MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over

Size: px
Start display at page:

Download "MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11"

Transcription

1 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de l Informatque Laboratore Crstal Unversté de la Manouba, 00 Tunsa nes.korb@gmal.com Lela Azouz Sadane Ecole Natonale des Scences de l Informatque Laboratore Crstal Unversté de la Manouba, 00 Tunsa lela.sadane@ens.rnu.tn Abstract In ths paper, we propose to support a fxed prorty real tme scheduler over 80. protocol called Deadlne Monotonc (DM. e evaluate the performances of ths polcy for a smple scenaro where two statons wth dfferent delay constrants contend for the channel. For ths scenaro a Markov chan based analytcal model s proposed. From the mathematcal model, we derve the probablty dstrbuton of the packet servce tme at MAC layer. Analytcal results are valdated by smulaton usng the ns- network smulator.. Introducton The IEEE 80. wreless LANs [] become more and more relable to support applcatons wth Qualty of Servce (QoS requrements. Indeed, the IEEE 80.e standard [3] was recently proposed to offer servce dfferentaton over 80.. The IEEE 80.e standard proposes the Enhanced Dstrbuted Channel Access (EDCA as an extenson for the 80. Dstrbuted Coordnaton Functon (DCF. th EDCA, each staton mantans four prortes called Access Categores (ACs. Each access category s characterzed by a mnmum and a maxmum contenton wndow szes and an Arbtraton Inter Frame Space (AIFS. Even though the IEEE 80.e protocol ntroduces servce dfferentaton over 80., the granularty of servce offered by 80.e (4 prortes at most can not satsfy the real tme flows requrements (each flow s characterzed by ts own delay bound. Therefore, we propose n ths paper a new medum access mechansm based on the fxed prorty Deadlne Monotonc (DM polcy [8] to schedule real tme flows over 80.. To support the DM polcy over 80., we use a dstrbuted schedulng and ntroduce a new medum access backoff polcy. e then propose a Markov chan based analytcal model to evaluate the performances of DM for a smple scenaro where two statons wth dfferent deadlne constrants contend for the channel. Ths confguraton wll reflect the behavor of DM over 80. and the mathematcal model can be extended for more complex scenaros. 95

2 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 For the consdered confguraton, we evaluate for each staton the MAC layer servce tme dstrbuton. e can therefore derve the probablty that the packet servce tme exceeds a certan value. Analytcal results wll be valdated and extended by smulaton usng the ns- network smulator [9]. The rest of ths paper s organzed as follows. In secton, we revew the works related to our study. In secton 3, we present the dstrbuted schedulng and ntroduce the new medum access backoff polcy to support DM over 80.. In secton 4, we present the mathematcal model based on the Markov chans analyss. In secton 5, we evaluate the servce tme dstrbuton and present analytcal and smulaton results. Fnally, we conclude the paper n secton 6.. Related orks In the absence of a coordnaton pont, the IEEE 80. defnes the Dstrbuted Coordnaton Functon (DCF based on the Carrer Sense Multple Access wth Collson Avodance (CSMA/CA protocol. In the DCF protocol, a staton shall ensure that the channel s dle when t attempts to transmt. Then t selects a random backoff n the contenton wndow [,C ] 0, where C s the current wndow sze and takes ts values between the mnmum and the maxmum contenton wndow szes. If the channel s sensed busy, the staton suspends ts backoff untl the channel becomes dle for a Dstrbuted Inter Frame Space (DIFS after a successful transmsson or an Extended Inter Frame Space (EIFS after a collson. hen the backoff reaches 0, the packet s transmtted. A packet s dropped f t colldes after maxmum retransmsson attempts. Dfferent works have been proposed to evaluate the performance of the 80. DCF. Indeed, Banch [] proposed a Markov chan based analytcal model to evaluate the saturaton throughput of the 80. protocol. Probablstc bounds on MAC layer servce tme were derved n [0]. The IEEE 80.e performs servce dfferentaton over 80. and aggregates the traffc nto four access categores. In [4] and [5] Osterbo and Al. proposed to evaluate the performance of EDCA under saturated and non saturated condtons. Although the IEEE 80.e EDCA classfes the traffc nto four prortzed ACs, there s stll no guarantee of real tme transmsson servce. Ths s due to the lack of a satsfactory schedulng method for varous delay-senstve flows. In ths paper, we focus on delay senstve flows and propose to support the fxed prorty Deadlne Monotonc (DM polcy over 80. to schedule delay senstve flows. For nstance, we use a prorty broadcast mechansm smlar to [6] and ntroduce a new medum access backoff polcy where the backoff value s nferred from the deadlne nformaton. 3. Supportng Deadlne Monotonc Polcy over 80. The Deadlne Monotonc polcy (DM [8] s a real tme schedulng polcy that assgns statc prortes to flows packets accordng to ther deadlnes; the packet wth the small deadlne beng assgned the hghest prorty. Indeed, when flows packets arrve to a staton, they are sorted by ncreasng order of ther deadlnes such as the Head of Lne (HOL packet has the shortest delay bound. The problem that occurs wth the DCF s that all the statons share the same transmsson medum and the HOL packets of all the statons wll contend for the channel wth the same prorty even f they have dfferent deadlnes. 96

3 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 The dea of ntroducng DM over 80. s to allow statons havng packets wth short deadlnes to access the channel wth hgher prorty than those havng packets wth long deadlnes. Provdng such a QoS requres a dstrbuted schedulng and a new medum access polcy. 3.. Dstrbuted Schedulng To realze a dstrbuted schedulng over 80., we ntroduce a broadcast prorty mechansm smlar to [6]. In each staton, we focus on two packets: The current packet: the packet beng served. The HOL packet: the packet at the head of the queue that wll be transmtted after the servce completon of the current packet. Each staton mantans a local schedulng table wth entres for HOL packets of all other statons. Each entry n the schedulng table of node S comprses two felds ( S k, D k where S k s the source node MAC address (Address feld n DATA packet and RA feld n the ACK packet and D k s the deadlne of staton S k HOL packet. To broadcast the HOL packet deadlnes, we propose to use the DATA/ACK access mode. The deadlne nformaton requres two addtonal bytes to be encoded n DATA and ACK packets. hen a node S transmts a DATA packet, t pggybacks the deadlne of ts HOL packet. The nodes hearng the DATA packet add an entry for S n ther local schedulng tables by fllng the correspondng felds. The recever of the DATA packet copes the prorty of the HOL packet n ACK before sendng the ACK frame. All the statons that dd not hear the DATA packet add an entry for S usng the nformaton n the ACK packet. In the followng, we propose a new medum access polcy, where the backoff value s nferred from the packet deadlne. 3.. DM medum access backoff polcy Let s consder two statons S and S transmttng two flows wth the same deadlne D ( D s expressed as a number of 80. slots. The two statons havng the same delay bounds can access the channel wth the same prorty usng the natve 80. DCF. Now, we suppose that S and S transmt flows wth dfferent delay bounds D and D such as D < D and generate two packets at tme nstants t and t. If S had the same delay bound as S, ts packet would have been generated at tme t ' such as t ' = t + D, where D = ( D D. At that tme S and S would have the same prorty and transmt ther packets accordng to the 80. protocol. Hence, when S has a packet to transmt, t selects a 80. backoff, but suspends ths backoff durng D dle slots. The D slots elapsed, 80. backoff can therefore be decremented. Thus to support DM over 80., each staton uses a new backoff polcy where the backoff s gven by: The random backoff selected n [,C ] BAsc Backoff (BAB. 0, accordng to 80. DCF, called The DM Shftng Backoff (DMSB: corresponds to the addtonal backoff slots that a staton wth low prorty (transmttng a packet wth a large deadlne adds to ts 97

4 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 BAB to have the same prorty as the staton wth the hghest prorty (transmttng the packet wth the shortest deadlne. henever a staton reevaluated as follows: S sends an ACK or hears an ACK on the channel ts DMSB s DMSB ( S Deadlne( HOL( S DT ( S = ( mn where mn ( S table and ( HOL( DT s the mnmum of the HOL packet deadlnes present n S schedulng Deadlne S s staton S HOL packet deadlne. Hence, when S has to transmt ts HOL packet wth a delay bound D, t selects a BAB n the contenton wndow [ 0,Cmn ] and computes the hole Backoff (HB value as follows: ( S DMSB( S BAB( S HB = + ( The staton S decrements ts HB when t senses an dle slot. Now, we suppose that S senses the channel busy. If a successful transmsson s heard, then S revaluates ts DMSB when a correct ACK s heard. Then, S adds the new DMSB value to ts current BAB as n equaton (. hereas, f a collson s heard, S rentalzes ts DMSB and adds t to ts current BAB to allow colldng statons contendng wth the same prorty as for ther frst transmsson attempt. S transmts when ts HB reaches Mathematcal Model of the DM polcy over 80. In the hereby secton, we propose a mathematcal model to evaluate the performance of the DM polcy usng Markov chans analyss []. e consder the followng assumptons: The system under study comprses two statons S and S, such as S transmts a flow F havng a deadlne D and D < D. e defne D = ( D D as the dfference between the two delay bounds. e operate n saturaton condtons: each staton has mmedately a packet avalable for transmsson after the servce completon of the prevous packet []. 3 A staton selects a BAB n a contenton wndow[ 0, ]. e consder that each staton selects a 80. backoff n the same contenton wndow of sze ndependently of the transmsson attempt. Ths s a smplfyng assumpton to lmt the complexty of the mathematcal model. 4 e suppose that we are n statonary condtons,.e. the two statons have already sent one packet to each other. Thus, the two statons have the same schedulng table. Each staton S wll be modeled by a Markov chan representng the whole backoff (HB process. 98

5 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, Markov chan modelng staton S Fgure represents the Markov chan modelng staton S. Fgure : Markov chan modelng staton S The states of ths Markov chan are descrbed by the followng quadruplet ( R,, j, where: R : takes two values ~ S and S. hen R = ~ S, staton S s decrementng ts shftng backoff (DMSB durng D slots and wouldn t contend for the channel. hen R = S, the D slots were elapsed and S wll contend for the channel at the same tme as S. : the value of the BAB selected by S n [ 0, ]. ( j : corresponds to the remanng backoff slots before reachng 0. D : corresponds to ( D D. e choose the negatve notaton D for S to express the fact that S has a postve ΜΣΒ equals to D and DMSB( S = 0. D Intally ~ S,,, D, = 0... Durng ( D slots, S decrements ts backoff wth the probablty and moves to one of the states ( ~ S,, j, D, = 0.., j = mn( max( 0,,D. Indeed durng these slots, S s decrementng ts DMSB and wouldn t contend for the channel. hen S th decrements ts D slot t knows that henceforth, S can contend for the channel (the D slots were elapsed. Hence, S moves to one of the states ( S,, D, D, = D... If the BAB ntally selected by S s smaller than D, then S transmts when ts backoff reaches 0. If S transmts before S backoff reaches 0, the next packet of S wll decrement another DMSB and S wll see the channel free agan for D slots. S selects a random BAB and s n one of the states ( 99

6 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, Markov chan modelng staton S Fgure represents the Markov chan modelng staton S. Fgure : Markov chan modelng staton S Each state of S Markov chan s represented by the quadruplet (,k,d j, D S n [ 0, ]. : refers to the BAB value selected by k : refers to the current BAB value. D j : refers to the current DMSB of S, j n[ 0,D ]. D : corresponds to ( D. D where: hen S selects a BAB, ts DMSB equals,,d, D, = 0... If S observes the channel dle durng D slots, t moves to one of the states (,,0,D, = 0.., where t ends ts shftng backoff. At that tme, S begns decrementng ts basc backoff. If S transmts from the state (,,0,D, S rentalzes ts,,d,, =... shftng backoff and moves agan to one of the states ( 4.3. Blockng probabltes n the Markov chans D and s n one of states ( D e notce from fgure that when ~ S,, j, D, = 0.., j = mn( max( 0,,D, t decrements ts backoff wth the probablty. S s n one of the states ( That means that when S s n one of these states ( ~ S,, j, D decrementng ts DMSB and s n one of the states (,,D j, D j = 0.. ( D. S s n one of the states ( S,, D,, D.. (, t knows that S s, = 0.., However, when D =, S has already decremented ts DMSB and can now contend for the channel by decrementng ts basc backoff. In ths case, S wll be n one of the states,,0, D,,0,. ( ( = 0.. D =.. From the explanatons above, each staton Markov chan states can be dvded n two groups: 00

7 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 ξ : the set of states of S for whch S wll not contend (blue states n fgure. ξ {( S,, j, D, = 0.., j = 0..mn( max( 0,,D } = ~ γ : the set of states of staton S for whch S can con contend and decrements ts BAB (pnk states n fgure. γ {(,, D, D, = D.. } = S ξ : the set of states of S where S does not contend for the channel (blue states n fgure. ξ {(,,D j,d, = 0.., j = 0.. ( D } = γ : the set of states of S, where S contends for the channel (pnk states n fgure. γ {(,,0,D, = 0.. (,,0,D, =.. } = Thus when S s n one of the states of ξ, S s oblgatory n of the states of ξ. Smlarly, when S s n one of the states of γ, S s oblgatory n of the states of γ. hen the staton S s n one states of ξ, S s blocked wth the probablty τ, ths probablty corresponds to the probablty that S transmts gven that t s n one of the states of ξ. Thus: [ S transmts ξ ] ( ~S,0,0, D π τ = Pr = (3 mn( max( 0,,D ( ~S,, j, D π = 0 j= 0 ( R,, j, D here π s the probablty that S s n the state ( R,, j, D, n the ( R,,, D statonary condtons and { } j Π = π s the probablty vector of S. e also defne τ, the probablty that S s blocked gven that staton S s n one of the states of γ. Hence: ( S,D,0, D π τ = Pr[ S transmts γ ] = (4 ( S,, D, D π = D In the same way, when S s n one of the states of ξ, S wll decrement ts backoff wth the probablty. Indeed, no one of the ξ states corresponds to a transmsson state (those states descrbe the shftng backoff decremented by S. However, when S s n one of the states of γ, t contends for the channel and S s blocked wth the probablty τ, such as: [ S transmts γ ] ( 0,0,0,D π τ = Pr = (5 (,,0,D (,,0,D + (,k,d j, D where π s defned as the probablty of the state (,k,d j,d, n the (,k,d D statonary condton. Π { } j, = π s the probablty vector of S. = 0 π = π 0

8 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 The blockng probabltes descrbed above allow deducng the transton state probabltes and havng the transton probablty matrx P, for each staton S. Therefore, we can evaluate the state probabltes by solvng the followng system [7]: Π P = Π j = π j ( Transton probablty matrx of S Let P be the transton probablty matrx of P, j s the probablty to transt from state to state j. The transtons probabltes of staton S are: S and { } P {( ~ S,, j, D,( ~ S,, ( j +, D } =, =.. j = 0..mn(,D P {( ~ S,, D +, D,( S,, D, D } =, = D..( P {( ~ S,,, D,( ~ S,0,0, D } =, =.. (,D P {( S,, D, D,( S,(,( D, D } = τ = ( D +.. P {( S,, D, D,( ~ S,( D,( D, D } = τ, = ( D +.., (9 {( ~ S,0,0, D,( ~ S,,, D } =, = 0.., (7 (8 (0 ( ( P If ( D < then: {( S, D,0, D,( ~ S,,, D } =, = 0.. P (3 By replacng P and Π n (6 and solvng the resultng system, we can express ( R,, j, D π as a functon of τ, where τ s gven by ( Transton probablty matrx of S Let P be the transton probablty matrx of S. The transtons probabltes of S are: P = {(,,D j,d,(,,d ( j +,D } = τ, 0.., j = 0.. ( D {(,,D j,d,(,,d,d } =, = 0.., j = 0.. ( D {(,,0, D,(,,0,D } =, =.. {(,,0,D,( 0,0,0, D } τ {(,,0, D,(,,D,D }, =.. {(,,0,D,(,,D,D } =, =.. P P P P P (4 τ (5 τ (6 = (7 = τ (8 τ (9 0

9 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 {(,,0,D,(,,0,D } =, = 3.. P τ (0 {( 0,0,0, D,(,, D, D }, = 0.. P = ( By replacng P and Π n (6 and solvng the resultng system, we can express (,k,d j, D π as a functon of τ, τ gven respectvely by equatons (3, (4. Moreover, by ( R,, j, D replacng (,k,d j, D π and π by ther values, n equatons (3, (4 and (5, we obtan a system of non lnear equatons as follows: ( τ ( τ ( τ, τ τ = f τ = f τ = f under the constrant τ > 0, τ > 0, τ > 0, τ <, τ <, τ ( < Solvng the above system (, allows deducng the expressons of τ, τ and τ, and dervng the state probabltes of S and S Markov chans. 5. Servce Tme Analyss In ths secton, we evaluate the MAC layer servce tme dstrbuton of S and S, usng the DM polcy. The MAC layer servce tme s the tme nterval from the tme nstant that a packet becomes at the head of the queue and starts to contend for channel to the tme nstant that ether the packet s acknowledged for a successful transmsson or dropped. e propose to evaluate the Z-Transform of the MAC layer servce tme [0] to derve expressons of the servce tme dstrbutons. The servce tme depends on the duraton of an dle slot T e, the duraton of a successful transmsson T s and the duraton of a collson T c [4], [0]. e have: T T ( TPHY + TMAC + T p + TD + SIFS + ( TPHY + TACK + TD DIFS ( T + T + T + T EIFS = (3 s + = (4 c PHY MAC p D + where T PHY, T MAC and T ACK are the duratons of the PHY header, the MAC header and the ACK packet. T D s the tme requred to transmt the two bytes deadlne nformaton and T p s the tme requred to transmt the data payload. Statons hearng a collson wat durng EIFS before resumng ther packets. Tevent As T e s the smallest duraton event, the duraton of all events wll be gven by. Te 5.. Z-transform of staton S servce tme To evaluate the Z-transform of staton S servce tme TS ( Z, we defne: H( R,, j, D ( Z a basc backoff n [ 0, ] (.e. beng n one of the states ( S,,, D found n the state ( R,, j,. : The Z-transform of the tme already elapsed from the nstant S selects ~ to the tme t s D 03

10 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 e evaluate H( ( Z for each state of S Markov chan as follows: R,, j, D j H( ~ S,, j, D ( Z Z, j 0.. D = = (5 H( ~ S,,, D ( Z Z, D..(.. = = (6 Ts T e H( ~S,,, D ( Z Z H( ~S, D,, D ( Z = τ + + (7 =..max 0, D j ( ( j ( ~ S ( Z Z H( ( Z,..,, j, D = ~S,,, D = =..mn(,d D ( S ( Z Z H( ( Z,, D, D = ~S,,, D ( τ Z H( ( Z, = D..( H H + S,+, + D, D, (8 (9 mn(,d ( ( H ~S,0,0, D Z = + H( ~S,,, D ( Z (30 = If the staton ~ S,0,0, D, the transmsson wll be successful snce S was decrementng ts shftng backoff. hereas when the staton S transmsson state s ( S,D,0, D, the transmsson occurs successfully only f S doesn t transmt wth the probablty ( τ. Otherwse S selects another backoff and tres another transmsson. After m retransmssons, f the packet s not acknowledged, t wll be dropped. S transmsson state s ( TS + Z m c ( + ( τ H( ( Z Z τ H( ( Z T ( Z Z e H( ( Z Tc = Ts ~S,0,0, D S,D,0, D = 0 τ H ( S,D,0, D ( Z m+ T C,D,0, D (3 5.. Z-transform of staton S servce tme In the same way, we defne ( Z have: TS, the Z-transform of staton S servce tme. e H (,k,d ( Z j, D selects a basc backoff n [ 0, ] (.e. beng n one of the states (,,D, D tme t s found n the state (,k,d j,. : The Z-transform of the tme already elapsed from the nstant S to the H D = (3 (,,D, ( Z, = 0 and = D 04

11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 H Ts T D e (,,D,D ( Z = + Z H ( +,,0, ( Z, =.. To compute H (,,D j, ( Z, we defne T j ( Z D τ (33 dec such as: So: And: T 0 ( Z dec = (34 j ( τ Z T Z =, j =.. D (35 dec H j = ( τ Z Ts T j dec ( Z j (,,D j,d ( Z H (,,D j,d ( Z Tdec ( Z = +..D,(, j ( 0,D H (,,0,D ( Z = ( τ ZH ( ( Z +,,0,D ( τ ZH ( ( Z H τ Z,,0,D Ts D Tdec (,,0,D ( Z ( Z =, =.. ( τ ZH ( ( Z τ Z Ts T D dec +,,0,D ( Z, = 0..,, =.. (36 (37 (38 TS D ( 0,0,0,D ( Z = ( τ ZH ( ( Z T ( Z 0,,0,D dec ( τ ZH ( ( Z H + τ Z Ts,,0,D T D dec ( Z Therefore, we can derve an expresson of S Z-transform servce tme as follows: m+ Tc Ts T m c 0,0,0,D 0,0,0,D 0,0,0,D Z = 0 ( Z = τ Z H ( ( Z + ( τ Z H ( ( Z τ Z H ( ( 5.3. Servce Tme Dstrbuton Servce tme dstrbuton s obtaned by nvertng the servce tme Z transforms gven by equatons (3 and (40. But we are most nterested n tal behavour n terms of servce tme bounds,.e. the probablty that the servce tme exceeds a certan value. Probablstc bounds on servce tme can be derved by nvertng the complementary servce tme Z transform [4] gven by: (39 (40 05

12 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 X ~ ( Z ( Z TS = (4 Z In fgures 3(a to 3(d, we depct analytcal and smulaton values of the Complementary servce tme dstrbuton of both statons S and S. The curves are obtaned for dfferent values of the contenton wndow sze and for dfferent values of D ( D s gven n slots. The statons transmt 5 bytes data payload packets and we use the 80..b parameters (gven n table to determne the values of T e, T s and T c. Smulaton results are obtaned wth ns- network smulator [9]. Table : : 80. b parameters. Data Rate Mb/s Slot 0 µs SIFS 0 µs DIFS 50 µs PHY Header 9 µs MAC Header 7 µs ACK µs Short Retry Lmt 7 All the curves drop gradually to 0 as the delay ncreases. Staton S curves drop to 0 faster than staton S curves. Indeed, when = 3 and D = 4, the probablty that S servce tme exceeds 0.005s equals 0.8%. hereas, staton S servce tme exceeds 0.005s wth the probablty of 5.67%. Thus, DM offers better servce tme guarantees for the flow wth the hghest prorty. (a =6 (b =3 06

13 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 (c =64 (d =8 Fgure 3: Complementary Servce Tme Dstrbuton Moreover, we notce that each tme doubles ts sze, S and S servce tme curves become closer. Indeed, when becomes large, the basc backoff values selected by S and S ncrease. Hence, the shftng backoff slots (DMSB added by DM become neglgble compared to the basc backoff. The whole backoff values (HB of the two statons become near and ther servce tme accordngly Extended Smulaton Results In the above secton, we consdered a two staton scenaro where each staton transmts a real tme flow wth a gven delay bound. e showed that DM performs servce dfferentaton over 80. and offers better servce tme bounds for the flow wth the short deadlne. In ths secton, we consder a fve staton scenaro where each staton transmts a real tme flow wth a characterzed delay bound. For ths scenaro, we consder the default 80.b mnmum and maxmum wndows szes ( C mn = 3, C max = 04. Smulaton results show that the delay bounds on servce tme decrease wth the deadlne bounds. Moreover, as the dfference between flows deadlnes ncreases, the dfference between ther delay bounds ncreases. 07

14 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 (a D5=4 (b D5=8 (c D5= (d D5=6 Fgure 4: Complementary Servce Tme Dstrbuton (Extended Smulaton Results 6. Concluson In ths paper we proposed to support the DM polcy over 80. protocol. Therefore, we used a dstrbuted schedulng algorthm and ntroduced a new medum access backoff polcy. Then we proposed a mathematcal model to evaluate the performance of the DM polcy n terms of servce tme guarantees for a scenaro where two statons wth dfferent delay bounds contend for the channel. Analytcal and smulaton results show that DM performs servce dfferentaton over 80. and offers better servce tme guarantees for the flow havng the small deadlne. Moreover, as the dfference between flows deadlnes ncreases, the dfference between ther delay bounds ncreases. 7. References [] Banch, G., Performance Analyss of the IEEE 80. Dstrbuted Coordnaton Functon, IEEE J-SAC Vol. 8 N. 3, Mar. 000, pp [] IEEE 80. G, Part : reless LAN Medum Access Control (MAC and Physcal Layer (PHY specfcaton, IEEE

15 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 [3] IEEE 80. G, Draft Supplement to Part : reless Medum Access Control (MAC and physcal layer (PHY specfcatons: Medum Access Control (MAC Enhancements for Qualty of Servce (QoS, IEEE 80.e/D3.0, Jan [4] Engelstad, P.E. and Osterbo O.N., The Delay Dstrbuton of IEEE 80.e EDCA and 80. DCF, Proceedngs of the Internatonal Performance Computng and Communcatons Conference, Arzona, Apr [5] Engelstad, P.E., Osterbo, O.N, Delay and Throughput Analyss of IEEE 80.e EDCA wth Starvaton Predcton, In proceedngs of the The IEEE Conference on Local Computer Networks, LCN 05 (005. [6] Kanoda, V., L, C., Dstrbted Prorty Schedulng and Medum Access n Ad-hoc Networks, ACM reless Networks, Volume 8, Nov. 00. [6] Klenrock, L., Queung Systems,Vol., John ley, 975. [7] Klenrock, L., Queung Systems,Vol., John ley, 975. [8] Leung, J. Y. T., htehead, J, On the Complexty of Fxed-Prorty Schedulng of Perodc, Real- Tme Tasks, Performance Evaluaton (Netherlands, pp , Dec. 98. [9] McCanne, S., Floyd, S., The network smulator - ns-, [0] Zha, H., Kwon, Y., Fang, Y.,.Performance Analyss of IEEE 80. MAC protocol n wreless LANs., reless Computer and Moble Computng, 004. Authors Inès El Korb receved the engneerng degree and the Master degree n computer scence n 003 and 005 respectvely from l Ecole Natonale des Scences de l Informatque (ENSI, Unversté de la Manouba, Tunsa. Currently she s applyng for a PHD degree. From 004 she operates as a student researcher n cooperaton projects between l ENSI (Tunsa and l Insttut Natonal de Recherche en Informatque et en Automatque (INRIA n France. Lela Azouz Sadane s Professor at l ENSI, Tunsa. Her research nterests nclude performance evaluaton of QoS networks, wreless and sensor networks. From 004, she ntates many cooperaton projects between l ENSI and l INRIA n France. 09

16 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 0

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

An Analytical Model for the Capacity Estimation of Combined VoIP and TCP File Transfers over EDCA in an IEEE 802.11e WLAN

An Analytical Model for the Capacity Estimation of Combined VoIP and TCP File Transfers over EDCA in an IEEE 802.11e WLAN An Analytcal Model for the Capacty Estmaton of Combned VoIP and TCP Fle Transfers oer EDCA n an IEEE 802.11e WLAN Sr Harsha, Anurag Kumar, Vnod Sharma, Department of Electrcal Communcaton Engneerng Indan

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Performance modeling and analysis of mobile Internet access via cellular networks

Performance modeling and analysis of mobile Internet access via cellular networks Performance modelng and analyss of moble Internet access va cellular networks Master s thess Author: Taoyng Yuan Emal: tyuan@few.vu.nl Student ID: #1430610 Unversty: Supervsors: Vrje Unverstet Amsterdam

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks

A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks A Dstrbuted Algorthm for Least Constranng Slot Allocaton n MPLS Optcal TDM Networks Hassan Zeneddne and Gregor V. Bochmann, Unversty of Ottawa, Ottawa, ON-K1N 6N5 Abstract - In ths paper, we propose a

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Performance Limits and Analysis of Contention-based IEEE 802.11 MAC

Performance Limits and Analysis of Contention-based IEEE 802.11 MAC Performance Lmts and Analyss of Contenton-based IEEE 8211 MAC Shao-Cheng Wang and Ahmed Helmy Department of Electrcal Engneerng Unversty of Southern Calforna (shaochew helmy}@uscedu Abstract Recent advance

More information

Polling Cycle Time Analysis for Waited-based DBA in GPONs

Polling Cycle Time Analysis for Waited-based DBA in GPONs Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 03 Vol II, IMECS 03, March 3-5, 03, Hong Kong Pollng Cycle me Analyss for Wated-based DBA n GPOs I-Shyan Hwang, Jhong-Yue

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

Self-Adaptive SLA-Driven Capacity Management for Internet Services

Self-Adaptive SLA-Driven Capacity Management for Internet Services Self-Adaptve SLA-Drven Capacty Management for Internet Servces Bruno Abrahao, Vrglo Almeda and Jussara Almeda Computer Scence Department Federal Unversty of Mnas Geras, Brazl Alex Zhang, Drk Beyer and

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service Sangam - Effcent Cellular-WF CDN-P2P Group Framework for Fle Sharng Servce Anjal Srdhar Unversty of Illnos, Urbana-Champagn Urbana, USA srdhar3@llnos.edu Klara Nahrstedt Unversty of Illnos, Urbana-Champagn

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt.

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt. Chapter 9 Revew problems 9.1 Interest rate measurement Example 9.1. Fund A accumulates at a smple nterest rate of 10%. Fund B accumulates at a smple dscount rate of 5%. Fnd the pont n tme at whch the forces

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information