Performance modeling and analysis of mobile Internet access via cellular networks

Size: px
Start display at page:

Download "Performance modeling and analysis of mobile Internet access via cellular networks"

Transcription

1 Performance modelng and analyss of moble Internet access va cellular networks Master s thess Author: Taoyng Yuan Emal: tyuan@few.vu.nl Student ID: # Unversty: Supervsors: Vrje Unverstet Amsterdam Department of Computer Scence Prof. dr. R. D. van der Me Dr. S. Bhula

2 Acknowledgements I worked on ths thess between December 2004 and June 2005 at the Vrje Unverstet Amsterdam. I would not have been able to carry out the work wthout the followng people, whom I am deeply grateful to. Frst I would lke to thank my supervsors: Professor Rob van der Me and Dr. Sandja Bhula for all ther valuable help durng the last seven months. They have been a great source of nspraton for me and were always avalable to dscuss new deas or to answer my questons. They have helped me to get back on track several tmes. I would lke to gve my deepest thanks to my boyfrend, Rk Farenhorst, for hs enormous support and understandng throughout the last sx months. Wthout hs help, ths work would not have been possble for me. I would also lke to thank my parents for ther support and encouragement durng my work and ther endless support durng all my years n school. Taoyng Yuan Amsterdam, June 2005

3 Executve Summary Over the next few years, moble Internet access servces, (e.g. the WLAN), provdng Internet access anywhere and any tme are lkely to experence dramatc growth. A key success factor n the commercal success of these servces s performance, for example, n terms of throughput. Hence, for servce provders t s crucal to be able to predct the performance of ther networks under varous scenaros, ncludng the number of subscrbers and the locatons of the Access Ponts. Ths advocates the need for the development, valdaton and analyss of quanttatve models to descrbe and predct the performance experenced by the end user for any gven set of system parameters. In ths thess our research goal s to understand the mpact of the moblty of the moble termnal on performance of nternet access va cellular networks. Ths s accomplshed by the followng four parts. 1. Derve and valdate an approxmaton closed-form expresson for the aggregated throughput. 2. Develop the model to predct the performance of multple classes moble users n a sngle cell scenaro. And then, derve and valdate closed-form expressons for the average throughput and the total amount receved amount of receved data. 3. Extend our model to a multple-class moble users n a multple-cell - scenaro and derve the closed-form expressons of the performance. 4. Illustrate how to use those expressons to optmze the desgn of the cellular networks based on protocols.

4 Table of contents Acknowledgements. Executve Summary. Lst of Fgures Lst of Tables v 1 Introducton Introducton Motvaton for the research Research goal and approach Structure of ths thess Background Introducton Wreless networks The IEEE standard The protocol archtecture The MAC layer The Physcal Layer The Transmsson Control Protocol TCP Flow Control TCP Congeston Control Network smulator 2 (NS-2) Related work Conclusons The sngle-class sngle-cell model Introducton The sngle moble staton model Smulaton prelmnares Modelng the sngle moble staton case Numercal valdaton The multple statons sngle-class model Smulaton prelmnares Hdden node and RTS/CTS ssue Farness ssue Modelng multple statons case Smulaton valdaton Conclusons... 45

5 4 The mult-class sngle-cell model Introducton Model descrpton and analyss Smulaton valdaton Optmzaton of the model Fnd optmal locaton of Access Ponts Connecton Admsson control (CAC) Conclusons The multple-cell model Introducton The model of multple-cell and analyss Applcatons of the multple-cell model Performance evaluaton Optmal placement of Access Ponts Conclusons Conclusons Introducton Summary Contrbutons Future work.. 70 A Glossary 72 Appendx 74 Bblography 77 v

6 Lst of Fgures Fgure 1.1 Current wreless network systems. 2 Fgure 1.2 WLAN total publc users and total market penetraton. 2 Fgure 2.1 The protocol model 7 Fgure 2.2 Components of an WLAN system. 8 Fgure 2.3 Basc access mechansm 9 Fgure 2.4 InterFrame spacng n Fgure 2.5 The RTS/CTS access mechansm. 10 Fgure 2.6 Packetzaton on WLAN PHY layer wth Long Preamble and Header 11 Fgure 2.7 TCP congeston control mechansms 14 Fgure 3.1 Data transmsson n Fgure 3.2 TCP over WLAN connected to a Web Server Fgure 3.3 Throughput from smulaton results.. 25 Fgure 3.4 Average throughput: analyss versus smulaton Fgure 3.5 Hdden node problem n Fgure 3.6 No hdden nodes problem n NS Fgure 3.7 The moble staton s throughput as a functon of tme 30 Fgure 3.8 The statc staton s throughput as a functon of tme.. 30 Fgure 3.9 The total throughput.. 31 Fgure 3.10 Fracton of mean throughput Fgure 3.11 The three STAs ndvdual throughput as functon of tme.. 31 Fgure 3.12 The throughput sharng fracton between the statons 32 Fgure 3.13 The average throughput sharng fracton 32 Fgure 3.14 The moble staton s throughput. 33 Fgure 3.15 The total throughput of the AP. 33 Fgure 3.16 The average throughput sharng fracton 33 Fgure 3.17 Analyss system model 34 Fgure 3.18 State- transton-rate dagram for the nfnte-server case M/G/. 37 Fgure 3.19 The aggregated throughput from one run 39 Fgure 3.20 The average aggregated throughput of multple runs.. 39 Fgure 3.21 The average aggregated throughput of dfferent veloctes Fgure 3.22 Setup tme of each ndvdual staton.. 41 Fgure 3.23 Sojourn tme of each ndvdual staton Fgure 3.24 Setup tmes of each ndvdual staton wth dfferent veloctes. 42 Fgure 3.25 The setup tme as a functon of the average velocty.. 43 v

7 Fgure 3.26 Average throughput for each ndvdual staton wth dfferent veloctes Fgure 3.27 Model and smulaton s average throughput as a functon of the velocty.. 44 Fgure 3.28 The amount of receved data as a functon of the velocty.. 45 Fgure 4.1 Sngle access pont cell model 47 Fgure 4.2 The nstant aggregated throughput of two classes 51 Fgure 4.3 Setup tmes of each staton of two classes wth the same velocty Fgure 4.4 Setup tmes of each staton of two classes wth the dfferent veloctes Fgure 4.5 Average throughput for each staton wth velocty of 2 or Fgure 4.6 Average throughput for each staton wth velocty of 2 or Fgure 4.7 State- transton-rate dagram for the Erlang loss model Fgure 5.1 Example of the system topology of a multple cell scenaro. 59 Fgure 5.2 Cell dmensons. 63 Fgure 5.3 The shape of functon Fgure 5.4 E B ) as functon of λ E(S) for dfferent veloctes. 65 ( total Fgure 5.5 The total amount of receved data as functon of the number of cells (N) for dfferent veloctes. 66 v

8 Lst of Tables Table 1.1 WLAN standards versons.. 3 Table 3.1 The most mportant parameters for IEEE b. 25 Table 3.2 Comparson analyss vs. smulaton 26 Table 3.3 RTS/CTS solves the hdden node problem Table 3.4 Setup tme selectng rules Table 3.5 The parameters for smulatons.. 39 Table 3.6 The average aggregated throughput of dfferent veloctes 40 Table 3.7 The smulaton results of average setup tme for dfferent veloctes. 42 Table 3.8 The smulaton results vs. the model predcton of the average throughput Table 4.1 The parameters for smulatons and numercal results of the multple-class case. 50 Table 4.2 The aggregated throughput of the two classes case Table 4.3 The smulaton results vs. the model predcton of the average throughput Table 4.4 The smulaton results vs. the model predcton of total amount of receved data.. 55 Table 4.5 The total receved data wth dfferent gven AP locaton.. 55 Table 5.1 Numercal results of the optmzaton. 66 v

9 Chapter 1 Introducton 1.1 Introducton Ths chapter descrbes the global contents and context of ths Master s thess. The am of ths thess s to understand the mpact of the moblty of the moble termnal on performance of moble nternet servce va WLAN networks. Models are developed that measure performance as experenced by the end users n ths doman (n terms of throughput and total amount of receved data), for a gven set of desgn choces and realstc user-behavor scenaros. The followng paragraphs frst explan the research motvaton, after whch the research goals and the relevant research questons are presented. Ths chapter concludes by dscussng the structure of the remander of ths thess. 1.2 Motvaton for the research Over recent years, there has been an ncreasng trend towards personal computers and workstatons becomng portable and moble, and wreless technology now reaches or s capable of reachng vrtually every locaton on the face of the earth. Usng wreless network nterfaces, moble devces can be connected to the publc telephone network n the same way as wred telecommuncatons, or to the Internet n the same way as desktop computers are connected, usng the Ethernet, a token rng, or pont-to-pont lnks. Mllons of people exchange nformaton every day usng cellular telephones, and other wreless communcaton devces. The market for wreless communcatons has enjoyed tremendous growth. Wth the tremendous success of wreless telephony and messagng servces, t s hardly surprsng that moble Internet access servces (e.g., va cellular networks such as GPRS, UMTS, WLAN) whch provde Internet access anywhere and any tme are lkely to experence dramatc growth. Nowadays, there are three man wreless access technologes: Bluetooth, WLAN and 3G Wreless networks (e.g., GSM/GPRS, UMTS). Fgure 1.1 shows the comparson between them [Cesana 03]. The coverage of a transmttng node n a Bluetooth network s narrow (typcal maxmum range 10m), the coverage of a base staton n 3G Wreless networks s wde, (typcal maxmum range 1000m), and the coverage of an access pont n a Wreless Local Area Network (e.g., WLAN ) s medum, (typcal maxmum range 300m n outdoor scenaros). The typcal maxmum peak speed of Bluetooth s 1Mbps, the one of 3G s 115 Kbps, the one of b s 2 to 4 Mbps, and the one of a s 24 to 45 Mbps. Bluetooth s targeted on low costs, 10US$ n 2001 evolvng towards 5 US$ n Snce 3G moble cellular systems work n lcensed bands (e.g., 900, MHz), t s usually expensve for the servce provders to get the lcense. However, WLAN has moderate costs, 35 to 40 US$, because t works n the non-lcensed spectrum (2.4 and 5 GHz). Fast development of b WLANs has made b WLAN cards currently even cheaper than Bluetooth cards. Although 3G Wreless networks can provde hgh ubquty and moblty to customers and moble cellular technologes are evolvng from GPRS to UMTS, WLAN hotspots or networks are stll spreadng rapdly. They are cheap to nstall and offer much hgher data speeds than UMTS, although n a lmted area. 1

10 Fgure 1.1 Current wreless network systems WLAN technology was ntally desgned and mplemented for use nsde companes and buldngs, but later WLAN networks have spread out to publc places such as arports, hotels and cafes, whch see a hgh passage of people. The hotspots are deployed as network slands but n many places we are seeng hotspots mergng or expandng to cover parts of ctes or larger regons. W-F servces are even already avalable on nternatonal flghts operated by Lufthansa and Japan Arlnes. That s, passengers are able to check e- mal, send nstant messages and surf the Web at 30,000 feet. [Peters 05] Fgure 1.2 shows the number of WLAN total publc users, and the total market penetraton [Alonso 02]. It s predcted that there wll be n total 20.5 mllons WLAN users and the total market penetraton wll be 2.8 bllons US$. WLAN Total Publc Users WLAN Total Market Penetraton mllons bllons (US$) Fgure 1.2 WLAN total publc users and total market penetraton The wreless LAN ndustry s today one of the fastest growng segments of the communcatons ndustry. The frst generaton of wreless LAN specfcatons, referred to as , was developed for the 2.4 GHz mcrowave band and supported data speeds of 1-2Mbp/s. The ntroducton of the b specfcatons, known as "WF", sparked the launch of cheaper wreless LAN products, offerng data speeds of up to 11Mbp/s (although, 2

11 as wth all wreless LAN standards, data speeds dmnsh as more users work concurrently n each WLAN cell) [Pareek 05]. Today, the next generatons of a, g, and are amed at varous stages of development and mplementaton, and at ncreasng the speed, securty and qualty of wreless LANs. Ths s shown n Table 1.1 Untl now, all the standards from a to m have been released. Accordng to the Industral Economcs and Knowledge Center (IEK) of the Industral Technology Research Insttute (ITRI), n products wll become avalable n 2006 and start to take off n However, frst-generaton devces wll start emergng ths year. Supplers show keen nterest n the development of For nstance, Planex Communcaton Inc. has ntroduced a pre n-compatble WLAN card and a WLAN Access Pont (AP) n cooperaton wth Argo of the Unted States. Gemtek Technology Co. Ltd plans to ncrease ts R&D efforts on n and WMAX products durng CyberTan Technology Inc. wll develop WLAN models that adhere to both n and standards. D-Lnk Corp. has lkewse revealed plans to develop and launch n products wth enhanced user-frendly features [Tech 05]. Furthermore, several smaller ctes n US, such as Chaska, Mnn., have deployed ctywde W-F. Large ctes such as Phladelpha and San Francsco see wreless broadband technology as a low-cost soluton to provdng broadband access to low-ncome resdents. Phladelpha plans to have ts ctywde W-F network up and runnng by summer 2006 [Reardon 05]. In Adelade (Australa) the company Agle communcatons s also offerng WF throughout the cty for free [CtyLan]. Protocol Man Functon Protocol Man Functon verson verson a 5GHz OFDM PHY b 2.4GHz CCK PHY c brdgng d Internatonal roamng e QoS/effcency f Inter AP protocol enhancements g 2.4GHz OFDM PHY h 5GHz regulatory extensons Securty enhancements j Japan 5GHz band extensons k Rado resource measurement l Skpped (typographcally unsound) m Mantenance n Hgh throughput PHY Table 1.I WLAN standards versons Whereas wde area cellular networks are tradtonally speech-orented and WLANs are typcally nstalled as (extensons to wrelne) offce data networks, the evoluton of servces and the desre for seamless roamng underles the sgnfcant current nterest n the ntegraton of both network types. Swsscom [Swsscom 04] started to combne GPRS, UMTS and WLAN technologes, whch can offer users a natonwde broadband network. In addton, the moble termnal company DoCoMo [NTT 04] started to produce dual-mode 3G and wreless LAN phones. Ths s very useful for busness users wshng to work whle on the move (e.g., to access e-mals, ther company ntranet or the Internet) as well as for resdental users wth a need for bandwdth-ntensve applcatons such as the transfer of audo and vdeo fles. Moreover, a broadband wreless access technology WMAX (Worldwde Interoperablty for Mcrowave Access) s also developng, whch provdes hgh-throughput broadband connectons over long dstances. It s also called "802.16", whch seems to be a promsng extenson of WF, but wth a much broader coverage than WF (radus up to 50 km n rural areas), wth speeds up to 70 Mbps [McCullagh 05]. Whether t s 3G, WLAN or WMax, the customer s nterested n servces, not access technology. A key success factor n the commercal deployment of these servces s 3

12 performance, for example, n terms of throughput and total amount of retreved data. For nstance, GPRS can provde broad coverage and constant qualty of servce but the acheved bt rates are relatvely low. In WLAN on the other hand, the wreless channel has a hgher bt rate, but s shared among all users. Ths results n a hgh bt rate, f only a few users are served. Hence, for servce provders t s crucal to be able to predct the performance of ther cellular networks under varous scenaros, such as the number of subscrbers, the locatons of the base statons, and the moblty pattern of the users. Ths advocates the need for the development, valdaton and analyss of quanttatve models to descrbe and predct the performance experenced by the end user, for any gven set of system parameters. Examples of these parameters are: the locatons of the base statons, the number of subscrbers, the duratons of sessons, the download volume per sesson, the average load for each of the cells, etc. The IEEE standard s the de facto standard for wreless local area networks (WLANs). It has been deeply studed n the last few years, and a multplcty of papers has appeared n the lterature, coverng almost all aspects of the standard. A common problem n moble cellular networks s that the amount of transmsson capacty s lmted and shared among the dfferent users wthn the same cell. However, up to the knowledge of the authors, no satsfactory analytcal model of the nteracton between the user moblty and the network performance has been presented so far. 1.3 Research goal and approach The goal of ths project s to understand the mpact of the moblty of the moble termnal on performance of nternet access va cellular networks. To realze ths goal, the followng research questons are addressed. The key research questons can be stated as follows: How does the moblty of the user mpact the performance of hs moble nternet access? How can we use those valdated expressons to do the optmzatons? Although smulatons play an essental role n comparng competng desgn alternatves, smulatons of wreless network systems, especally wreless lnks, are sometmes unrelable. Ths may lead to ncorrect desgn choces. Generally, hgher accuracy n modelng requres more complexty of computaton. In ths case, t s desrable to have models wth low computaton complexty, whle mantanng the desred accuracy. If we can develop and study mathematcal models, t s not only fast but t can also gve us some nsght of the relatonshp between the factors n the network. Another advantage s that we can do what-f analyses,.e., we can predct the performance under any gven scenaro. Ths can never be done easly usng smulatons. To answer those research questons, quanttatve models are developed that predct the performance as experenced by the end users n ths doman (n terms of throughput and total amount of retreved data), for a gven set of desgn choces and realstc user-behavor scenaros. Smulatons are done to valdate those expressons of performance obtaned from the models. After that, system optmzaton can be done by usng those valdated approxmaton expressons for performance as a functon of system parameters. 4

13 1.5 Structure of ths thess The remander of ths thess s organzed n the followng way: The next chapter starts wth starts wth an ntroducton to the wreless networks. After ths, ntroductons of the IEEE protocol, the TCP protocol and the Network smulator are gven. After these ntroductons, the related work n ths area complements ths chapter. Chapter 3 frst derves the performance expresson for the sngle moble staton model, whch has been valdated by the smulatons. Based on the results of the prevous step, the multple statons n a sngle-class scenaro are analyzed. The expressons of the average throughput and the total amount of receved data of any number of statons are derved, whch also was thoroughly valdated by the smulatons. Chapter 4 focuses on the mult-class users n the sngle cell scenaro, that s, the users drve through one AP cell wth dfferent average veloctes. The approxmatng expressons of the performance are derved. Smulatons are run for valdatng the models. At the end of ths chapter, the practcal optmzaton usage of our model s analyzed. Chapter 5 focuses manly on nvestgated the performance of multple-class users across multple AP cells. We derved smple closed-form expressons for the average throughput and the total amount of receved data for any class of users. After that, we provded two examples on how our model can be used to analyze practcal problems. Chapter 6 presents the conclusons. Frst, a summary of the developed models are gven. Other topcs n ths chapter nclude a dscusson on what ths thess contrbutes to the research communty. The last paragraph focuses on future work. 5

14 Chapter 2 Background 2.1 Introducton Ths chapter starts wth an ntroducton to the wreless networks. Then, ntroductons of the IEEE protocols are gven n Secton 2.3. The related detals of the TCP protocol are present n Secton 2.4, and the ntroductons of Network smulator are gven n Secton 2.5. In Secton 2.6 related work n ths area complements ths chapter. 2.2 Wreless networks Wreless and network have become two commonly used words today. Many companes ether have products or present future products that are to be used n wreless network envronments. The concept of wreless networks ncorporates several dfferent networkng technologes, communcaton ranges and transmsson bandwdths. They range from local coverage networks (as IEEE ) to large wde area coverage networks, such as the thrd generaton moble telephony systems (e.g., GPRS, UMTS). The General Packet Rado Servce (GPRS) [ETSI 01] s part of the evoluton path towards thrd generaton (3G) moble systems. It s desgned to provde packet-based data servce n a cellular system based on GSM. It s an overlay to the crcut swtched GSMnetworks. GPRS ncreases the possble bandwdth for data transmsson by ntroducng packet swtchng. Inherently, packet-swtchng enables a more flexble and effcent utlzaton of the rado resources. In ths thess we concentrate on close range networks, whch are often called Wreless Local Area Networks (WLANs). Recently, hardware prces have dropped drastcally for nfrastructure equpment, and as a result of ths, WLANs are deployed almost everywhere. The most common standard for these networks today s the IEEE standard [IEEE 99]. There exst other standards such as HperLan/2 [HpGF], and HomeRF [HRF], but they are not so wdely used. WLAN usually operates on the lcense free ISM (Industry, Scence and Medcal) frequency band at 2.4GHz. And the extenson a s movng towards 5 GHz whch enables hgher transfer rates but decreases the coverage area. The transmsson bandwdth ranges from 1Mbt/s to approxmately 50Mbt/s and the possble communcaton dstance ranges from 30 to 1500m. 2.3 The IEEE standard Snce ths thess focuses on the TCP performance of the IEEE protocol, we only gve an explanaton of the general nformaton about standards that are related to our research. Further detals can be found n [IEEE 99] and [ b]. 6

15 The protocol archtecture The standard was frst standardzed by IEEE n 1997 and revsed n It defnes two layers, shown n Fgure 2.1. The frst layer s the Physcal layer (PHY), whch specfes the modulaton scheme used and sgnalng characterstcs for the transmsson through rado frequences. The second layer s the medum access control (MAC) layer. Ths layer determnes how the medum s used. Moblty of wreless statons may be the most mportant feature of a wreless LAN. A WLAN would not serve much purpose f statons were not able to move freely from locaton to locaton ether wthn a specfc WLAN or between dfferent WLAN segments. For compatblty purposes, the MAC must appear to the upper layers of the network as a standard 802 LAN. The MAC layer s forced to handle staton moblty n a fashon that s transparent to the upper layers of the 802 LAN stack. Ths forces functonalty nto the MAC layer that s typcally handled by upper layers. Fgure 2.1 The protocol model The archtecture s comprsed of several components and servces that nteract to provde staton moblty transparent to the hgher layers of the network stack, shown n Fgure 2.2. An network, n general, conssts of Basc Servce Sets (BSSs) that are nterconnected wth a Dstrbuton System (DS). Each BSS conssts of moble nodes (referred to as statons, Wreless LAN Staton (STA)). The staton s the most basc component of the wreless network. A staton s any devce that contans the functonalty of the protocol, e.g., a laptop PC, handheld devce, or an Access Pont. Statons n a BSS gan access to the DS and to statons n remote BSSs through an Access Pont (AP). The access ponts communcate amongst themselves to forward traffc from one BSS to another to facltate movement of statons between BSSs. The access pont performs ths communcaton through the dstrbuton system. The dstrbuton system s the backbone of the wreless LAN and may consst of ether a wred LAN or a wreless network. Before a staton can access the wreless medum t has to be assocated wth an AP. A staton can be assocated wth only one AP at any gven tme. A network of nterconnected BSSs, as n Fgure 2.2, n whch mobles can roam wthout loss n connectvty, s frequently referred to as an Extended Servce Set (ESS). The IEEE standard also specfes an addtonal ad-hoc archtecture for a WLAN. Ad-hoc WLANs are characterzed by lack of an AP, no functonalty to support moblty, and support for data transfer only between statons that belong to the same WLAN. Therefore, an ad hoc WLAN s smply an ndependent BSS where a staton communcates drectly wth one or more other statons. In our studes, we focus on the ESS as n Fgure

16 Fgure 2.2 Components of an WLAN system The MAC layer The MAC layer provdes functonalty to allow relable data delvery for the upper layers over the wreless PHY meda. The data delvery tself s based on an asynchronous, best-effort, connectonless delvery of MAC layer data. The standard provdes two modes of operaton. The basc access method n the MAC protocol s the Dstrbuted Coordnaton Functon (DCF) whch s best descrbed as the Carrer Sense Multple Access wth Collson Avodance (CSMA/CA) protocol [IEEE 99]. In addton to the DCF the also ncorporates an alternatve optonal access method known as the Pont Coordnaton Functon (PCF) an access method that s smlar to pollng and uses a pont coordnator (the AP) to determne whch staton has the rght to transmt. Ad-hoc WLANs support only the DCF snce they lack an AP. Most of the WLAN cards actually avalable on the market do not mplement PCF for complexty reasons. Snce the PCF s not the prmary concern of my study, ts operaton s not covered here. DCF offers two access methods; Basc Access (BA) and ready to send/clear to send (RTS/CTS). The basc access method When usng the DCF basc access mode, a staton, before ntatng a transmsson, senses the state of the channel to determne f another staton s transmttng. If the medum s determned to be dle for an nterval that exceeds the Dstrbuted InterFrame Spacng (DIFS), the staton proceeds wth ts transmsson. If the medum s busy, the staton defers untl after a DIFS s detected and then generates a random backoff perod for an addtonal deferral tme before transmttng. Ths mnmzes collsons durng contenton between multple statons. The backoff perod s used to ntalze the backoff tmer. The backoff tmer s decremented only when the medum s dle; t s frozen when the medum s busy. After a busy perod the decrementng of the backoff tmer resumes only after the medum has been free longer than DIFS. A staton ntates a transmsson when the backoff tmer reaches zero. The length of the backoff nterval, expressed n slots, s unformly chosen n the set {0,1,, CW-1}, where CW denotes the actual contenton wndow sze. At the begnnng, the contenton wndow takes an ntal value of CWmn for each frame queued for transmsson. To reduce the probablty of collsons, the contenton wndow of the statons nvolved n the collson s doubled and another transmsson attempt s made. The contenton wndow cannot grow ndefntely, but may reach a maxmum value of 2 γ CWmn = CWmax, and then the contenton wndow wll reman at CWmax for the remanng retres; 8

17 moreover, f a packet ncurs m collsons, where m γ, t s dropped. The set of CW values are 7 (CWmn), 15, 31, 63, 127, 255 (CWmax) [IEEE 99]. Snce no channel load sensng mechansm s provded,.e., a transmtter cannot determne f the data frame was successfully receved by lstenng to ts own transmsson as n wred LANs, an explct acknowledgement s necessary to nform the staton of the success/falure of ts transmsson. To do that, Immedate postve acknowledgements are employed to determne the successful recepton of each data frame. Ths s accomplshed by the recever ntatng the transmsson of an acknowledgement frame after a tme nterval Short InterFrame Spacng (SIFS), whch s less than DIFS, mmedately followng the recepton of the data frame. In case an acknowledgement s not receved the data frame s presumed lost and a retransmsson s scheduled (by the transmtter). Ths access method referred to as the Basc Access mechansm s summarzed n Fgure 2.3 [Ltjens 03_1]. Fgure 2.3 Basc access mechansm Fgure 2.4 InterFrame spacng n The standard encompasses also an Extended Interframe Spacng (EIFS), whch s used whenever the PHY ndcates to the MAC that a frame recepton was not successfully completed. EIFS s provded to let the transmttng staton retransmt the packet wthout nterference from the recevng staton. However, under the assumpton of deal channel condtons, EIFS does not have a great mpact on network performance. Ths s due to the fact that EIFS acts at the recever sde. As an example, consder a par of nodes exchangng data. In such a stuaton, collsons may clearly occur. However, snce a transmttng node cannot receve data, nodes wll become aware of the falure of a transmsson attempt only 9

18 by means of the ACK tmeout expraton. Thus, EIFS wll never be used. Hence, even f EIFS may actually be used when there are more than two nodes contendng for the channel, we wll, n the followng, neglect ts mpact on network performance. The dfferent Mac layer nterframe space tme s summarzed n Fgure 2.4 [IEEE 99]. RTS/CTS access method The DCF also provdes an alternatve way of transmttng data frames that nvolve transmsson of specal short Request To Send (RTS) and Clear To Send (CTS) frames pror to the transmsson of the actual data frame. Ths RTS/CTS mechansm s used to avod the well-known hdden termnal problem of CSMA-based MAC protocols. In the basc access method, a data frame could be corrupted by transmssons due to statons that are hdden from the transmtter any tme durng the transmsson of the data frame. The above leads to an ncreased probablty of collsons, and the transmsson tme wasted as a result of each collson. Ths wasted tme s sgnfcant snce the transmtter s made aware of a collson only after t tmes out watng for the correspondng acknowledgement. The RTS/CTS exchange attempts to perform a fast collson detecton and a transmsson path check. A successful exchange of RTS and CTS frames attempts to reserve the channel for the tme duraton needed to transfer the data frame under consderaton. The rules for the transmsson of an RTS frame are the same as those for a data frame under basc access,.e., the transmtter sends an RTS frame after the channel has been dle for a tme nterval exceedng DIFS. On recevng an RTS frame the recever responds wth a CTS frame (the CTS frame acknowledges the successful recepton of an RTS frame), whch can be transmtted after the channel has been dle for a tme nterval exceedng SIFS. After the successful exchange of RTS and CTS frames the data frame can be sent by the transmtter after watng for a tme nterval SIFS. In case a CTS frame s not receved wthn a predetermned tme nterval, the RTS s retransmtted followng the backoff rules as specfed n the basc access procedures outlned above. The channel access method usng RTS and CTS frames s summarzed n Fgure 2.5 [Ltjens 03_1]. Fgure 2.5 The RTS/CTS Access Mechansm The RTS and CTS frames contan a duraton feld that ndcates the perod the channel s to be reserved for transmsson of the actual data frame. Ths nformaton s used by statons that can hear ether the transmtter and/or the recever to update ther Net Allocaton Vectors (NAV) - a tmer that s always decreasng f ts value s non-zero. A staton s not allowed to ntate a transmsson f ts NAV s non-zero. The use of NAV to determne the busy/dle status of the channel s referred to as the Vrtual Carrer sense mechansm. Snce statons that can hear ether the transmtter or the recever resst from transmttng durng the transmsson of the data frame under consderaton the probablty of ts success s ncreased. However, ths ncrease n the probablty of successful delvery s acheved at the expense of the ncreased overhead nvolved wth the exchange of RTS and CTS frames, whch can be sgnfcant for short data frames. 10

19 The physcal layer The physcal layer (PHY) s the nterface between the MAC and the wreless meda where frames are transmtted and receved provdes three dfferent PHY defntons. Both Frequency Hoppng Spread Spectrum (FHSS) and Drect Sequence Spread Spectrum (DSSS) support 1 and 2 Mbps data rates. An extenson to the archtecture (802.11a) defnes dfferent multplexng technques that can acheve data rates up to 54 Mbps. Another extenson to the standard (802.11b) defnes 11 Mbps and 5.5 Mbps data rates (n addton to the 1 and 2Mbps rates) utlzng an extenson to DSSS called Hgh Rate-Drect Sequence Spread Spectrum (HR-DSSS), also known as Complementary Code Keyng (CCK). However, the MAC mechansms descrbed n the above secton are unchanged for IEEE b, so generally b can be treated as a legacy wth a hgher access rate [802.11b]. Currently b WLAN s wdely appled and has replaced most legacy WLANs. So we focus on the DSSS, and, furthermore, use the parameters descrbed for operatons n the 2.4 GHz ISM band, known as b. The PHY defnes a packet structure wth three major parts, the preamble, header, and payload. Two dfferent preambles and headers are defned: the mandatory Long Preamble and header and an optonal Short Preamble and header. Fgure 2.6 shows the format for the Long PHY protocol data unts (PPDU). Most b statons manly support only the Long Preamble and header mode. The Short Preamble and header mode s ntended for operatons where maxmum throughput between the statons s desred and nteroperablty wth legacy equpments s not a consderaton. Our research s manly based on the b standards and only the Long Preamble and header mode are consdered. Furthermore, dfferent parts are transferred wth dfferent data rates. For example, n the case of the Long Preamble and header a long preamble of 144 bts s used. Both preamble and header are transmtted wth a 1 Mbps data rate. The bts of the Payload (real data), however, use b, and can thus be transmtted wth 11Mbps. Fgure 2.6 Packetzaton on WLAN PHY layer wth Long Preamble and Header 11

20 2.4 The Transmsson Control Protocol Transport protocols have an mportant functon n data transmsson over the Internet. The protocols, whch are manly used, are the User Datagram Protocol (UDP) and the Transmsson Control Protocol (TCP). Snce wreless access to the Internet s the most common applcaton of ths knd of networks, t s reasonable to assume that the traffc wll be carred over the well-known TCP/IP protocol sute. Hence, we only explan the TCP protocols n more detals below. The transmsson control protocol [TCP] s the standard transmsson layer protocol for provdng a pont-to-pont full-duplex connecton-orented servce. In contrast to UDP, a TCP necesstates a connecton to be set up and kept alve between two hosts for sendng a certan amount of data. A three-way handshake s done to nform each other about allocated buffers (sender and recever) and ntal values of sequence numbers one for the sender and one for the recever. The sequence number s ncreased when each new segment sent and s used to keep track of the segments n the transmsson. The recever n turn, wll send socalled acknowledgement (ACK) packets. Wth the bult-n feedback mechansm, a TCP source can detect f a packet has been lost and has to be transmtted agan, thus provdng a relable transfer of data. The feedback mechansm also makes t possble for TCP to detect the network condtons, upon whch ts sendng rate s calculated. TCP adds more overhead to the network than UDP. Besdes the addtonal TCP ACK packets, TCP s header s also larger than UDP. To regulate the rate at whch segments are sent, TCP mplements two control mechansms, the flow control and the congeston control TCP flow control TCP s flow control s a technque whose prmary purpose s to properly match the transmsson rate of the sender to that of the recever and the network. TCP s flow control s end-to-end, whch means that the sender must not nject nto the network more than the recever can hold n ts buffer. It s mportant for the transmsson to be at a hgh enough rate to ensure good performance, but also to protect aganst overwhelmng the network or the recevng host. Ths control s done wth a wndow that lmts the number of packets the sender can nject nto the network and that sldes when the sender receves an acknowledgement sayng that the recever has correctly receved some data and handed them to the applcaton. A sendng staton s allowed to transmt more packets durng one RTT. The tme nterval between the moment a sgnal s sent and the moment a response s receved s defned as the Round-Trp Tme (RTT). The RTT contans two major components. The frst one s a fxed part that s caused by the propagaton delay. The second component s a varable part that s caused by queung delays, whch depend on the degree of congeston at the transmsson lnks. The maxmum number of outstandng packets, whch have been sent and are stll not acknowledged, s determned by a recever advertsed wndow, mantaned at the sender. The sze of the advertsed wndow s determned at the recever, by subtractng buffer space used from the buffer allocated. Ths wndow s advertsed by the recever at the connecton set-up perod and t s updated durng the connecton lfetme f the buffer space at the recever changes. Snce the sender knows the number of unacknowledged segments, t can compare ths wth the advertsed wndow to make sure that t does not overflow the recever buffer. 12

21 TCP congeston control TCP congeston control and Internet traffc management ssues n general are an actve area of research and expermentaton. Congeston control n data networks means that the dfferent sources must adapt ther transmsson rates as a functon of network load. The rate control n TCP s done by changng the sze of a congeston wndow that has been added to the protocol [Jacobson 88] and that also lmts the number of packets the source can transmt before the recept of an acknowledgement. Furthermore, ths wndow s upper bounded by the recever wndow for end-to-end flow control purposes [Stevens 97]. The congeston control mechansm of TCP conssts of four dfferent algorthms: slow start, congeston avodance, fast retransmt and fast recovery [Stevens 97]. They act together to try to avod overflowng ntermedate router buffers n the network between the sender and recever. Congeston control uses an addtonal congeston wndow, to regulate the senders transmsson rate. The amount of unacknowledged data must be less than or equal to the mnmum of congeston wndow and recever advertsed wndow.[jacobson 90]. Below we present a bref descrpton of these features. Slow start Slow Start s a mechansm used by the sender to control the transmsson rate, otherwse known as the sender-based flow control. Ths s accomplshed through the return rate of acknowledgements from the recever. In other words, the rate of acknowledgements returned by the recever determnes the rate at whch the sender can transmt data. As stated before, the sender n each TCP connecton mantans a wndow of the maxmum number of outstandng packets, the so-called congeston wndow (C wnd ). At the same tme there s also an advertsed wndow by the recever. When a new TCP connecton s establshed n a network, the Slow Start algorthm ntalzes the C wnd to one segment, whch s the maxmum segment sze (MSS) ntalzed by the recever durng the connecton establshment phase. When acknowledgements are returned by the recever, the congeston wndow ncreases by one segment for each acknowledgement returned. Thus, the sender can transmt the mnmum of the congeston wndow and the advertsed wndow of the recever, whch s smply called the transmsson wndow. Ths provdes an exponental ncrease of C wnd durng slow start n each RTT. The maxmum number of ongong packets s ncreased accordngly. Congeston avodance Durng the ntal data transfer phase of a TCP connecton the Slow Start algorthm s used. However, there may be a pont durng the Slow Start that the network s forced to drop one or more packets due to overload or congeston. If ths happens, Congeston Avodance s used to slow the transmsson rate. In the Congeston Avodance algorthm a retransmsson tmer exprng or the recepton of duplcate ACKs can mplctly sgnal the sender that a network congeston stuaton s occurrng. If the sender detects that the lnk s congested, TCP s Congeston Avodance algorthm apples. At the establshment of a TCP connecton the SlowStart Threshold (SSThresh) s set to a default value, whch s dependent on the TCP mplementaton. At the moment that the sender s aware of lnk congeston,.e., tme-outs or duplcated ACKs have occurred, t sets SSThresh to one-half of the current wndow sze C wnd (the mnmum of the congeston wndow and the recever's advertsed wndow sze) and sets C wnd to one. It means that the TCP source has to do slow start agan. At a gven moment C wnd wll be greater than SSThresh (half way to the prevous congeston pont), and then collson avodance wll take over. From now on C wnd wll ncrease by 1/ C wnd at each successful recepton of each ACK. Ths results n an ncrease of one C wnd n each RTT, as opposed to the exponental ncrease durng slow start. If congeston was ndcated by duplcate ACKs, the Fast Retransmt (and/or Fast Recovery) algorthms are nvoked (see below). 13

22 Fast retransmt When a duplcate ACK s receved, the sender does not know f t s because a TCP segment was lost or smply that a segment was delayed and receved out of order at the recever. If the recever can re-order segments, t should not be long before the recever sends the latest expected acknowledgement. Typcally no more than one or two duplcate ACKs should be receved when smple out of order condtons exst. If however more than two duplcate ACKs are receved by the sender, t s a strong ndcaton that at least one segment has been lost. In ths case, the sender does not even wat for a retransmsson tmer to expre before retransmttng the segment (as ndcated by the poston of the duplcate ACK n the byte stream). Ths process s called the Fast Retransmt algorthm and was frst defned n [Jacobson 90]. In Fgure 2.7 the slow start, collson avodance and fast retransmt mechansm of a TCP connecton are llustrated. Fgure 2.7 TCP congeston control mechansms 2.5 Network smulator 2 (NS-2) In most studes on moble ad hoc networks, smulatons are used for the evaluaton of network protocols and devces under certan specfc condtons. Of the dfferent academc and commercal network smulaton tools, n ths project, we wll focus on one such academc network smulaton tool called the Network Smulator or mostly referred to as NS-2. The Network Smulator 2 (NS-2) s commonly used and wdely accepted n the networkng research communty as the basc smulatng tool for network evaluatons, mostly because t s open-source [Fall 97], [NS-2]. NS-2 s a dscrete event smulator targeted at networkng research. NS-2 provdes substantal support for smulaton of TCP, routng, and multcast protocols over wred and wreless (local and satellte) networks. Because of ts good TCP mplementatons, t has been often used to smulate and evaluate TCP performance as well. 14

23 Berkeley released the ntal code that made wreless network smulatons possble n NS-2. That code provded some support to model wreless LANs, but was farly lmted. As a result of the Monarch project at Carnege Mellon Unversty [CMU] the smulator was extended wth support for node moblty, a realstc physcal layer, rado network nterfaces and an mplementaton of the IEEE DCF MAC protocol. Ths work was presented as part of a larger study of performance for dfferent ad-hoc routng protocols. It was ths contrbuton that made t possble to perform real wreless smulatons [Broch 99] wth NS. NS-2 s an event based smulator, where a scheduler actvates events sequentally. The dea of a dscrete event scheduler s that actons may only be started as a result of an event. At present, there are four dfferent schedulers whch use dfferent data structures mplemented n NS. Usually the scheduler selects the next event from the event queue and fnshes t. After that the next event s taken and so on. There are no parallel operatons n NS. If two or more events have same startng tme, the scheduler selects the event that was frst put nto the event queue. NS-2 s a hybrd of C++ and OTcl (Object Tcl) programmng languages. OTcl works manly as a confguraton and command nterface but s also a part of an mplementaton of NS. Ths 'two language'- dlemma s also the orgn of the some problems encountered n NS; whle C++ has to be compled, OTcl s nterpreted. One great beneft of ths s that there s no need to recomple the smulator between dfferent smulatons snce you are able to set up topology, lnk bandwdth, traffc sources, etc. from the OTcl scrpts. So, once you have mplemented the basc functonalty wthn the smulator (C++ code) you only have to change the OTcl scrpts to run varous smulatons. The underlyng channel model n NS-2 s qute smple. Each moble node has a poston and a velocty and moves around on a topography that s specfed usng ether a dgtal elevaton map or a flat grd. The poston of a moble node can be calculated as a functon of tme, and s used by the rado propagaton model to calculate the propagaton delay from one node to another and to determne the power level of a receved sgnal at each moble node. Each moble node has one or more wreless network nterfaces, wth all nterfaces of the same type (on all moble nodes) lnked together by a sngle physcal channel. When a network nterface transmts a packet, t passes the packet to the approprate physcal channel object. Ths object then computes the propagaton delay from the sender to every other nterface on the channel and schedules a packet recepton event for each. Ths event notfes the recevng nterface that the frst bt of a new packet has arrved. At ths tme, the smulator calculates the recevng power Pr for every transmsson between two nodes wth the chosen propagaton model. The power level s compared to two dfferent values: the carrer sense threshold CS Thresh and the receve threshold RX Thresh. The channel model dstngushes prmarly between three cases. In case Pr s greater than the recevng threshold RX Thresh, the transmsson has enough power to allow proper recepton at the recever sde. Other smultaneous transmssons wth reasonable transmsson powers may certanly nterfere wth ths transmsson and make a correct recepton mpossble. Then the packet s smply handed up to the MAC layer. If Pr s below RX Thresh but greater than the carrer sense threshold CS Thresh, the packet s marked as a packet n error before beng passed to the MAC layer and the recevng node must drop the packet. However, the recevng power of ths transmsson s stll strong enough to nterfere wth other smultaneous transmssons. Consequently, these nterfered packets are also nvald and nodes must drop them as well. Transmssons wth recevng powers Pr smaller than CS Thresh do not even obstruct other smultaneous transmssons at the same node. And the packet s dscarded as nose. 15

24 To allow reasonable smulatons wthn an acceptable amount of tme, propagaton models must smplfy calculatons and reduce the requred computaton to a mnmum. The network smulator NS-2 knows three dfferent propagaton models to smulate wreless ad hoc networks, the free space (FS) model, the two ray ground (TRG) model and the shadowng model. The Rcean and Raylegh model s extended by the ARC Group of Carnege Mellon Unversty [Punnoose 00]. In our research s smulaton, the TRG model s used. More detals are descrbed n the next chapter. Once the MAC layer receves a packet, t checks to nsure that ts receve state s presently dle. If the recever s not dle, one of the followng two thngs can happen. If the power level of the packet already beng receved s at least 10 db greater than the receved power level of the new packet, we assume that capture ths packet, dscard the new packet, and allow the recevng nterface to contnue wth ts current receve operaton. Otherwse, a collson occurs and both packets are dropped. If the MAC layer s dle when an ncomng packet s passed up from the network nterface, t smply computes the transmsson tme of the packet and schedules a packet recepton complete event for tself. When ths event occurs, the AC layer verfes that the packet s error-free, performs destnaton address flterng, and passes the packet up the protocol stack. The lnk layer mplements the complete IEEE standard [IEEE 99] Medum Access Control (MAC) protocol Dstrbuted Coordnaton Functon (DCF) n order to accurately model the contenton of nodes for the wreless medum. DCF s desgned to use both physcal carrer sense and vrtual carrer sense mechansms to reduce the probablty of collsons due to hdden termnals. The transmsson of each uncast packet s preceded by a Request-to-Send/Clear-to-Send (RTS/CTS) exchange that reserves the wreless channel for transmsson of a data packet. Each correctly receved uncast packet s followed by an Acknowledgment (ACK) to the sender, whch retransmts the packet a lmted number of tmes untl ths ACK s receved. Broadcast packets are sent only when vrtual and physcal carrer sense ndcates that the medum s clear, but they are not preceded by RTS/CTS and are not acknowledged by ther recpents. 2.6 Related work A lot of research s done n the feld of performance modelng of the IEEE protocol. Most of the earler work s focused on the smulaton of the effcency of the IEEE protocol, by nvestgatng the maxmum throughput that t can acheve under varous network confguratons, e.g., [Wenmller 97]. Banch developed and analyzed a detaled mathematcal performance model of DCF [Babch 00], whch has been mproved later by Wu et al [Wu 02]. Both papers have studed the saturaton throughput of IEEE s MAC layer, whch represents the maxmum load the system can carry n stable condtons. Next to ths, both assume a smplfed physcal layer model. They propose to model the MAC access mechansm wth a Markov Chan, neglectng only mnor dependences among the behavor of dfferent statons. Ths yelds an accurate approxmaton for the WLAN saturaton throughput. However, persstent UDP flows nstead of TCP are studed n ther work, whch means that the sources always have packets ready to send n ther queue. Based on ths Markov Chan model, the stuaton wth non-persstent traffc sources s studed n [Ltjens 03_2] and [Wnands 04]. The number of actve statons vares dynamcally n tme accordng to the ntaton and completon of fle transfers at random tme nstants. In ther research they have proposed an ntegrated packet/flow level modelng approach. On packet level the WLAN DCF performance can be modelled usng a dscrete 16

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Chapter 3: Dual-bandwidth Data Path and BOCP Design

Chapter 3: Dual-bandwidth Data Path and BOCP Design Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.

More information

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service Sangam - Effcent Cellular-WF CDN-P2P Group Framework for Fle Sharng Servce Anjal Srdhar Unversty of Illnos, Urbana-Champagn Urbana, USA srdhar3@llnos.edu Klara Nahrstedt Unversty of Illnos, Urbana-Champagn

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Dimming Cellular Networks

Dimming Cellular Networks Dmmng Cellular Networks Davd Tpper, Abdelmounaam Rezgu, Prashant Krshnamurthy, and Peera Pacharntanakul Graduate Telecommuncatons and Networkng Program, Unversty of Pttsburgh, Pttsburgh, PA 1526, Unted

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535 VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

GR-303 Solution For Access Gateways

GR-303 Solution For Access Gateways GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Section C2: BJT Structure and Operational Modes

Section C2: BJT Structure and Operational Modes Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network Self-Motvated Relay Selecton for a Generalzed Power Lne Montorng Network Jose Cordova and Xn Wang 1, Dong-Lang Xe 2, Le Zuo 3 1 Department of Electrcal and Computer Engneerng, State Unversty of New York

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

Outsourcing inventory management decisions in healthcare: Models and application

Outsourcing inventory management decisions in healthcare: Models and application European Journal of Operatonal Research 154 (24) 271 29 O.R. Applcatons Outsourcng nventory management decsons n healthcare: Models and applcaton www.elsever.com/locate/dsw Lawrence Ncholson a, Asoo J.

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information