T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
|
|
- Suzanna Johns
- 8 years ago
- Views:
Transcription
1 Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: / X T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K ABSTRACT The pper presents secure protocol of rdio Ad Hoc sensor network. This network opertes sed on TDMA multiple ccess method. Trnsmission rte on the rdio chnnel is 57.6 kps. The pper presents the construction of frmes, types of pckets nd procedures for the uthentiction, ssignment of time slots ville to the node, relesing ssigned slots nd slots ssignment conflict detection. Key words: Ad Hoc, ASAP, OFB Mode, TDMA. INTRODUCTION The Time Division Multiple Access (TDMA) method is often used in Ad Hoc sensor networks ecuse of its ility to ensure collision-free trnsmission of pckets regrdless of the mount of trffic on the network. Mny types of trnsmission scheduling protocols re used in TDMA Ad Hoc networks. Some of them do not support utonomous ehviors of moile nodes. They cnnot updte the slot ssignment of ech node due to rrivl or exit of moile node [2]. Unifying the Slot Assignment Protocol (USAP) [4] nd USAP-MA [5] Protocol, llows the opertion of networks whose topology dynmiclly chnges. However, they re chrcterized y poor chnnel utiliztion ecuse of the existence of mny conflicting or unssigned slots. Gdńsk University of Technology, Fculty of Electronics, Telecommunictions nd Informtics, G. Nrutowicz 11/12 Str., Gdńsk, Polnd; e-mil: mrczk@eti.pg.gd.pl 27
2 Andrzej Mrczk The sensor Ad Hoc network protocol, presented in this pper, uses the TDMA method nd the Adptive Slot Assignment Protocol (ASAP) protocol [1]. The ASAP protocol ws chosen ecuse of its ese of implementtion in hrdwre nd good properties [1]. This protocol is enhnced with uthentiction nd encryption procedures. TDMA FRAMES STRUCTURE A sensor network consists of Server, Personl Identifiction Module nodes (PIM) nd Reference Node nodes (RN) (fig. 1). The hierrchy level of RN indictes the numer of rdio hops to the server. Hierrchy level 0 mens tht the RN is connected vi wired connection to the server. Network nodes trnsmit seven types of pckets: dt pcket DATA; request pcket REQ; informtion pcket INF; hierrchy level pcket LEVEL; suggestion pcket SUG; reply pcket REP; uthentiction pcket AUTH. Wired connection Wireless connections Wireless connections PIM Server Reference Node Level 0 PIM Reference Node Level1 PIM PIM Fig. 1. Secure sensor network Pckets re trnsmitted in the frmes. The frmes re orgnized into superfrmes. The primry (shortest length) superfrme hs 4 time slots. The durtion of the superfrme is 20 ms. The ASAP protocol llows the use of long superfrmes. The lengths 28 Zeszyty Nukowe AMW Scientific Journl of PNA
3 The secure trnsmission protocol of sensor Ad Hoc network of such the superfrmes re multiples of the primry superfrme. The length of the long superfrme is set s power of two. The superfrmes cn e composed of 8, 16, 32 nd 64 time slots, respectively. Such superfrme durtions will e then of 40 ms, 80 ms, 160 ms nd 320 ms. Trnsmission rte t the rdio interfce is 57.6 kps, so the durtion of the 1 it is t = s, nd the durtion of 1 yte is t B = 8 x t = s. The durtion of the 33-yte dt pcket (DATA) t r = ms. The durtion of the time slot t s = 5 ms, so gurd intervls hve 2 x ms ( s), or durtion of 3 ytes. In the cse of pcket types with fewer ytes, we used the ddition of pproprite numer of zero ytes (0 x 00) to lign the pcket length. Figure 2 shows the frme nd superfrme in sensor network. The first slot in the superfrme (ZPS) hs een reserved for the new node to trnsmit control Request pckets (REQ) or uthentiction pcket (AUTH). Superfrme ZPS ts tsr Frme Premle 4 ytes Synchron. 4 ytes Kind of frme 1 yte Sender ddr. 2 ytes Receiv. Addr. 2 ytes Type of frme 4 its Frme length 1 yte Mx. frme length 1 yte Slot numer 1 yte Numer of slots 4 its Timestmp 3 ytes Dt 12 ytes CRC 2 ytes tr Fig. 2. Frme nd superfrme in secure sensor network This wy, no dt pckets (DATA) re trnsmitted in this time slot. The dt pckets cn e trnsmitted over the remining three time slots (for the superfrme with length L = 4). The sme is true in the cse of superfrmes with greter numer of time slots. The first time slot is lwys ZPS, used for the REQ or AUTH pckets to e trnsmitted, nd the remining slots re used for dt trnsmission. Ech pcket type hs fixed prt depending on the structure of the pckets sent y used the rdio modems. This fixed prt hs 4 yte premle, 4-yte synchroniztion nd 1 yte the kind of frme informtion. The PIM node ddresses will hve vlues etween 0 (0 x 00) to 127 (0 x 7F), while RN will hve ddress vlues from 128 (0 x 80) to 254 (0 x FE). Address with vlue 255 (0 x FF) is for rodcst trnsmission. In the cse of trnsmission towrds the server in pcket ddress 4 (203)
4 Andrzej Mrczk fields will e the source ddress (PIM or RN) nd the ddress of the next RN node (the destintion node). The RN node receiving the pcket contining its ddress s the trget, it checks its routing tle to the next RN node ddress in the direction of the server nd forwrds the received pcket in different time slot. In the cse of trnsmission from the server, the source ddress is the ddress of RN node sending the pcket nd the destintion ddress is the ddress PIM or RN node (if the pcket is sent to the RN node). PACKET FORMATS T r n s m i t m o d e The dt pcket (DATA) (0 x 0D) is the first type of pckets. It contins informtion on the frme length nd time slots ssigned to the sender, nd the mximum frme length of the sender nd its neighors [1]. This pcket lso contins the encrypted dt sent y node. C o n t r o l m o d e 1. Request pcket (REQ) (0 x 0C) is trnsmitted y only new node. By sending this pcket to neighors, new node requests the informtion on the frme length nd ssigned time slots of ll nodes in contention re [1]. 2. Informtion pcket (INF) (0 x 0B) contins the informtion on the frme length of the sender nd time slot ssigned to the sender nd its neighors [1]. 3. Hierrchy level pcket (LEVEL) (0 x 6) is trnsmitted periodiclly y RN node in the ZPS time slot. The RN node is sending the pcket to its neighors, informing ll nodes out its network hierrchy level. 4. Suggestion pcket (SUG) (0 x 0A) is trnsmitted y only new node. By sending this pcket to the neighors, the new node nnounces the frme length nd its ssigned slot [1]. 5. Reply pcket (REP) (0 x 05) is trnsmitted for the confirmtion of receiving SUG pcket [1]. 6. Authentiction pcket (AUTH) (0 x 01) is used in the uthentiction procedure. This pcket sends n encrypted node ddress nd the encrypted session key (in 2 consecutive pckets). 30 Zeszyty Nukowe AMW Scientific Journl of PNA
5 The secure trnsmission protocol of sensor Ad Hoc network DATA SECURITY The security of the trnsmission is ensured y the use of the lock cipher lgorithm (e.g. AES, 3DES) working in Output Feedck (OFB) mode (fig. 3). The OFB mode uses the initiliztion vector IV. In this solution IV vector is timestmp. Its uniqueness is criticl. The ciphertext is otined y the modulo 2 ddition of the plintext its (P) nd lock cipher output its (O). Block cipher output its only depend on the cipher lgorithm, session key K nd initiliztion vector IV (timestmp) [3]. One dvntge of the OFB mode is low sensitivity to trnsmission errors, nd more specificlly the lck of error propgtion [3]. Using the OFB mode we cn encrypt dt locks of ny length, even shorter thn the length of the dt lock used in encryption lgorithm (e.g. 128 its in AES lgorithm). Ciphering OFB Deciphering OFB Session key K Plintext Timestmp IV Block cipher O Session key K Ciphertext Timestmp Block cipher O IV P C C P Ciphertext Plintext Fig. 3. Ciphering nd deciphering in sensor network AUTHENTICATION PROCEDURE The OFB mode is used in the procedure of uthentiction nodes (PIM, RN), nd to encrypt dt trnsmitted in the DATA frmes. The uthentiction procedure tkes plce fter the new node determines the first time slot (ZPS) in the superfrme. All network nodes keep in the memory pir of numers (8-it ddress) nd the mster key (128 its)). The sme pir of numers is stored in the server, which cts s Key Distriution Center (KDC). Only node whose dt (ddress nd mster key) re stored in the memory server cn connect to the network. Authentiction is performed fter the connection to the KDC server. The trnsmission ssocited with the uthentiction is performed in the ZPS time slot. The s slot ssignment procedure to the new node occurs only fter successful uthentiction. The result of 4 (203)
6 Andrzej Mrczk uthentiction procedure is to provide the RN or PIM the session key K, which is necessry for the exchnge of informtion with the server. The session key is the sme for ll nodes in the network. Its vlidity cn rnge from few to severl hours. The length of the session key depends on the encryption lgorithm. For the AES lgorithm key length is equl 128 its. The uthentiction procedure consists of four steps: 1. The node tht wnts to connect to the network trnsmits in ZPS time slot, uthentiction pcket (AUTH) contining his encrypted ddress. The ddress is encrypted using mster key. 2. The server, sed on the node ddress, serches in its memory the mster key nd decrypts the encrypted ddress. Then, it compres the two ddresses (the decrypted ddress nd the ddress sent without encryption in the ddress field of the frme). 3. If the comprison result is positive, the server encrypts 128-it session key K using the mster key nd sends it to the uthenticted node lso in the ZPS time slot. Negtive comprison result ends the uthentiction procedure. The server sends one AUTH pcket contining zero. 4. The node receives the encrypted session key K nd decrypts it. Since then, ll trnsmitted dt is secured. From tht moment, the entire trnsmission is secure. In the cse of negtive uthentiction, fter receiving the AUTH pcket with the content zero, the node, fter few superfrmes, my initite re-uthentiction procedure. TIME SLOT ASSIGNMENT PROCEDURE The time slot ssignment procedure is performed fter successful uthentiction of the new node. All RN nodes, pssing AUTH pcket with messge out the negtive uthentiction (1 pcket contining zero 8 ytes of 0 x 00) know tht the node is unuthenticted nd cnnot compete for ccess to the chnnel. After successful uthentiction the new node selects time slot ssigned to itself in four steps. R e q u e s t i n g t h e i n f o r m t i o n o n t i m e s l o t s s i g n m e n t i n t h e c o n t e n t i o n r e When new node joins the network, it does not know the informtion on network topology or time slots ssigned to other nodes in its contention re. To get this informtion, the new node listens to the chnnel nd checks pckets trnsmitted from the neighors. DATA pckets from neighors contin the informtion on their 32 Zeszyty Nukowe AMW Scientific Journl of PNA
7 The secure trnsmission protocol of sensor Ad Hoc network ssigned slots, superfrme length, nd mximum superfrme length. From these pieces of informtion, the new node knows the position of the first time slot in superfrme nd mximum superfrme length mong ll nodes in its contention re. Then the new node sends REQ pcket (0 x 0 C) in the first time slot of the next superfrme. Neighors tht hve received the REQ pcket trnsmitted from the new node, trnsit to the control mode. Ech neighor of the new node gives informtion in its superfrme length nd time slot ssigned to itself nd its neighors y trnsmitting n INF pcket (0 x 0 B) in its ssigned time slot. After ll neighors of the new node hve trnsmitted INF pckets, ll nodes in the contention re of the new node cn know its structure [1]. S e t t i n g t h e s u p e r f r m e l e n g t h n d t i m e s l o t s s i g n m e n t After receiving INF pckets from ll neighors, the new node sets its superfrme length. If ll nodes in its contention re hve the sme superfrme length, the new node sets its own superfrme length to this length. Otherwise, the new node uses the mximum superfrme length mong ll nodes in the contention re. Then, from received INF pckets, the new node knows the informtion on slot ssignment in this contention re. The new node cretes its own time slot ssignment informtion of superfrme length, S 0 where S 0 denotes the frme length tht is set to the new node. If the superfrme length of neighor is sme s S 0, the time slot ssignment informtion of the neighor is copied to tht of the new node. Otherwise, if S 0 = S i, the time slot ssignment informtion of the neighor is copied repetedly to every S 0/ slots. S i is the superfrme length of the neighor nd is n integer of power of two. The new node merges the informtion from ll neighors nd cretes its own time slot ssignment informtion [1]. For exmple, when the new node sets its superfrme length s 8, the time slot ssignment informtion in the INF pcket received from node whose superfrme length is 4 nd ssigned slot is 2 is copied repetedly to every 4 time slots in tht of the new node (fig. 4) [1]. (0) (1) (2) (3) (0) (1) (2) (3) (4) (5) (6) (7) 4 time slots 4 time slots Fig. 4. Copying informtion out node [1] 4 (203)
8 Andrzej Mrczk S e l e c t i n g n s s i g n e d t i m e s l o t Bsed on the time slot ssignment informtion, the new node selects time slot ssigned to itself y three procedures: Getting n unssigned slot (GU) [1]. If some unssigned time slots re found in the time slot ssignment informtion, the new node ssigns one of them to itself. For exmple when unssigned time slots 3 nd 7 re found, the new node cn ssign time slot either 3 or 7 to itself (fig. 5) [1]. (0) (1) (2) (3) (4) c (5) (6) (7) Unssigned time slots Fig. 5. Getting unssigned time slots [1] Relesing multiple ssigned time slots (RMA) [1]. If no unssigned time slot is found, the new node checks whether some nodes in the contention re re ssigned multiple time slots. If such node is found, the new node releses one of these time slots nd ssigns it to itself. If there re more thn one node to which multiple time slots re ssigned, the node with the lrgest numer of ssigned time slots mong them is chosen to relese time slot [1]. For exmple, when node nd c re ssigned multiple time slots, the new node selects time slot from time slots 1, 3, 6 nd 7 which re ssigned to nodes nd c, nd ssigns the selected time slot to itself (fig. 6) [1]. (0) (1) (2) (3) c (4) d (5) e (6) (7) c Node c d e Time slot 1, 6 2 3, Douling the frme (DF) [1]. Multiple time slots Fig. 6. Relesing multiple ssigned time slots [1] If no unssigned time slot is found nd no node hs multiple ssigned slots which re le to e ssigned to the new node, the new node doules the superfrme 34 Zeszyty Nukowe AMW Scientific Journl of PNA
9 The secure trnsmission protocol of sensor Ad Hoc network length of the slot ssignment informtion nd copies the ssignment informtion to oth of the former hlf nd the ltter hlf of douled superfrme. The first time slot in the superfrme is not ssigned to ny nodes. Therefore fter douling the superfrme length, the first time slot in the ltter hlf ecomes unssigned slot. The new node ssigns this time slot to itself [1]. For exmple when the new node doules the superfrme length, slot 8 cn e ssigned to itself (fig. 7) [1]. (0) (1) (2) (3) d (4) c (5) f (6) g (7) e (0) (1) (2) (3) d (4) c (5) f (6) g (7) e (8) (9) (10) (11) d (12) c (13) f (14) g (15) e Unssigned time slot Fig. 7. Douling the superfrme [1] A n n o u n c e m e n t o f u p d t i n g t h e t i m e s l o t s s i g n m e n t i n f o r m t i o n After selecting time slot ssignment, the new node in network sends SUG pcket to its neighors. The SUG pcket contins informtion on the superfrme length nd the ssigned time slot. When the neighoring nodes receive this pcket, they updte time slot ssignment informtion. After updting the informtion sed on the received SUG pcket, ech neighoring node sends REP pcket to its neighoring nodes. Sending this pcket implies the confirmtion of the SUG pcket for the new node nd nnouncement of updting the time slot ssignment informtion nd exiting from the control mode. The sender nd receivers of the REP pcket dopt the new time slot ssignment nd cn restrt dt trnsmission from the next superfrme. The new node, fter receiving the REP pckets from ll neighoring nodes, trnsits to the trnsmit mode [1]. DETECTION OF CONFLICT In the protocol, conflict of slot ssignment occurs when new node connects to two or more nodes to which the sme time slots re ssigned. In the exmple (fig. 8), conflict occurs t new node etween node c nd node f in time slot 5. 4 (203)
10 Andrzej Mrczk 3 1 d 2 e 3 4 g c f 5 5 New node Fig. 8. Exmple of conflict n ssigned time slot [1] When new node detects the conflict, it solves this conflict in the following procedure. D i v i d i n g t h e s s i g n m e n t If multiple slots re conflicting t the new node, these slots re divided to the nodes which hve cused the conflict. In the exmple (fig. 9), conflicting slot 4 nd 12 re divided to nodes nd [1]. 4, 12 4, 12 Divide time slots 4 12 Fig. 9. Dividing the ssignment of time slots [1] D e l e t i n g c o n f l i c t i n g s l o t If in the network re some un-conflicting slots ssigned to nodes cusing the conflict, the conflicting slot is relesed from ll the nodes except for tht with the smllest numer of ssigned slots (fig. 10) [1]. 4, 8, 16 4, 12 Delete time slot 4 from node 8, 16 4, 12 Fig. 10. Deleting the conflicting time slot [1] 36 Zeszyty Nukowe AMW Scientific Journl of PNA
11 The secure trnsmission protocol of sensor Ad Hoc network D o u l i n g t h e s u p e r f r m e n d d i v i d i n g t h e s s i g n m e n t If the conflict occurs mong nodes to which only one time slot is ssigned, this conflict cnnot e solved with the current superfrme length. In this cse, the superfrme length of these nodes is douled nd the time slot ssignment is divided in the douled superfrme. In exmple (fig. 11) the spce for conflicting time slot is douled y douling superfrme length. The spce cn e divided to nodes nd [1]. Superfrme length Doule superfrme length 2, 6 Superfrme length 8 2, 6 Superfrme length 8 Divide time slots 2 6 Fig. 11. Douling the superfrme nd dividing the ssignment [1] After reconfiguring the time slot ssignment, the new node sends SUG pcket with the informtion on the reconfigured slot ssignment nd the selected slot. Neighoring nodes which hve received this SUG pcket lso reconfigure their slot ssignment nd send REP pckets with reconfigured informtion. The new node my fil to collect the informtion on the slot ssignment correctly due to the collisions of INF pckets. Then the new node sends the informtion on the slot in which collisions hve occurred to ll neighoring nodes insted of the SUG pcket. Neighoring nodes of the new node, which hve sent the INF pckets in the conflicting time slot, retrnsmit the INF pckets fter witing for certin superfrmes determined t rndom [1]. RELEASING TIME SLOT ASSIGNMENT When node exits from the network, it stops trnsmitting DATA pckets nd releses time slots ssigned to itself. Neighoring nodes detect the exit of the node when no pckets from exited node hve een received during the time of the superfrme length of the exited node. Then they relese the time slot ssigned to 4 (203)
12 Andrzej Mrczk the exited node from their time slot ssignment informtion. They lso relese the time slots ssigned to nodes tht hve gone out of their contention re due to exit of the node. After reconfiguring the time slot ssignment, neighoring nodes of the exited node send the updted informtion to their neighoring nodes. The nodes which hve received this informtion reconfigure the time slot ssignment y relesing the time slots ssigned to the exited node [1]. CONCLUSION The pper presents the construction of the secure Ad Hoc sensor network protocol. The opertion of this protocol is sed on the ASAP protocol, whose efficiency mesured in terms of the rdio chnnel utiliztion is much lrger thn the USAP protocol [1]. The protocol descried in this pper hs een extended with dditionl functions relted to dt security (uthentiction of new nodes nd encryption of dt trnsmission), nd the determintion of the network hierrchy level of the reference nodes. Two new types of pckets hve een proposed: the uthentiction pcket (AUTH) nd the hierrchy level pcket (LEVEL). The protocol is currently implemented on the hrdwre devices tht will form the sensor network. Acknoledgements This work ws supported in prt y the Project DOBR-BIO4/058/13045/2013. REFERENCES [1] Knzki A., Uemuki T., Hr T., Nishio S., Dynmic TDMA Slot Assignment in Ad Hoc Networks, Proceedings of the 17th Interntionl Conference on Advnced Informtion Networking nd Applictions (AINA 03), Mr. 2003, pp [2] Knzki A., Hr T., Nishio S., An Adptive TDMA Slot Assignment in Ad Hoc Sensor Networks, Proceedings of the 2005 ACM Symposium on Applied computing (SAC 05), pp [3] Stllings W., Kryptogrfi i ezpieczeństwo sieci komputerowych. Mtemtyk szyfrów i techniki kryptologii, trnsltion A. Grżyński, Ed. Helion, Gliwice 2012 [Cryptogrphy nd Network Security. Principles nd Prctice originl title]]. [4] Young C. D., USAP: unifying dynmic distriuted multichnnel TDMA slot ssignment protocol, Proc. IEEE MILCOM, 1996, Vol. 1, pp [5] Young C. D., USAP multiple ccess: dynmic resource lloction for moile multihop multichnnel wireless networking, Proc. IEEE MILCOM, 1999, Vol. 1, pp Zeszyty Nukowe AMW Scientific Journl of PNA
13 The secure trnsmission protocol of sensor Ad Hoc network B E Z P I E C Z N Y P R O T O K Ó Ł T R A N S M I S J I S E N S O R O W E J S I E C I A D H O C STRESZCZENIE W rtykule zprezentowno ezpieczny protokół rdiowej sieci sensorowej Ad Hoc. Sieć t prcuje w oprciu o metodę wielodostępu TDMA. Szykość trnsmisji w knle rdiowym wynosi 57,6 k/s. Przedstwiono udowę rmek, rodzje pkietów orz procedury uwierzytelnini, przypisni wolnych szczelin czsowych do węzł, zwlnini przypisnych szczelin i wykrywni konfliktów przyporządkowni szczelin. Słow kluczowe: Ad Hoc, TDMA, ASAP. 4 (203)
Dynamic TDMA Slot Assignment in Ad Hoc Networks
Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationQoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationNovel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationBayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationAPPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS
APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS TABLE OF FIGURES Figure 1: Spectrl Response of CMOS Imge Sensor...3 Figure 2: Byer CFA Ptterns...4
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More informationMorgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
More informationSTRM Log Manager Installation Guide
Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationIntroduction 1 From need to demand Solutions 1 a
Introduction 1 From need to demnd Solutions 1 Need Existence need Sfety need Socil need Esteem need Self-ctuliztion need Exmples Clothing, medicl cre, wrmth, sexulity Protection ginst threts, stility Belonging
More informationVMware Horizon Mirage Web Manager Guide
VMwre Horizon Mirge We Mnger Guide Horizon Mirge 4.3 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationIntellio Video System 25
Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More informationTraffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationthe machine and check the components
Quick Setup Guide Strt Here HL-2270DW Before using this mchine for the first time, red this Quick Setup Guide to setup nd instll your mchine. To view the Quick Setup Guide in other lnguges, plese visit
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationGoals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?
Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationApplying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)
Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationOr more simply put, when adding or subtracting quantities, their uncertainties add.
Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationIaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationA Study on Autonomous Cooperation between Things in Web of Things
A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, 305-700,
More informationAn FPGA-based high-speed network performance measurement for RFC 2544
Wng et l. EURASIP Journl on Wireless Communictions nd Networking 2015, 2015:2 RESEARCH Open Access An FPGA-sed high-speed network performnce mesurement for RFC 2544 Yong Wng 1*, Yong Liu 2, Xioling To
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationHow To Reduce Telecommunictions Costs
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationMultiplication and Division - Left to Right. Addition and Subtraction - Left to Right.
Order of Opertions r of Opertions Alger P lese Prenthesis - Do ll grouped opertions first. E cuse Eponents - Second M D er Multipliction nd Division - Left to Right. A unt S hniqu Addition nd Sutrction
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationTechnical manual for Multi Apartment Gateway 1456B Passion.Technology.Design.
E TECHICAL MAUAL Art 456B B + - 40-56 Vdc SOLO CO CAVO ROSSO COMELIT 2E7T000500 OLY WITH COMELIT RED CABLE 2E7T000500 FIXED POE SETTABLE POE 0 POE A A2 A3 A4 Technicl mnul for Multi Aprtment Gtewy 456B
More information** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand
Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl
More informationWelch Allyn CardioPerfect Workstation Installation Guide
Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationLecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00
COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationelearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007
elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationSecure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationInter-domain Routing
COMP 631: COMPUTER NETWORKS Inter-domin Routing Jsleen Kur Fll 2014 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit the notion of
More informationHow To Get A Free Phone Line From A Cell Phone To A Landline For A Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationMath 314, Homework Assignment 1. 1. Prove that two nonvertical lines are perpendicular if and only if the product of their slopes is 1.
Mth 4, Homework Assignment. Prove tht two nonverticl lines re perpendiculr if nd only if the product of their slopes is. Proof. Let l nd l e nonverticl lines in R of slopes m nd m, respectively. Suppose
More informationData Compression. Lossless And Lossy Compression
Dt Compression Reduce the size of dt. ƒ Reduces storge spce nd hence storge cost. Compression rtio = originl dt size/compressed dt size ƒ Reduces time to retrieve nd trnsmit dt. Lossless And Lossy Compression
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More information