An Analytical Model for the Capacity Estimation of Combined VoIP and TCP File Transfers over EDCA in an IEEE e WLAN

Size: px
Start display at page:

Download "An Analytical Model for the Capacity Estimation of Combined VoIP and TCP File Transfers over EDCA in an IEEE 802.11e WLAN"

Transcription

1 An Analytcal Model for the Capacty Estmaton of Combned VoIP and TCP Fle Transfers oer EDCA n an IEEE e WLAN Sr Harsha, Anurag Kumar, Vnod Sharma, Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore , Inda Emal: {harshas, anurag, nod}@ece.sc.ernet.n Abstract In ths paper we deelop and numercally explore the modelng heurstc of usng saturaton attempt probabltes as state dependent attempt probabltes n an IEEE e nfrastructure network carryng packet telephone calls and TCP controlled fle downloads, usng Enhanced Dstrbuted Channel Access EDCA. We buld upon the fxed pont analyss and performance nsghts n [1]. When there are a certan number of nodes of each class contendng for the channel.e., hae nonempty queues, then ther attempt probabltes are taken to be those obtaned from saturaton analyss for that number of nodes. Then we model the system queue dynamcs at the network nodes. Wth the proposed heurstc, the system eoluton at channel slot boundares becomes a Marko renewal process, and regenerate analyss yelds the desred performance measures. The results obtaned from ths approach match well wth ns2 smulatons. We fnd that, wth the default IEEE e EDCA parameters for AC 1 and AC 3, the oce call capacty decreases f een one fle download s ntated by some staton. Subsequently, reducng the oce calls ncreases the fle download capacty almost lnearly by 1/3 Mbps per oce call for the 11 Mbps PHY. I. INTRODCTION In order to guarantee the QoS requrements n IEEE WLANs, the IEEE e group has deeloped MAC enhancements to support QoS senste applcatons and has proposed the IEEE e standard [2]. Ths standard ntroduces an enhanced, dstrbuted, contenton-based access scheme, called Enhanced Dstrbuted Channel Access EDCA, that offers the possblty to defne four dfferent classes of serce at the MAC layer so that QoS requrements of the multmeda traffc can be supported n addton to data traffc. At the MAC layer, each serce class s called an access category AC, and serce between classes s dfferentated by dfferent set of parameters to contend for the channel. Performance analyss of IEEE e WLANs has become an acte research area. Whle many smulaton studes hae been reported [3], [4], [5], [6], t s mportant to deelop analytcal models. An analytcal modelng exercse prodes nsghts nto the workng of the system and leads to a more general understandng of the effects of arous parameters, and desgn choces, than many smulaton runs. Further, these models may prode general gudelnes for admsson control and MAC parameter optmzaton, and may lead to deas for noel adapte MAC algorthms. The aalablty of good analytcal models s also useful for deelopng fast smulatons [7], [8], [9]. Model based performance analyss of EDCA e WLANs hae been proposed n [10], [11], [12], [13], [1]. Robnson and Randhawa [11] and Zhu and Chlamtac [12] consder a WLAN wth saturated nodes nodes that always hae packets to transmt. Ramayan et al. [1] extend the fxed pont analyss of Kumar et al. [14] for a sngle cell IEEE e WLAN wth saturated nodes and propose a general fxed pont analyss that captures the dfferentaton by mnmum contenton wndow CW, maxmum CW and arbtrary nterframe space AIFS. Wth real traffc, howeer, the nodes are not always saturated. Shankar et al. [13] ealuate the VoIP capacty n e WLAN, but n a scenaro where other classes of traffc are not coexstent n the WLAN. Clfford et al. [15] hae proposed a model for e for dfferent classes of traffc when the nodes are nonsaturated. Ths model yelds throughputs of arous flows. The authors do not model the buffer dynamcs for dfferent traffc types. Our Contrbuton: We prode a model that can predct the performance of a sngle cell nfrastructure IEEE e WLAN, under a scenaro where VoIP and TCP controlled data traffc are carred oer EDCA. We model the queue dynamcs at dfferent nodes as per the consdered applcaton traffc. sng the model, we fnd the maxmum number of oce calls that can be carred wth and wthout fle downloads and the aggregate fle download throughput for each number of admssble oce calls. We take adantage of the fact that the e MAC layer works on system slot boundares. A system slot s the tme unt employed for dscrete-tme backoff countdown. We replace the real WLAN wth a system where each staton transmts ts head-of-lne packet f t has one n a slot wth a probablty that depends only on the set of statons contendng for the channel at that tme,.e., the set of statons that hae packets to send. These attempt probabltes are approxmated usng the saturaton analyss n [1]. The nterals between the nstants at whch our Marko chan s embedded are random, but together these consttute a Marko renewal process. We wll show by smulatons that such an approach s ald and prodes good nsghts nto the performance of e WLANs /06/$ IEEE. 178

2 ... QAP AC 3 QAP QAP AC 3 AC 3 AC 1 AC 1 QSTA 1 QSTA N AC 1 t QSTA t 1... QSTA t N t Fg. 1. An IEEE e WLAN model scenaro where VoIP calls and TCP traffc are serced on EDCA Paper Outlne: In Sec II we dscuss the approach for modelng along wth the obseratons and assumptons of the network and the traffc. In Sec III we formulate a Marko renewal framework, by usng the state dependent attempt probabltes of [1]. In Sec IV we dere the performance measures, namely, the VoIP call capacty and the TCP throughput. In Sec V we dere three more measures namely, the attempt rate of nodes wth access category 1 AC 1, the attempt rate of nodes wth AC 3 and the system collson rate, n order to aldate the model. Ths s followed by numercal and smulaton results for all the measures so dered. Lastly, n Sec VI we conclude wth the lstng of useful modelng and performance nsghts obtaned n ths analyss. II. THE MODELING APPROACH We study the performance of a sngle cell nfrastructure e WLAN that uses EDCA, when both AC 3 and AC 1 are used. Whle IEEE e also defnes TXOPs as an optonal feature, for smplcty, we do not use TXOP n our model. We follow the modelng approach of Kurakose [16] and Harsha et al. [17], where only the IEEE WLAN s analyzed for oce traffc and for TCP traffc separately. The approach of [16] and [17] can be brefly explaned as follows: 1 Embed the number of acte nodes at channel slot boundares. The channel slot boundares are those nstants of tme when an actty ends. The actty could be a successful transmsson or a collson or no transmsson an dle slot. 2 If n nodes are acte.e., hae non empty queues at a channel slot boundary, then the attempt probablty of a node s taken to be β n. Ths s the approxmaton from Banch [18] and Kumar et al. [14] where f there are n saturated nodes, the attempt probablty of each node s β n. 3 se these attempt probabltes to model the eoluton of the number of contendng nodes at channel slot boundares. Ths yelds a Marko renewal process. 4 Obtan the statonary probablty ector π of ths Marko chan. 5 se Marko regenerate argument to obtan the performance measures. In case of e WLANs, due to dfferent parameters, each AC has a dfferent attempt probablty, that further depends on the number of nodes n other ACs. The attempt probabltes obtanable from [14] do not consder the dfferentaton n the parameters and hence cannot be used. We approach ths problem by ncorporatng the attempt probablty alues obtaned from the fxed pont analyss n [1]. We buld a model that can use the results of [1]. A. The Network Scenaro and Modelng Obseratons Consder an nfrastructure IEEE e WLAN, whch has VoIP and TCP traffc, both serced on EDCA. The VoIP traffc and TCP traffc could be handled at the same node. Then we hae multple queues per node. It has been shown n the ournal erson of [1] that wth ncrease n the number of nodes, the performance of the multple queues per node case concdes wth the performance of the sngle queue per node case, each node wth one queue of the orgnal system; bascally the probablty of rtual collson wthn a node s small. Ths obseraton leads to substantal reducton n complexty of our analyss. We make use of ths obseraton and consder the VoIP traffc and TCP traffc as orgnatng from dfferent nodes. Thus, let N be the number of full duplex CBR VoIP calls n the WLAN, nolng N number of e complant wreless statons QSTAs, each carryng one VoIP call. Smlarly let N t be the number of QSTAs downloadng TCP traffc n the WLAN, each hang one sesson. The e complant access pont QAP can be ewed as two nodes: QAP hang a queue for AC 3 VoIP traffc for all VoIP calls, and the other, QAP t, hang a queue for AC 1 TCP traffc to sere all TCP downloads. Ths model s llustrated n Fg. 1. Note that at any tme the WLAN n Fg. 1 can be seen to consst of N + N t +2 nodes. Lets call the QSTAs wth AC 3 as QST A and QSTAs wth AC 1 as QST A t. We assume that there are no bt errors, and packets n the channel are lost only due to collsons. B. VoIP Traffc Each VoIP call results n two RTP/DP streams, one from a remote clent to a wreless QSTA, and another n the reerse drecton. We consder that each call uses the IT G711 codec. Packets are generated eery 20 ms. Includng the IP, DP and RTP headers, the sze of the packet emtted n each call n each drecton s 200 bytes eery 20 ms. As a QoS requrement we demand that the probablty that a packet s transmtted successfully wthn 20 ms s close to 1. Whle a more relaxed delay QoS may seem approprate, we hae obsered through smulatons that een an obecte of Probdelay 100ms s small, yelds no ncrease n the call capacty. Snce the packets wll experence delays n the rest of the network also, ths seems lke a reasonable delay target to achee. Ths QoS obecte also smplfes the modelng snce, f the QoS obecte s met, the probablty of more than one packet of a call n a queue s small. Thus, f the QoS target s met, wheneer a new packet arres at a QST A,t /06/$ IEEE. 179

3 ... V V V V V,T V,T V,T V,T V,T V,T... L t... V: nodes wth only AC3 can attempt V,T: nodes wth AC 3 or AC 1 can attempt Idle slot collson successful transmsson by AC 3 successful transmsson by AC 1 Fg. 2. An eoluton of the channel actty wth two ACs n e WLANs. wll fnd the queue empty wth a hgh probablty. Hence, the followng three assumptons wll be acceptable n the regon where we want to operate: 1 the buffer of eery QST A has a queue length of at most one packet, and 2 new packets arrng to the QST A s arre only at empty queues. The latter assumpton mples that f there are kqsta s wth oce packets then, a new oce packet arral comes to a k +1 th QST A. 3 Snce the QAP handles packets from N streams, there can be up to N packets of dfferent calls n the QAP. Thus we expect that QAP s the bottleneck for oce traffc, and we assume that t wll contend at all tmes at least when N s large. Ths s a realstc assumpton near system capacty. As mentoned earler, packets arre eery 20 ms n eery stream. We use ths model n our smulatons. Howeer, snce our analytcal approach s a Marko chans, we assume that the probablty that a oce call generates a packet n an nteral of length l slots s p l = 1 1 λ l, where λ s obtaned as follows. Each system slot n b s of 20μs duraton hereafter denoted as δ. Thus n 1000 system slots there s one arral. Therefore, for the b PHY we take λ = Ths smplfcaton turns out to yeld a good approxmaton. C. TCP Controlled Fle Downloads Each QST A t has a sngle TCP connecton to download a large fle from a local fle serer. Hence, the QAP t delers TCP data packets towards the QST A t s, whle the QST A t s return TCP ACKs. Here we assume that when a QST A t recees data from the QAP t, t mmedately sends an ACK,.e., we do not model delayed ACKs here, though the delayed ACKs case can also be done see [16]. We assume that the QAP t and the QST A t s hae buffers large enough so that TCP data packets or ACKS are not lost due to buffer oerflows. Snce, by assumpton, there are no bt errors, packets n the channel are lost only due to collsons. Also, we assume that these collsons are recoered by the MAC before TCP tmeouts occur. As a result of these assumptons, for large fle transfers, the TCP wndow wll grow to ts maxmum alue and stay there. As N t s ncreased ths assumpton s close to what happens n realty. We then adopt an obseraton made by Bruno et al. [19]. Snce all nodes wth AC 1 ncludng the QAP t wll contend for the channel and no preference s gen to the QAP t, most of the packets n the TCP wndow wll get backlogged at the QAP t. The QAP t s buffer s sered FIFO, and we can assume that the probablty that a packet transmtted by the QAP t to a partcular QST A t s 1 N t. Thus t s apparent that the larger the N t, the lower s the probablty that the QAP t sends to the same QST A t before receng the ACK for the last packet sent. Then t s assumed that the probablty that any QST A t has more than one ACK s neglgble. We can thus smply keep track of the number of QST A t wth ACKs. If there are seeral QST A t s wth ACKs then the chance that QAP t succeeds n sendng a packet s small. Thus the system has a tendency to keep most of the packets n the QAP t wth a few QST A t s hang ACK to send back. Ths results n a closed system, wheren each tme the QAP t succeeds, t actates a QST A t hang an ACK packet and each tme a QST A t succeeds, the number of non-empty QST A t s reduces by one. Thus for the QST A t s that are downloadng fles, our modelng assumptons are: 1 A QST A t has ether 0 or 1 ACK packet wantng to be sent to the QAP t. 2 When the QAP t sends a data packet t s assumed to be destned to a QST A t that has no ACK queued. III. THE ANALYTICAL MODEL A. An Embedded Chan The eoluton of the channel actty n the network s as n Fg. 2., 0, 1, 2, 3,..., are the random nstants where ether an dle slot, or a successful transmsson, or a collson ends. Let us defne the tme between two such successe nstants as a channel slot. Thus the nteral [ 1, s called the th channel slot. Let the tme length of the th channel slot be L see Fg. 2. Let be the number of non-empty QST A s and Y be the number of non-empty QST A t s at the nstant. Thus 0 N and 0 Y N t. Let B be the number of new VoIP packet arrals at all the QST A s, n the channel slot. Let V be the number of departures from QST A s, V tap tst A be the number of departures from QAP t and V be the number of departures from QST A t s, n the th channel slot. We know that at most one departure can happen n any channel slot. The mplcaton of access dfferentaton through AIFS s that the ACs wth larger AIFS alues cannot contend n those slots that were preceded by some actty.e., successful transmsson or collson. After eery actty successful transmsson or collson on the channel, AC 1 nodes wat for an addtonal system slot before contendng for the channel. Fg. 2 shows the eoluton of the channel actty when AC 3 and AC 1 queues are acte. Note that at the nstants 4, 6, 7 and 10, only AC 3 nodes can contend for the channel, /06/$ IEEE. 180

4 Prob B +1 = b/y =n ; L +1 = l = N n p l b 1 p l N n b 1 b whereas AC 1 nodes hae stll to wat for one more system slot to be able to contend. At other nstants, 5, 8, 11 and 13, nodes wth AC 3 or AC 1 can attempt. The AC attempt probabltes obtaned from [1] are condtoned on when an AC can attempt. We use the arable Y s to keep track of whch ACs are permtted to attempt n a channel slot. Let Y s =1denote that the precedng channel slot had an actty and so n the begnnng of the th channel slot, only nodes wth AC 3 can attempt. Let Y s =0denote that the precedng channel slot remaned dle and hence, at the begnnng of the th channel slot any node can attempt. Thus Y s {0, 1}. Then we hae the followng dynamcs. +1 = V +1 + B +1 Y +1 = Y tst A V +1 + V tap +1 wth the condton that V tst A +1 + V +1 + V tap +1 {0, 1}. Snce the probablty wth whch a packet arres at a node n a channel slot of length l s p l and we assume that packets arre at only empty QST A s, B can be modeled as hang a bnomal dstrbuton and the condtoned probablty ProbB +1 /Y,L +1 =n,l s gen by Equaton 1. B. Marko Property a State Dependent Attempt Probabltes For determnng the expressons of V tst A +1, V +1 and V tap +1, we use the attempt probabltes of [1]. Let be the attempt probablty of a node wth AC 3 and β n +1,n t+1 be the attempt probablty of a node wth AC 1, when there are n VoIP calls and n t TCP sessons n the network. These attempt probabltes are condtoned on the eent that the ACs can attempt. Note that the addton of one n the subscrpts s so as to nclude the QAP and QAP t, whch by assumpton, always contend. The alues, β β n +1,n t+1 n +1,n t+1 for AC 3 and β n +1,n t+1 for AC 1 are obtaned from saturaton fxed pont analyss of [1] for all combnatons of n,n t. Our approxmaton s that the state dependent alues of attempt probabltes from the saturated nodes case can be used for a WLAN where the nodes are not saturated, by keepng track of the number of nonempty nodes n the WLAN and takng the state dependent attempt probabltes correspondng to ths number of nonempty nodes. For conenence, let us defne the followng probablty functons depctng the acttes n the channel slot +1: η t be the probablty that all nodes wth AC 1 reman dle; α be the probablty that any one QST A attempts whle QAP s dle; α t be the probablty that any one QST A t attempts whle QAP t s dle; σ be the probablty that the QAP attempts and all QST A s are dle; σ t be the probablty that the QAP t attempts and all QST A t s are dle; ζ be the probablty that there s a collson amongst nodes wth be the probablty that there s a collson amongst QST A t s; ψ 1 be the probablty that there s a hybrd collson nolng nodes wth AC 3 ncludng QAP and QST A t s excludng QAP t ; ψ tap be AC 3; ζ t,y the probablty that there s a hybrd collson between QAP t and any other node. The expressons for these functons are gen n Appendx. We can express the condtonal dstrbutons V tst A +1, V +1 and V tap +1 usng these functons. V s 1 f a QST A wns the contenton for the channel and 0 otherwse. Then, V +1 = 1 w.p. α 1 w.p. α 0 otherwse,y,y η t f Y s =0 f Y s =1 tst A Smlarly, V and V tap are expressed as follows: { tst A 1 w.p. α V = t,y η,y f Y s = otherwse { V tap = +1 1 w.p. σ t,y η,y f Y s =0 0 otherwse Y s +1 takes the alues n {0, 1} wth the followng probabltes: { Y s 0 w.p. +1 = η η t 1 otherwse wth the ntal state, Y s 0 =0. Wth the bnomal dstrbuton for oce packet arrals assumed aboe and the state dependent probabltes of attempt, t s easly seen that {,Y s ; 0} forms a fnte rreducble three dmensonal dscrete tme Marko chan on the channel slot boundares and hence s poste recurrent. The statonary probabltes π n,n t,n s of the Marko Chan {,Y s ; 0} can then be numercally determned usng expressons for dstrbutons of B, V, V tap and tst A V and the functons n the Appendx. C. The Marko Renewal Process In ths subsecton we use the state dependent attempt probabltes to obtan the dstrbuton of the channel slot duraton. On combnng ths wth the Marko chan n Sec III-B, we fnally conclude that {,Y s ;, =0, 1, 2,...} s a Marko renewal process. We use the basc access mechansm for the TCP traffc. Ths shall facltate the aldaton of analytcal results /06/$ IEEE. 181

5 EL +1/Y s =0 = η η t +T s η t α +σ + T s tst A η α t +T s tap η σ t + T c short η ζ t + T c oce η t ζ +ψ 1 + T c longφ tap EL +1/Y s =1 = η +T s α +σ + T c oceζ 2 P Y +1 = y, +1 l/y 0 = y 0, 0 = u 0, Y 1 = y 1, 1 = u 1,..., Y = y, = u = P Y +1 = y, +1 l/y = y, = u 3 through smulatons by the ns-2 wth EDCA mplementaton [20], that supports only basc access mechansm and not RTS/CTS mechansm. Howeer, our analyss can be worked out for RTS/CTS mechansm as well. When basc access mechansm s used, there shall be collsons between three knds of packets. The longest collson tme s seen when QAP t packet colldes wth a packet of any other node. A smaller collson tme s seen when VoIP packet colldes wth a packet of any other node except wth packet of QAP t. The shortest collson tme s seen when only packets of QST A t s collde. Then L n system slots takes one of the seen alues: 1 f t s an dle slot, T s f t corresponds to a successful transmsson of a AC 3 node, T s tap f t corresponds to a successful transmsson of QAP t, T s tst A f t corresponds to a successful transmsson of QST A t, T c short f t corresponds to a collson between QST A t s, T c oce f t corresponds to a collson amongst nodes wth AC 3 or between AC 3 nodes and any QST A t and T c long f t corresponds to a collson between QAP t and any other QST A. The condtonal expectaton of L +1 s gen by Equaton 2 that uses the followng notatons: T s = T P +T PHY + L MAC+L oce +T SIFS +T P +T PHY + L ACK C c + T AIF S3 ; T s tst A = T P +T PHY + L MAC+L TCPACK +T SIFS +T P + T PHY + L ACK C c + T AIF S1 ; T s tap = T P +T PHY + L MAC+L IPH +L data +T SIFS +T P + T PHY + L ACK C c + T AIF S1 ; T c oce = T P +T PHY + L MAC+L oce +T EIFS +T AIF S3 ; T c short = T P + T PHY + L MAC+L TCPACK T AIF S1 ; + T EIFS + T c long = T P + T PHY + L MAC+L IPH +L data T AIF S1 ; + T EIFS + T EIFS = T P + T PHY + L ACK C c + T SIFS. See Table I for meanng and alues of arous parameters. We thus obsere Equaton 3 and so conclude that {,Y s ;, =0, 1, 2,...} s a Marko renewal process wth L = 1 beng the renewal cycle tme. Parameter Symbol Value PHY data rate 11 Mbps Control rate C c 2 Mbps PLCP preamble tme T P 144μs PHY Header tme T PHY 48μs SIFS Tme T SIFS 10μs AIFS3 Tme T AIF S3 50μs AIFS1 Tme T AIF S1 70μs G711 packet sze L oce 200 Bytes Data packet sze L data 1500 Bytes MAC ACK Packet Sze L ACK 112 bts MAC Header sze L MAC 288 bts TCP ACK sze L TCPACK 320 bts AC3 Mn. CW CW mn AC3 7 AC3 Max. CW CW maxac3 15 AC1 Mn. CW CW mn AC1 31 AC1Max. CW CW maxac TABLE I PARAMETERS SED IN ANALYSIS AND SIMLATION FOR EDCA E WLAN IV. VOIP CAPACITY AND TCP THROGHPT A. Call Capacty Let A be the reward when the QAP wns the channel contenton n th channel slot. If we hae 1 = n, Y 1 = n t and Y s 1 = n s at the 1 th channel slot boundary, then, 1 w.p. σ n,n t η t n,n t f n s =0 A = 1 w.p. σ n,n t f n s =1 0 otherwse Let A denote the cumulate reward of the QAP untl tme t. Applyng Marko regenerate analyss [21], we obtan the serce rate of the QAP, Θ AP VoIP N,N t,asgen by Equaton 4. Snce the rate at whch a sngle call sends data to the QAP s λ, and the QAP seres N such calls the total arral rate to the QAP s N λ. Ths rate should be less than Θ AP VoIP N,N t for stablty. Thus, a permssble combnaton of N VoIP calls and N t TCP sessons, whle meetng the delay QoS of VoIP calls, must satsfy Θ AP VoIP N,N t >N λ /06/$ IEEE. 182

6 A Θ AP VoIP N,N t = lm where, E n,n t,n s A = E A / 1,Y 1,Ys 1 =n,n t,n s a.s. = N Nt n =0 N Nt n =0 1 n t=0 n π s=0 n,n t,n s E n,n t,n s A 1 n t=0 n π s=0 n,n t,n s E n,n t,n s L, E n,n t,n s L = E L / 1,Y 1,Ys 1 = n,n t,n s 4. Prob B AP +1 = b/x AP = x; L +1 = l = N x p l b 1 p l N x b 6 b R lm a.s. = N Nt 1 N n =0 n t=0 n s=0 n AP =0 π n,n t,n s,n AP N Nt 1 N n =0 n t=0 n s=0 n AP =0 π n,n t,n s,n AP E n,n t,n s,n AP R E n,n t,n s,n AP L 7 The aboe nequalty defnes the admsson regon for VoIP. Note that we are assertng that the N that satsfes nequalty 5 also ensures the delay QoS. Ths s based on the obseraton n earler research [22] that when the arral rate s less than the saturaton throughput then the delay s ery small. Remark: The model dscussed aboe does not ge the TCP download throughput. Ths s due to the fact that we assume that the oce queue of the AP s saturated all the tme. But actually, the VoIP queue of AP saturates only at system capacty [16]. Thus f we follow the aboe method to obtan analytcal TCP download throughput, we obtan an underestmated throughput. Ths problem can be soled by consderng that QAP s not saturated and we consder ths case n the followng subsecton. B. TCP Throughput Dependng on whether the QAP queue contans a packet, the total number of nonempty nodes wth AC 3 wll be n case no packet s there n QAP queue or +1 f QAP queue has at least one packet. We then need to know the state of the QAP queue so as to know the number of nonempty nodes wth AC 3, at the channel slot boundares. Therefore, we ntroduce another arable to track the number of packets n the QAP queue. Let X be the number of packets n the QAP queue, B AP be the number of new packets arrng at the QAP queue and V AP be the number of departures from QAP at the end of th channel slot. Then, the set of eoluton equatons are: V +1 = Y +1 = Y V X +1 = X +1 + B +1 tst A V tap V AP +1 + B AP +1 wth the condton that V tst A +1 + V +1 + V tap +1 + V AP +1 {0, 1}. On smlar lnes as B, B AP can be modeled as hang a bnomal dstrbuton. Obsere that f x packets are already there n QAP queue, at most N x packets can arre before the QoS delay bound of the earlest arred packet gets exceeded. sng the earler defnton of p l, the condtonal probablty probb AP +1 /X AP,L +1 s gen by Equaton 6. In order to take nto account the fact that QAP may or may not be acte at any channel slot boundary, defne Z := +1,fX AP 0and Z := f X AP = 0. Then the functons n the Appendx need a modfcaton. Instead of β Y +1,Y +1, we now hae to use β Z Wth the aboe change ncorporated, V AP +1 s gen as: V AP +1 = 1 w.p. σ Z 1 w.p. σ Z 0 otherwse,y,y,y +1. η tz f Y s =0 f Y s =1 We agan see that, under our model for the attempt probabltes, {,Y s,x AP ; 0} forms a fnte rreducble four dmensonal dscrete tme Marko chan on the channel slot boundares and hence s poste recurrent. The statonary probabltes π n,n t,n s,n AP can be numercally obtaned. If R be the reward and L be the cycle tme n th channel slot, n ths context, applyng Marko regenerate analyss [21], mean reward rate s gen by Equaton 7, where R s the cumulate reward untl tme t. We use ths equaton to obtan arous measures of nterest. Let us defne T to be the reward when the QAP t wns the channel contenton n th channel slot and T denote the cumulate reward of the QAP t untl tme t. If there are Z 1 = n AC 3 nodes acte, Y 1 = n t QST A t s acte and Y s 1 = n s, then, { 1 w.p. σt n T =,n t η n,n t f n s =0 0 otherwse Θ AP data N,N t n Mbps, s then gen as: Θ AP data N,N t = L data δ T lm where we use Equaton 7 to ealuate lm t T t, wth R = T /06/$ IEEE. 183

7 V. MODEL VALIDATION AND NMERICAL RESLTS A. Attempt and Collson Rates In order to aldate and show the accuracy of the model, we now analytcally dere three other measures: the attempt rate of AC 3 nodes, the attempt rate of AC 1 nodes, and the total collson rate n the WLAN. We compare the numercal results wth that obtaned from the smulatons. 1 Attempt Rate: Let S be the number of attempts process of AC 3 nodes,.e., S counts the number of AC 3 nodes that attempt n the channel slot,. Let, as before, Z 1 = n and Y 1 = n t. Then S = w.p. n β n,n t+1 1 β n,n t+1 n Let S denote the cumulate reward of number of attempts of AC 3 nodes untl tme t. Then the total attempt rate of AC 3 nodes, Φ N,N t s QAP serce rate, Θ AP VoIP, Load arral rate at QAP n pkts per slot QAP load arral rate QAP serce rate for N t = 0 QAP serce rate for N = 1 t QAP serce rate for N t = Number of oce calls, N, as AC 3 on e EDCA Fg. 3. The serce rate Θ AP V oip appled to the QAP s plotted s the number of oce calls, N for dfferent number of TCP sessons N t. Also shown s the lne N λ. The pont where the lne N λ crosses the cures ges the maxmum number of calls supported. VoIP packet sze s 200B G711 Codec; data packet sze s 1500 Bytes; PHY data rate s 11Mbps and basc rate s 2Mbps. Φ N,N t = 1 δ lm S 9 S and we use Equaton 7 to ealuate lm, wth R = S. Smlarly, let S be the number of attempts process of AC 1 nodes,.e., S counts the number of AC 1 nodes that attempt n the channel slot,. Then S = { w.p. nt+1 0 otherwse β n,n t+1 1 β n,n t+1 nt f Y s =0 The total attempt rate of AC 1 nodes, Φ t N,N t s then Φ t N,N t = 1 δ lm S 10 S and we agan use Equaton 7 to ealuate lm, wth R = S. 2 Collson Rate: Let C be the number of collsons process n the WLAN,.e., C counts the total number collsons n the WLAN n the channel slot,. For nstance, f fe nodes are noled n a collson n the th channel slot, then C =5.IfE n,n t,n s,n AP C s the state dependent mean number of collsons, E n,n t,n s,n AP C = ES + S 1 ProbS =1;S =0 1 ProbS =0;S =1 Let enote the cumulate reward of number of collsons n the WLAN, untl tme t. Then, f ΓN,N t s the system collson rate n the WLAN, C ΓN,N t = lm 11 C and agan we use Equaton 7 to ealuate lm, wth R = C. B. Numercal Results We present the results obtaned from the analyss and smulaton. The smulatons were obtaned usng ns-2 wth EDCA mplementaton [20]. The VoIP traffc was consdered on AC 3 and the TCP traffc was consdered on AC 1. The PHY parameters confrm to the b standard. See Table I for the alues used n smulaton. 1 VoIP Capacty: In Fg. 3, we show the analytcal plot of QAP serce rate s. the number of calls, N for three dfferent alues of N t {0, 1, 10}. From Fg. 3, we note that the QAP serce rate crosses the QAP load rate, after 12 calls for N t = 0. Ths mples that a maxmum of 12 calls are possble whle meetng the delay QoS, on a e WLAN when no TCP traffc s present on AC 1. When one TCP sesson s added to the WLAN.e., N t =1, the QAP serce rate crosses below the QAP load rate, after 10 calls. Ths mples that only 10 calls are possble when any TCP sesson s added to the WLAN. The same s the case een when 10 TCP sessons are added to the WLAN. Remark: The analyss represented by Fg. 3, assumes that the QAP s saturated. It s for ths reason that the QAP serce rate exceeds the load arral rate for small N. The crossoer pont would howeer correctly model the alue of N beyond whch oce QoS wll be olated. From Fg. 3, we obsere that for each alue N, wth ncrease n the alue of N t from zero to a non-zero alue, the serce rate aalable to the QAP decreases. Ths s, of course, because the QAP needs to serce the TCP traffc also. Howeer, the cures of N t =1and N t =10are ery close. The effect of one TCP transfer s the same as that of 10 TCP transfers. Partly, the reason s that QAP t queue s already saturated wth 1 TCP. By addng more TCP transfers a few more QSTAs begn to contend, but ths number wll not change much wth ncreasng N t see also Kurakose [16] /06/$ IEEE. 184

8 QAP delay, N=0 t QSTA delay, N t =0 QAP delay, N=1 t QSTA delay, N t =1 QAP delay, N t =10 QSTA delay, N t = analyss: oce analyss: data smulaton: oce wth 95% CI smulaton: data wth 95% CI Pdelay > 20ms Φ, Φ t n attempts per sec Number of VoIP calls, N, as AC 3 on e EDCA Number of VoIP calls, N, as AC 3 on e EDCA Fg. 4. Smulaton results showng probablty of delay of QAP and QSTA wth AC 3, beng greater than 20ms s the number of calls N for dfferent alues of N t. Analyss and smulaton use VoIP packet sze = 200B G711 Codec; TCP download packet sze = 1500B Basc access mechansm; PHY data rate = 11Mbps and basc rate = 2Mbps. Fg. 6. Analyss and smulaton results showng attempt rates of AC 3 nodes and AC 1 nodes, for dfferent alues of N and N t =10. PHY data rate s 11Mbps and basc rate s 2Mbps. 600 analyss smulaton wth 95% CI analyss smulaton, wth 95% CI 500 Θ AP data n mbps Γ n collsons per sec Number of VoIP calls, N, as AC 3 on e EDCA Number of VoIP calls, N, as AC 3 on e EDCA Fg. 5. Analyss and smulaton results showng total download throughput obtaned by QST A ts for dfferent alues of N and N t =10. VoIP packet sze s 200B G711 Codec; data packet sze s 1500 Bytes; PHY data rate s 11Mbps and basc rate s 2Mbps. Smulaton results for the QoS obecte of Probdelay 20ms for the QAP and the QST A sareshownnfg.4. Note that the Probdelay : QAP 20ms s greater than Probdelay : QST A 20ms for gen N and that the QAP delay shoots up before the QST A delay, confrmng that the QAP s the bottleneck, as per our assumptons. It can be seen that wth and wthout TCP traffc, there s a alue of N at whch the Probdelay 20ms sharply ncreases from a alue below Ths can be taken to be the oce capacty. In case of no data traffc, we obtan 12 calls, matchng the analyss result and when there s data traffc, we get 9 calls, one less than the analyss result. 2 TCP Throughput: For the data packet length of 1500 bytes, usng IEEE b PHY parameters, wth PHY data rate of 11Mbps, we numercally calculate the total download throughput for TCP traffc fxed at N t =10 usng Equaton 8, for aryng number of oce calls. The analytcal plot has been gen n Fg. 5 and the fgure also shows the smulated TCP download throughput wth 95% confdence nterals. Fg. 5 shows that the reducton of TCP throughput wth Fg. 7. Analyss and smulaton results showng collson rate n the WLAN, for dfferent alues of N and N t =10. PHY data rate s 11Mbps and basc rate s 2Mbps. ncreasng N s almost lnear at the rate of 1 3 Mbps per VoIP call. Remark: Fg. 5 can also be used for admsson control of VoIP calls n order to guarantee a net mnmal throughput to the data traffc. For nstance f at least 2 Mbps of aggregate TCP throughput s to be allotted to data traffc then Fg. 5 says that only 7 VoIP calls should be admtted. 3 Attempt and Collson Rates: In order to aldate the model, we numercally calculate the attempt rates of AC 3 nodes and AC 1 nodes usng Equaton 9 and Equaton 10 respectely and compare them wth the smulatons. Fg. 6 shows the attempt rates obtaned from analyss and smulatons for AC 3 and AC 1 nodes for dfferent alues of N and N t =10. We further calculate the system collson rates for dfferent alues of N and N t =10, usng Equaton 11. Fg. 7 shows the collson rates obtaned from analyss and smulatons. Remark: From Fg. 6 and 7 we conclude that the analytcal model not only predcts the performance measures well but certan other measures such as attempt rate and collson rate are also captured well. Ths shows that the model captures the behaour of the system qute well. It can be obsered from Fg. 4 that the Probdelay : /06/$ IEEE. 185

9 QST A 20ms begns to rse from N = 9 onwards. Ths mples that the model assumpton that the QST A s hae at most one packet fals oer N =9calls. Oer the operatng pont, the QST A s wll start bufferng more than one packet. Ths s gettng reflected n the attempt rates and system collson rate, after N =9, where the error between the analytcal alue and stmulaton alue ncreases. VI. CONCLSION In ths paper we proded an analytcal model for obtanng the capacty of VoIP calls and the TCP controlled download throughput n EDCA e WLAN, when both VoIP and data traffc are present. The analyss proceeds by modelng the eoluton of the number of contendng QSTAs at channel slot boundares. Ths yelds a Marko renewal process. A regenerate analyss then yelds the requred performance measures. In case of VoIP capacty, the analytcal results match wth those obtaned from smulatons, whle oerestmatng the number of VoIP calls by ust 1 call, when TCP sessons are added to the WLAN. In case of TCP download traffc, the error n download throughput s wthn 5% n the regon of operaton,.e. up to 9 VoIP calls. Our work prodes the followng modelng nsghts: The dea of usng saturaton attempt probabltes as state dependent attempt rates yelds an accurate model n the unsaturated case. sng ths approxmaton, an IEEE e nfrastructure WLAN can be well modeled by a multdmensonal Marko renewal process embedded at channel slot boundares. We also obtan the followng performance nsghts: nlke the orgnal DCF, the EDCA mechansm supports the coexstence of VoIP connectons and TCP fle transfers; but een 1 TCP transfer reduces the VoIP capacty from 12 calls to 9 calls. Subsequently the VoIP capacty s ndependent of the number of TCP transfers see Fg. 4. For an 11 Mbps PHY, the fle download throughput reduces lnearly wth the number of oce calls at the rate of 1 3 Mbps per addtonal oce call from 0 to 9 calls. Our ongong work wll extend the analyss n ths paper to the case when data traffc s both ways nstead of ust download traffc. We also are workng on fndng the capactes of e WLANs for real tme and streamng deo sessons n the EDCA framework. In related work, we hae also proded an analytcal model for IEEE e nfrastructure WLANs usng HCCA, wth oce beng carred n contenton free perod and TCP data n the remanng tme usng EDCA. ACKNOWLEDGMENT Ths work s based on research sponsored by Intel Technology, Inda. REFERENCES [1] V. Ramayan, A. Kumar, and E. Altman, Fxed Pont Analyss of Sngle Cell IEEE e WLANs: nqueness, Multstablty and Throughput Dfferentaton, n Proceedngs ACM Sgmetrcs, 05. Journal erson submtted, [2] Wreless LAN Medum Access Control MAC Qualty of Serce Enhancements, IEEE Std e, [3] S. Cho, J. Prado, S. S. N, and S. Mangold, IEEE e Contentonbased Channel Access EDCF performance Ealuaton, IEEE Internatonal Conference on Communcatons, pp , May [4] P. Garg, R. Dosh, R. Greene, M. Baker, M. Malek, and X. Cheng, sng IEEE e MAC for QoS oer wreless, n IEEE Internatonal Performance, Computng, and Communcatons Conference, 2003, 9-11 Aprl 2003, pp [5] D. He and S. C.Q., Smulaton study of IEEE e EDCF, n Vehcular Technology Conference, VTC 2003-Sprng, ol. The 57th IEEE Semannual Volume 1, Aprl 2003, pp [6] A. Banchs, A. Azcorra, C. Garca, and R. Cueas, Applcatons and challenges of the e EDCA mechansm: An expermental study, IEEE Network, pp , July/August [7] B. Blum, T. He, and Y. Ponturer. MAC Layer Abstracton for Smulaton Scalablty Improements. [Onlne]. Aalable: bmb5/cs851/report.pdf [8] Z. J, J. Zhou, M. taka, and R. Bagroda, Scalable Smulaton of Large-Scale Wreless Networks wth Bounded Inaccuraces, n ACM MSWM 04, Veneza, Italy, [9] A. Kroller, D. Pfsterer, C. Buschmann, S. P. Fekete, and S. Fscher Shawn: A New Approach to Smulatng Wreless Sensor Networks. [Onlne]. Aalable: [10] Y. Kuo, C. Lu, E. Wu, and G. Chen, An Admsson Control Strategy for Dfferentated Serces n IEEE , n Global Telecommuncatons Conference, GLOBECOM 03, ol. 2. IEEE, 1-5 Dec 2003, pp [11] J. Robnson and T. Randhawa, Saturaton Throughput Analyss of IEEE e Enhanced Dstrbuted Coordnaton Functon, IEEE Journal on Selected Areas n Communcatons, ol. 22, Issue 5, pp , June [12] H. Zhu and I. Chlamtac, An analytcal model for IEEE e EDCF dfferental serces, n Proceedngs of The 12th Internatonal Conference on Computer Communcatons and Networks, 20-22Oct 2003, pp [13] S. Shankar, J. del Prado Paon, and P. Wenert, Optmal Packng of VoIP calls n an IEEE a/e WLAN n the presence of QoS Constrants and Channel Errors, n Global Telecommuncatons Conference, GLOBECOM 04, ol. 5. IEEE, 29 No.-3 Dec 2004, pp [14] A. Kumar, E. Altman, D. Morand, and M. Goyal, New Insghts from a Fxed Pont Analyss of Sngle Cell IEEE WLANs, n Proceedngs of IEEE INFOCOM 05, March 2005, pp [15] P. Clfford, K. Duffy, J. Foy, D. J. Leth, and D. Malone, Modelng e for Data Traffc Parameter Desgn, n WOPT 2006, Boston, SA, Aprl [16] G. Kurakose, Analytcal Models for QoS Engneerng of Wreless LANs, Master s thess, Indan Insttue of Scence, Bangalore, [17] S. Harsha, A. Kumar, and V. Sharma, Analytcal Model for an IEEE WLAN usng DCF wth Two Types of VoIP Calls, n Natonal Communcaton Conference, NCC 2006, New Delh, Inda, January [18] G. Banch, Performance Analyss of the IEEE Dstrbuted Coordnaton Functon, IEEE Journal on Selected Areas n Communcatons, pp , March [19] R. Bruno, M. Cont, and E. Gregor, Throughput analyss of TCP clents n W-F hot spot Networks, n Networkng 2004, ser. LNCS 2042, 2004, pp [20] S. Wethlter and C. Hoene An IEEE e EDCF and CFB Smulaton Model for ns-2. [Onlne]. Aalable: ns2/ [21] V. G. Kulkarn, Modelng and Analyss of Stochastc Systems. London, K: Chapman and Hall, [22] M. Prabhakaran and A. Kumar, An analytcal model for a sngle cell IEEE WLAN wth open loop arrals, May 2005; n reew, submtted /06/$ IEEE. 186

10 APPENDIX The expressons for arous probabltes defned n III-B are as follows: η = 1 β η t = 1 β α α t = = Y σ = β σ t = β ζ = ζ t = ψ 1 = +1,Y +1,Y β +1,Y +1 β +1,Y +1 +1,Y +1 +1,Y =2 Y =2 +1 =1 Y =1 ψ tap = β +1 Y Y +1 +1,Y +1 Y +1,Y +1 Y +1,Y +1 Y +1,Y +1 Y 1 β 1 β 1 β 1 β Y +1 Y Y Y +1,Y +1 β +1,Y +1 η t 1 β β +1,Y +1,Y +1 Y + η =1 Y + +1 =1 Y =1 Y +1 β +1,Y +1 1 β β +1,Y +1 1 β +1 =1 Y β +1,Y β +1,Y +1 1 β +1,Y +1 Y +1 +1,Y +1 Y β Y +1 β +1,Y +1,Y +1 Y +1 +1,Y +1 Y β +1 1 β β +1,Y +1 1 β +1 1 β +1,Y +1 Y +1,Y +1 Y +1 +1,Y +1 Y +1,Y +1 Y /06/$ IEEE. 187

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Popularity Based Adaptive Content Delivery Scheme with In-Network Caching

Popularity Based Adaptive Content Delivery Scheme with In-Network Caching Popularty Based Adapte Content Delery Scheme wth In-Network Cachng Jeong Yun Km, Gyu Myoung Lee, and Jun Kyun Cho To sole the ncreasng popularty of deo streamng serces oer the Internet, recent research

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Integer Programming Formulations for the Uncapacitated Vehicle Routing p-hub Center Problem

Integer Programming Formulations for the Uncapacitated Vehicle Routing p-hub Center Problem 21st Internatonal Congress on Modellng and Smulaton, Gold Coast, Australa, 29 No to 4 Dec 2015 www.mssanz.org.au/modsm2015 Integer Programmng Formulatons for the Uncapactated Vehcle Routng p-hub Center

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Level Annuities with Payments Less Frequent than Each Interest Period

Level Annuities with Payments Less Frequent than Each Interest Period Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Optimal outpatient appointment scheduling

Optimal outpatient appointment scheduling Health Care Manage Sc (27) 1:217 229 DOI 1.17/s1729-7-915- Optmal outpatent appontment schedulng Gudo C. Kaandorp Ger Koole Receved: 15 March 26 / Accepted: 28 February 27 / Publshed onlne: 23 May 27 Sprnger

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

DISTRIBUTED storage systems have been becoming increasingly

DISTRIBUTED storage systems have been becoming increasingly 268 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 2, FEBRUARY 2010 Cooperatve Recovery of Dstrbuted Storage Systems from Multple Losses wth Network Codng Yuchong Hu, Ynlong Xu, Xaozhao

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Performance modeling and analysis of mobile Internet access via cellular networks

Performance modeling and analysis of mobile Internet access via cellular networks Performance modelng and analyss of moble Internet access va cellular networks Master s thess Author: Taoyng Yuan Emal: tyuan@few.vu.nl Student ID: #1430610 Unversty: Supervsors: Vrje Unverstet Amsterdam

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

The Full-Wave Rectifier

The Full-Wave Rectifier 9/3/2005 The Full Wae ectfer.doc /0 The Full-Wae ectfer Consder the followng juncton dode crcut: s (t) Power Lne s (t) 2 Note that we are usng a transformer n ths crcut. The job of ths transformer s to

More information

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression.

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression. Lecture 3: Annuty Goals: Learn contnuous annuty and perpetuty. Study annutes whose payments form a geometrc progresson or a arthmetc progresson. Dscuss yeld rates. Introduce Amortzaton Suggested Textbook

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

Dynamic Routing in Self-Healing MPLS Networks

Dynamic Routing in Self-Healing MPLS Networks Dynamc Rng n Self-Healng MPS Networs Krzysztof Walowa Char of Systems and Computer Networs, Faculty of Electroncs, Wroclaw Unersty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw, Poland walowa@zss.pwr.wroc.pl

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account Amercan J. of Engneerng and Appled Scences (): 8-6, 009 ISSN 94-700 009 Scence Publcatons Optmal Bddng Strateges for Generaton Companes n a Day-Ahead Electrcty Market wth Rsk Management Taken nto Account

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Optimal Pricing for Integrated-Services Networks. with Guaranteed Quality of Service &

Optimal Pricing for Integrated-Services Networks. with Guaranteed Quality of Service & Optmal Prcng for Integrated-Servces Networks wth Guaranteed Qualty of Servce & y Qong Wang * Jon M. Peha^ Marvn A. Sru # Carnege Mellon Unversty Chapter n Internet Economcs, edted y Joseph Baley and Lee

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Fuzzy Intra-Clustering Approach for Load Balancing in Peer-to-Peer System

A Fuzzy Intra-Clustering Approach for Load Balancing in Peer-to-Peer System ISSN 1746-7659, England, UK Journal of Informaton and Computng Scence Vol. 7, No. 1, 2012, pp. 019-024 A Fuzzy Intra-Clusterng Approach for Load Balancng n Peer-to-Peer System Rupal Bhardwa 1, V.S.Dxt

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

This paper concerns the evaluation and analysis of order

This paper concerns the evaluation and analysis of order ORDER-FULFILLMENT PERFORMANCE MEASURES IN AN ASSEMBLE- TO-ORDER SYSTEM WITH STOCHASTIC LEADTIMES JING-SHENG SONG Unversty of Calforna, Irvne, Calforna SUSAN H. XU Penn State Unversty, Unversty Park, Pennsylvana

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

2. SYSTEM MODEL. the SLA (unlike the only other related mechanism [15] we can compare it is never able to meet the SLA).

2. SYSTEM MODEL. the SLA (unlike the only other related mechanism [15] we can compare it is never able to meet the SLA). Managng Server Energy and Operatonal Costs n Hostng Centers Yyu Chen Dept. of IE Penn State Unversty Unversty Park, PA 16802 yzc107@psu.edu Anand Svasubramanam Dept. of CSE Penn State Unversty Unversty

More information

A User-Centric Approach for Dynamic Resource Allocation in CDMA systems based on Hopfield Neural Networks

A User-Centric Approach for Dynamic Resource Allocation in CDMA systems based on Hopfield Neural Networks A User-Centrc Approach for Dynamc esource Allocaton n CDA systems based on Hopfeld eural etworks. García. Agustí J. érez-omero Unverstat ompeu Fabra (UF) Unverstat oltècnca de Catalunya (UC) Barcelona

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information