONS... 5 Tking n Enggment... 5

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

APPENDIX D Precalculus Review

APPENDIX D Precalculus Review APPENDIX D Preclculus Review SECTION D. Rel Numers nd the Rel Line Rel Numers nd the Rel Line Order nd Inequlities Asolute Vlue nd Distnce Rel Numers nd the Rel Line Rel numers cn e represented y coordinte

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Substituting the right-hand side of eq 3 into eq 2 we obtain:

Substituting the right-hand side of eq 3 into eq 2 we obtain: ph, pk, Solver, nd ll Tht This hndout contins four prts. In Prt I we derive n expression tht reltes the erved sornce of molecule (e.g., dye, cid-se indictor, or fluorescent molecule to the frctionl sornce

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

CS555, Spring /29/2005. Chapter 4 roadmap. WMU-CS, Dr. Gupta 1. Hierarchical Routing. Hierarchical Routing

CS555, Spring /29/2005. Chapter 4 roadmap. WMU-CS, Dr. Gupta 1. Hierarchical Routing. Hierarchical Routing CS555, Spring 2005 Chpter 4 rodmp 4.1 Introduction nd Network Service Models 4.2 VC nd Dtgrm Networks 4.3 Wht s Inside Router 4.4 The Internet (IP) Protocol IPv4, IPv6 4.5 Routing lgorithms Link stte routing

More information

Assuming all values are initially zero, what are the values of A and B after executing this Verilog code inside an always block? C=1; A <= C; B = C;

Assuming all values are initially zero, what are the values of A and B after executing this Verilog code inside an always block? C=1; A <= C; B = C; B-26 Appendix B The Bsics of Logic Design Check Yourself ALU n [Arthritic Logic Unit or (rre) Arithmetic Logic Unit] A rndom-numer genertor supplied s stndrd with ll computer systems Stn Kelly-Bootle,

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

We are going to stop worrying about discretizing time for a while, and examine. how boolean-valued functions are implemented in CMOS.

We are going to stop worrying about discretizing time for a while, and examine. how boolean-valued functions are implemented in CMOS. 6 Chpter 2 CMOS logic 2.1 Bsics We re going to stop worrying out discretizing time for while, nd exmine how oolen-vlued functions re implemented in CMOS. There re two nullry (no inputs) oolen functions:

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Cellular Concept. David Tipper. Proposed by Bell Labs 1971 Geographic Service divided into

Cellular Concept. David Tipper. Proposed by Bell Labs 1971 Geographic Service divided into Wireless ommunictions nd ellulr Network Fundmentls Dvid Tipper ssocite Professor Grdute Telecommunictions nd Networking Progrm University of Pittsburgh Slides 4 ellulr oncept Proposed by ell Lbs 97 Geogrphic

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

EziLink. 1 About EziLink PC SOFTWARE GUIDE. Import. Export. Configuration settings. Software updates

EziLink. 1 About EziLink PC SOFTWARE GUIDE. Import. Export. Configuration settings. Software updates PC SOFTWARE GUIDE EziLink 1 Aout EziLink EziLink PC softwre llows you to mnge Tru-Test devices using your computer. It cn e instlled on computers with Microsoft Windows XP or lter. EziLink will offer different

More information

Learner-oriented distance education supporting service system model and applied research

Learner-oriented distance education supporting service system model and applied research SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied

More information

COMP526 DEPARTMENT : Computer Science Tel. No May 2006 EXAMINATIONS. Model solutions. Applied Algorithmics. TIME ALLOWED : 2.

COMP526 DEPARTMENT : Computer Science Tel. No May 2006 EXAMINATIONS. Model solutions. Applied Algorithmics. TIME ALLOWED : 2. COMP526 DEPARTMENT : Computer Science Tel. No. 7943686 My 2006 EXAMINATIONS Model solutions Applied Algorithmics TIME ALLOWED : 2.5 hours INSTRUCTIONS TO CANDIDATES Cndidtes will e ssessed on their est

More information

1. Give a DFA for Σ = {0, 1} and strings that have an odd number of 1 s and any number of 0 s.

1. Give a DFA for Σ = {0, 1} and strings that have an odd number of 1 s and any number of 0 s. DFAs DFA stnds for deterministic finite utomton. Bsiclly, it is directed grph where ech node hs edges coming out of it leled with the letters from fixed finite lphet Σ. One node is designted s the strt

More information

Oblique Triangles and The Law of Sines Congruency and Oblique Triangles Derivation of the Law of Sines Solving SAA and ASA Triangles (Case 1)

Oblique Triangles and The Law of Sines Congruency and Oblique Triangles Derivation of the Law of Sines Solving SAA and ASA Triangles (Case 1) Olique Tringles nd The Lw of Sines Congruency nd Olique Tringles Derivtion of the Lw of Sines Solving SAA nd ASA Tringles (Cse 1) Are of Tringle Lw of Sines In ny tringle ABC, with sides,, nd c, sin A

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

Non-Regular Languages and The Pumping Lemma

Non-Regular Languages and The Pumping Lemma CS240 Lnguge Theory nd Automt Fll 2011 Non-Regulr Lnguges nd The Pumping Lemm Non-Regulr Lnguges Not every lnguge is regulr lnguge. However, there re some rules tht sy "if these lnguges re regulr, so is

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

University of Sydney

University of Sydney 2004multivrilefunctions University of Sydney Deprtment of Economics Mthemticl Methods of Economic Anlysis MULTIVARIABLE FUNCTIONS SUMMARY 1. Functions 1) Given two sets X nd Y, function from X to Y, written

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Sirindhorn International Institute of Technology Thammasat University at Rangsit

Sirindhorn International Institute of Technology Thammasat University at Rangsit Sirindhorn Interntionl Institute of Technology Thmmst University t Rngsit School of Informtion, Computer nd Communiction Technology COURSE : ECS 204 Bsic Electricl Engineering L INSTRUCTOR : Asst. Prof.

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

This Quick Start Guide provides high-level instructions for setting up a McAfee Web Gateway appliance.

This Quick Start Guide provides high-level instructions for setting up a McAfee Web Gateway appliance. Quick Strt Guide Revision B McAfee We Gtewy version 7.3.2.2 This Quick Strt Guide provides high-level instructions for setting up McAfee We Gtewy pplince. Before you egin, e sure to red the McAfee We Gtewy

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

GMAT Word Problems: Fundamentals (Excerpt)

GMAT Word Problems: Fundamentals (Excerpt) GMAT Word Problems: Fundmentls (Excerpt) Jeff Sckmnn / GMAT HACKS Jnury 2013 Contents 1 Introduction 2 2 Difficulty Levels 3 3 Problem Solving 4 4 Dt Sufficiency 6 5 Answer Key 8 6 Explntions 9 1 1 Introduction

More information

Integration: Summary

Integration: Summary Integrtion: Summry Philippe B. Lvl KSU September 14, 2005 Abstrct This hndout summrizes the vrious integrtion techniques. It lso give lterntives for finding definite integrls when n ntiderivtive cnnotbefound.

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014 Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).

More information

Integrals as Net Area Calculus 11, Veritas Prep.

Integrals as Net Area Calculus 11, Veritas Prep. Integrls s Net Are Clculus 11, Verits Prep. Prolems 1. Using Prt II of the FTC, clculte 12 12 5 x 2 dx. Then clculte x 2 dx. Compre nd contemplte your results. (Note tht 5 I m not sking you here to find

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

CONSERVATIVE FORCES AND SCALAR POTENTIALS

CONSERVATIVE FORCES AND SCALAR POTENTIALS CONSERVATIVE FORCES AND SCALAR POTENTIALS In our study of vector fields, we hve encountered severl types of conservtive forces. If force is conservtive, it hs numer of importnt properties. It is importnt

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-336 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Additional Protocol to the Convention on Human Rights and Biomedicine concerning Genetic Testing for Health Purposes

Additional Protocol to the Convention on Human Rights and Biomedicine concerning Genetic Testing for Health Purposes Council of Europe Trety Series - No. 203 Additionl Protocol to the Convention on Humn Rights nd Biomedicine concerning Genetic Testing for Helth Purposes Strsourg, 27.XI.2008 2 CETS 203 Humn Rights nd

More information

Receiver Operating Characteristic Analysis (ROC)

Receiver Operating Characteristic Analysis (ROC) Receiver Operting Chrcteristic Anlysis (ROC) ROC nlysis is n pproch cn be used to compre clssifiers. It is clerest when there re two clsses. On the y-xis, you plot the true positives (TP). On the x-xis,

More information

Taylor Polynomials with Error Term

Taylor Polynomials with Error Term Tylor Polynomils with Error Term The functions e x, sinx, / x, etc re nice functions but they re not s nice s polynomils. Specificlly polynomils cn be evluted completely bsed on multipliction, subtrction

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Algorithms for Media

Algorithms for Media Algorithms for Medi Dvid Eppstein Univ. of Cliforni, Irvine School of Informtion nd Computer Science Joint work with Jen-Clude Flmgne Univ. of Cliforni, Irvine School of Socil Sciences Wht is medium? Introduced

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

Activity Based Costing in Logistics

Activity Based Costing in Logistics Activity Bsed Costing in Logistics Z. Bokor Deprtment of Trnsrt Economics, Budpest University of Technology nd Economics, H-1111 Budpest, Bertln L. u. 2. e-mil: zbokor@kgzd.bme.hu Abstrct: Activity bsed

More information

1.4.1 LU Decomposition. In section 1.3.6, we have seen that calculating the inverse of a matrix A involves solving N linear problems:

1.4.1 LU Decomposition. In section 1.3.6, we have seen that calculating the inverse of a matrix A involves solving N linear problems: .4. LU Decomposition In section..6, we hve seen tht clculting the inverse of mtrix A involves solving N liner prolems: ~ [k] A = e [k] (.4.-) ~ [] ~ [N] For the N column vectors,, of A -. Ech of these

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Overview of International Roaming (WORLD WING)

Overview of International Roaming (WORLD WING) Overses Use Overview of Interntionl Roming (WORLD WING)... 306 Services Aville Overses... 306 Checking efore Using Overses... 307 Mking Clls Overses... 309 Receiving Clls Overses... 312 Setting Network

More information

Network Coding and its Applications in Communication Networks

Network Coding and its Applications in Communication Networks Network Coding nd its Applictions in Communiction Networks Alex Sprintson Texs A&M University, College Sttion, Texs, USA Astrct. The network coding technique generlizes the trditionl routing pproch y llowing

More information

Template deed of assignment of intellectual property

Template deed of assignment of intellectual property Templte deed of ssignment of intellectul property User notes This document is intended for use y the founders of strt up compny to formlly trnsfer intellectul property relevnt to the usiness, products

More information

ON THE FRAME-STEWART ALGORITHM FOR THE TOWER OF HANOI

ON THE FRAME-STEWART ALGORITHM FOR THE TOWER OF HANOI ON THE FRAME-STEWART ALGORITHM FOR THE TOWER OF HANOI MICHAEL RAND 1. Introduction The Tower of Hnoi puzzle ws creted over century go by the number theorist Edourd Lucs [, 4], nd it nd its vrints hve chllenged

More information

Report on IFAD s investment portfolio for the third quarter of 2007

Report on IFAD s investment portfolio for the third quarter of 2007 Document: EB 2007/92/R.43 Agend: 15()(ii) Dte: 6 Novemer 2007 Distriution: Pulic Originl: English E Report on IFAD s investment portfolio for the third qurter of 2007 Executive Bord Ninety-second Session

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information