Performance Evaluation of Multiple IEEE b WLAN Stations in the Presence of Bluetooth Radio Interference

Size: px
Start display at page:

Download "Performance Evaluation of Multiple IEEE 802.11b WLAN Stations in the Presence of Bluetooth Radio Interference"

Transcription

1 Performance Evaluation of Multiple IEEE b WLAN Station in the Preence of Bluetooth Radio Interference Jung-Hyuck Jo and Nikil Jayant Georgia ech Broadband Intitute, Georgia Intitute of echnology, th St., NW, Atlanta, GA 30318, U.S.A. Phone: , fax: , {jhjo, Atract here are everal paper publihed in the pat few year about the evaluation of IEEE (b) WLAN performance degradation due to Bluetooth radio interference. he network topologie ued for WLAN in the previou literature are point-to-point, i.e., one AP and one WLAN tation. In thi paper we evaluate a performance of IEEE (b) ytem compoed of an AP and multiple WLAN tation uing the ame 2.4GHz frequency band in the preence of Bluetooth radio ytem within a BSS. Our reult focu on the impact of Bluetooth interference on IEEE (b) WLAN ytem. he throughput of IEEE (b) i etimated a a function of not only WLAN parameter but alo Bluetooth radio ytem parameter. Further, we derived theoretical maximum throughput of IEEE (b) ytem with perfect channel condition in order to compare with other cenario that conidering interference and competition with other WLAN tation. A a reult, with light and heavy B uage cenario, the IEEE (b) ytem throughput are degraded by 25% and 66%, repectively.. Index erm IEEE , Bluetooth, interference, wirele LAN I INRODUCION HE evaluation of interference in the 2.4 GHz band ha been receiving more attention lately. Kamerman [1] report on tolerable interference level between Bluetooth and device for variou cenario and device poition. Hi analyi i baed on a imple path lo model and Signal to Interference (SIR) requirement for Bluetooth and receiver. Furthermore, the probability of an packet error in the preence of a Bluetooth piconet ha been derived by Enni, and then extended by Shellhammer [2]. Golmie and Mouveaux [3] evaluated the impact of WLAN and other Bluetooth interference on the Bluetooth acce control layer performance. he previouly publihed literature [1][2][3][4][5] dealt with a point-to-point network topology for IEEE (b) WLAN ytem. In thi paper, we evaluate the performance of IEEE (b) ytem compoed of an Acce Point (AP) and multiple WLAN tation (SA) in the preence of Bluetooth (B) radio ytem. Analyi of interference between the IEEE (b) and Bluetooth i not new. Early attempt to ae interference effect have been baed on imple geometric model [2][5]. Our goal in thi paper i to evaluate the performance of IEEE (b) DSSS ytem not imply compoed of one AP and one WLAN tation pair but compoed of one AP and multiple WLAN in the preence of. hi work wa upported by NCR and Georgia ech Broadband Intitute B radio ytem within a baic-uet (BSS). he latter cenario i a more realitic ituation that can be found in emerging office or home environment. We therefore conider the performance of IEEE (b) ytem that i affected not only by multiple WLAN tation but alo by uncoordinated Bluetooth radio interference within a BSS. he remainder of the paper i organized a follow. In Section II the IEEE (b) MAC i modeled, and in Section III the interference model between IEEE (b) WLAN ytem and Bluetooth radio ytem i preented. Finally, numerical reult of imulation baed on the interference model are preented in Section IV and concluding remark are given in Section V. II MODELING OF IEEE (B) MAC Performance evaluation of IEEE (b) MAC protocol poe everal challenge. he preence of hidden tation, ue of carrier ening, and decentralized nature of multiple acce method, are ome of the key factor that impact on ytem performance. In thi tudy we ued H. S. Chhaya [6] model to evaluate the performance WLAN ytem within a ingle BSS. Before proceeding further we need to introduce the following notation: A i (d): a et of tation in a circular area of radiu d around tation i. X i : a location of tation i D : a ditance between tation i and tation j α: capture parameter, α 1 d : αd H j (d): a et of tation that are hidden from tation j and are in a circle of radiu d around j H (d): a et of tation that are hidden from tation i but not from tation j in a circle of radiu d around tation j β: propagation delay including carrier ening delay (in wirele network the propagation delay i dominated by the carrier ening delay given the mall diameter of BSS, i.e., le than 100m) l: the length of a pay load thi doe not include PHY and MAC header. l type i the length of a type frame. A in [6], the implifying aumption are ued. We ignore the effect of frame error due to bit error introduced by channel noie. Limited tation mobility i aumed, which mean that all tation that are currently tranmitting or receiving a data or a control frame remain tationary until the completion of the tranaction /03/$ IEEE 1163

2 Conider a cae where tation i tart the tranmiion of a data frame of length l from tation i to tation j at time t uing baic acce method. We begin by auming that all data frame are of identical ize. he tranmiion will be ucceful only if the following condition are atified: i) the x and the Rx are not hidden from each other; ii) no tation in the Rx capture area that i not hidden from the Rx, tranmit in the time interval (t - β, t + β); iii) no tation in the x capture area that i not hidden from the x, receive uccefully a data frame whoe tranmiion wa initiated in the time interval (t - β, t + β); iv) no tation in H (d ) tranmit during the interval (t, t + l); v) no tation in H ji (d ) tranmit in the interval (t + l + DIFS, t + l + max{difs, SIFS + l ack }). Fig. 1 illutrate the above condition of ii, iii, iv, and v for a pair of tation to tranmit a data frame uccefully. We aume that once the channel i ened idle and a time interval DIFS ha elaped, the time until a data frame i generated at tation i i aumed to be exponentially ditributed with rate i). For notational convenience we define G:=Σ i Ai). For implicity we aume that tranmiion from any tation that are detined for ditinct detination are independent. Let S be the normalized ytem throughput, defined a the fraction of time the channel i ued to uccefully tranmit payload bit. Let be the renewal interval, i.e., the average time the channel i ened buy becaue of ucceful tranmiion, and c be the average time the channel i ened buy by each tation during colliion. he upercript tand for baic acce method and rc for RS/CS acce method. For the renewal interval of ucce tranmiion and failure, we obtain c rc c = PHYHD + MAC + β + 1/ G = PHY + MAC = PHYHD + MACHD + l + β + l + SIFS + β + l = l RS HD HD HD + DIFS + β + 1/ G theor _ max + l + SIFS + β + l + l + DIFS + β + 1/ G RS ACK S = ACK + DIFS + SIFS + β + lcs + SIFS + DIFS + β + 1/ G l ( 1 ) ( 2 ) where, 1/G i the time until the initiation of the firt tranmiion once the channel ha been ened idle for more than DIFS. Baed on thee renewal interval we can alo calculate theoretical maximum throughput, S theor_max, of baic acce method and RS/CS acce method in (2) and the Fig. 2 how thi reult in plot. In thi theoretical maximum throughput, we aume perfect channel condition, no interference, no competing tation, and compatibility among 1Mbp, 2Mbp, 5.5Mbp, and 11Mbp mode. he compatibility mode with variou network data rate mean that A j - H j iv ii A i - H i A i & A j v iii H H ji Fig. 1. IEEE : Illutration of ucceful tranmiion of data frame from SA i to SA j for baic acce method. Among the 5 condition, ii, iii, iv, and v condition are hown in thi figure. Black olid arrow line repreent tranmiion of a data frame, black dotted arrow line repreent tranmiion of an ACK, and red dotted line repreent undeired reception by SA j, which reult in colliion. A circle denote capture area. hroughput Pay Data [byte] RS/CS 2Mbp RS/CS 11Mbp Baic 2Mbp Baic 11Mbp Fig. 2. heoretical maximum throughput of IEEE (b) ytem for baic acce method and RS/CS acce method. hroughput i normalized to it raw data rate. the PHY layer header operate at the peed of lowet rate,1mbp, and the data rate change from MAC header according to the information from PHY layer header. Let u define C(i, to be the et of x-rx pair (m, uch that, C( i, {( m, : m A ( d' ) H ( d' ) or ( 3 ) n A ( d' ) H ( d' )} i i j j 1164

3 For baic acce method, we can define p (i) a the probability that a tranmiion of a data frame from tation i to AP i ucceful. p ( i) [ 1 p ( i) ] + l h k H ( d ' ) k) exp{ [ β + max{0, SIFS + l For RS/CS acce method, p rc ( i) [ 1 p ( i) ] + l h RS k H ( d ' ) ack exp{ [ β k)]} ( m, C ( i, DIFS} ( m, C ( i, m, k H ji ( d ' ) m, k)]} ( 4 ) ( 5 ) B DSSS τ ΒΤ B x y p Fig. 3. ime coincidence between a B piconet lot and a IEEE b packet. For example, if x < p < y, then the IEEE b packet could collide with 2 or 3 B lot db where a tation j i regarded a AP, and p h (i) i the probability of tation i being hidden from AP. hen the throughput of tation i, S(i) i, S( i) = i) p ( i) + p ( i)(1 e G p c c β i) + (1 p ) ( m, C ( i, c ) m, G ( 6 ) 11MHz 22MHz 11MHz Fig. 4. Simplified WLAN receiver filter frequency repone where p c i a probability of colliion with a competing SA. Since l ack + β << l we aume that c, then the denominator reduce to. he overall ytem throughput i given by, S = S i) i A ( ( 7 ) III INERFERENCE MODELING A. Channel Model For the indoor channel model, we apply a propagation model coniting of two part. Line-of-ight (LOS) propagation i aumed for the firt 8 meter. Beyond thi point, path lo increae a function of r, where r i range and n = 3.3. hi can be expreed in term of decibel: L path = FSL + 20 log(4πr / λ), r 8m = nlog( r /8), r > 8m ( 8 ) where, λ i free pace wavelength at 2.45 GHz, and r i range. FSL i the free pace path lo in db determined in the far field of the antenna. Uually for indoor environment, thi i calculated to be 1 or 10 meter. he n factor ha been determined from empirical data collected and can be found in the reference by [8]. For line of ight application in hallway the n factor i le than 2. hi i due to the wave-guide effect provided by the propertie of hallway or corridor. hi model i imilar to the one ued by Kammerman [1]. A Bluetooth FH ytem interfere with the IEEE (b) ytem a a kind of an interference tone. A long a the IEEE (b) receiver get a deired ignal that i 10dB tronger than the in-channel interference tone, the activity of a B device doe not harm. B. Probability of ime Coincidence he time coincidence analyi i baed the model developed in [4][7]. he B piconet wa aumed to be uing ingle time lot packet only, a hown in the Fig. 3. It i aumed that thi i the wort-cae cenario, ince the ue of multiple time lot packet effectively reduce the B hop rate and increae throughput. hi reduce tranmiion time and reult in longer gap in B interference, thereby increaing the chance of ucceful reception of WLAN packet. Under thi aumption, a ingle B packet i tranmitted at each frequency hop with the B time lot duration, B = 625 µ, and the tranmiion time within the time lot, τ B = 366 µ. he IEEE b frame duration p can be up to 1210 µec including PHY and MAC layer header for a tranmiion of 1500 byte packet at the peed of 11Mbp. he tart of tranmiion relative to the B hop time i modeled a a uniform random variable. Under thi aumption, the number of B time lot overlapping in time with the IEEE b packet i either n or n-1 a hown in Fig. 3. he probability of overlapping with n B lot, P n i calculated baed on [4]. ( n 1) + τ FD ( 9 ) B B B n 1 =, Pn = 1 Pn 1 B P 1165

4 where FD i frame duration that include PHY and MAC layer header a well a pay load data. he maximum number of B lot, n max that could collide with IEEE b packet i 3 given that the maximum length of b frame duration i 1210 µec. C. Probability of Frequency Coincidence Frequency coincidence occur when the tranmit frequencie of a B piconet reult in a packet error. he method ued in [4] doe not take into account adjacent channel interference. he method ued in thi tudy follow [7] that incorporating out-of-band interference model. Baed on empirical data [1][4], the IEEE (b) can provide reliable ervice in the preence of narrow-band interferer uch a B tranmitter falling within the pa band given that the Signal-to-Interference Ratio (SIR) in (10) i greater than 10dB. he out-of-band interference model ued in [7], i modified. Intead of uing J (f offet ) of inc function, the narrow band ignal falling into out-of-band are attenuated 30dB more than the interference ignal falling into in-band (22MHz) a hown in Fig. 4. Note that the out-ofband region i 11 MHz wide on each ide of the pa band. I ( f o SIR = S I I ( f offet ) = 30, = 0, f f o offet offet offet ) > 11MHz < 11MHz [ db] and f offet < 22 MHz ( 10 ) where f offet i frequency offet from (b) channel center and I o (f offet ) i 0dB if the narrow band interferer fall into the pa band of 22MHz, and 30dB if within the 11MHz of the out-of pa band. Otherwie we aume that the narrow band interferer doe not affect IEEE (b) performance. D. Probability of Colliion A tudied in the model [1], even if a nearby B piconet i active, there i till a ignificant probability that the IEEE b tation receive uccefully a packet. For a B tranmiion to dirupt an b packet, there mut be an overlap in time and in frequency. he analyi preented here i baed olely on the ue of ingle time lot packet by the B piconet. It i aumed that thi i the wort-cae cenario, ince the ue of multiple time lot packet effectively reduce the B hop rate and increae throughput. hi reduce tranmiion time and reult in longer gap in B interference, thereby increaing the chance of ucceful reception of (b) packet. he probability of colliion model ued in thi tudy i baed on [3]. he probability of colliion with n lot overlap i P ( )) coll where L B i piconet load factor. Overall probability of colliion i P n = 1 (1 ( Phop L ( 11 ) B total = n coll n ( ( P 1 P ( n 1)) + ( P P ( ) coll ( 12 ) ABLE I NEWORK PARAMEERS: IEEE (B) AND BLUEOOH Parameter Value Probability of hidden tation 0.08 or 0.16 Capture parameter 1.5 Propagation delay 1[µec] WLAN data rate 2, 11[Mbp] Bluetooth data rate 1[Mbp] Slot duration 20[µec]] PHY header 128[bit] MAC header 272[bit] ACK 112[bit] CS 160[bit] RS 160[bit] SIFS 10[µec] DIFS 50[µec] WLAN EIRP 20[dBm] B EIRP 0[dBm] Noie floor -95[dBm] Max # of wall between SA 3 Max # of wall between B device 0 Max ditance between SA 60 2[m] Max ditance between B device 10[m] Lo per wall 15[dB] ABLE II B PICONE PARAMEERS FOR HE LIGH AND HEAVY NEWORK ACIVIY SCENARIOS L AND H, RESPECIVELY Scenario D B L B L % H % For more accurate etimate of IEEE (b) network throughput in the preence of interference, the B lot colliion with ACK packet i conidered. here can be multiple B piconet that are cloe enough to caue interference, and there i the poibility that multiple piconet could be active imultaneouly. he probability of interference from m B piconet i P ) m mult( m) = 1 (1 P total ( 13 ) IV NUMERICAL RESULS For the purpoe of obtaining numerical reult we conider a finite number of tation ditributed randomly throughout the BSS. We conidered one AP, 25 SA and B piconet with location a hown in Fig. 5. he tation location were picked to be uniformly ditributed in a 2-dimenional BSS of 60 m by 60 m quare. For IEEE (b) cenario, we conider the cae where the offered load due to all tation, i,, i, j A, i identical. hroughout it i aumed that the probability of hidden terminal, p h (i, i the ame for all tation pair i, j A. he propagation delay between tation i alo conidered contant for all tation pair. hi aumption i valid ince the maximum ditance between a pair of tation i m (diagonal ditance of a quare of a ide length of 60m, i.e., 1166

5 60m 30m hroughput Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if AP 30m SA Fig. 5. Illutration of ditribution of AP, SA, and B piconet. AP i located center of BBS. SA and B piconet are uniformly ditributed over 60m by 60m quare. B 60m (a) Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if hroughput Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if hroughput (b) Fig. 7. IEEE b WLAN data rate of 11Mbp. p h = 0.16 (a) payload ize of 1000 byte and (b) payload ize of 1500 byte hroughput (a) (b) Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if Fig. 6. IEEE WLAN data rate of 2Mbp. p h = 0.08 (a) payload ize of 100 byte and (b) payload ize of 1000 byte = 60 2). he IEEE (b) parameter ued for imulation are hown in able I. For the B topology, we aumed that B piconet are randomly ditributed a SA are without co-locating with SA. In [4], it i however aumed that there i one B piconet co-located with each IEEE WLAN SA and the former one i more practical ituation. For the B piconet parameter and B uer cenario, the ame value and cenario are ued a in [7]. D B i B piconet denity in piconet/m 2. he B piconet parameter value for imulation are in able II. wo B piconet cenario are conidered: L i light B piconet cenario and H i heavy B piconet cenario. he light B piconet traffic activity wa baed on etimate for typical uage for a B piconet in an enterprie etting provided by Bluetooth SIG a reported in [4][7]. For the heavy B piconet cenario, the B piconet denity, D B wa doubled from 0.04 piconet/m 2 to 0.08 piconet/m 2, and the data tranmitted per day were increaed from 150 Kbyte/day to 10 Mbyte/day. hroughout the imulation throughput and offered load are normalized to raw data rate of IEEE (b) ytem. he imulation reult with the WLAN data rate of 2 Mbp, p h = 0.08, i hown in Fig. 6 (a) with payload of 100 byte and (b) with payload of 1000 byte. A hown in Fig. 2, at a WLAN data rate of 2 Mbp, the maximum throughput achievable theoretically i 30% with baic acce method and 20% with RS/CS acce method auming a perfect channel condition. hu, the maximum throughput in Fig. 6 (a) i 23% with baic acce method and 17% with RS/CS acce method due to channel imperfection and competing tation even without B interference. Due to the mall payload ize of 100 byte, baic acce method perform better than RS/CS method with light or heavy B uer cenario. However, in Fig. 6 (b) with payload ize of

6 byte, RS/CS acce method perform better than baic acce method with light and heavy B uer cenario. With a light B uer cenario in Fig. 6 (b), the throughput degraded 25% and with a heavy B uer cenario the throughput degraded 66%. With IEEE b WLAN ytem at a data rate of 11 Mbp in Fig. 7, we aumed the p h i doubled from 0.08 to 0.16 due to the horter range of 11 Mbp WLAN ytem than 2 Mbp WLAN ytem. Under thi aumption with a payload ize of 1000 byte in (a) and 1500 byte in (b), offered load of up to 50% and 40% repectively, the baic acce method perform lightly better than RS/CS acce method. With a light B uer cenario in Fig. 7 (b), the throughput degraded 23% and with high B uer cenario the throughput degraded 66%. V. CONCLUSION In thi paper we evaluated the throughput of multiple IEEE (b) WLAN SA ytem within a BSS in the preence of multiple B radio interference. he WLAN parameter a well a B piconet parameter affected on the throughput of multiple IEEE (b) WLAN SA. With a light and a heavy B uer cenario, the throughput of multiple WLAN SA ytem degraded 25%, and 66% repectively regardle of the WLAN data rate of 2 Mbp and 11 Mbp. In potential future work, a real building databae with interior wall could be ued intead of uing a normalized quare hape a a building databae. In thi cae we could ue a more realitic, ite-pecific ray-tracing model intead of log-normal ditribution channel model. REFERENCES [1] A. Kamerman, Coexitence between Bluetooth and IEEE CCK olution to avoid mutual interference, Lucent echnologie Bell Laoratorie, Jan [2] S. Shellhammer, Packet error rate of an IEEE WLAN in the preence of Bluetooth, in IEEE P /133r0, Seattle, Wahington, May [3] N. Golmie and F. Mouveaux, Interference in the 2.4 GHz ISM band: Impact on the Bluetooth acce control performance, in Proceeding of IEEE ICC, Helinki, Finland, June [4] J. Zyren, Reliability of IEEE WLAN in preence of Bluetooth radio, in IEEE P /073r0, Santa Roa, California, Sept [5] N. Golmie, R. E. Van Dyck, and A. Soltanian, Bluetooth and b Interference: imulation model and ytem reult, in IEEE /195R0, Apr [6] H. S. Chhaya, Performance evaluation of the IEEE MAC protocol for wirele LAN, Mater hei, Illinoi Intitute of echnology, Chicago, Illinoi, May [7] I. Howitt, WLAN and WPAN coexitence in UL band, IEEE ran. Veh. echnol., vol. 50, no. 4, pp , July [8]. S. Rappaport, Wirele Communication. Prentice Hall,

d t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions

d t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions ECS 52A Computer Network Fall 2002 HW 7 Solution. (5 pt) Conider four tation that are attached to two different bu cable. The tation exchange fixed-ize packet of length ec. Time i divided into lot of ec.

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Heat transfer to or from a fluid flowing through a tube

Heat transfer to or from a fluid flowing through a tube Heat tranfer to or from a fluid flowing through a tube R. Shankar Subramanian A common ituation encountered by the chemical engineer i heat tranfer to fluid flowing through a tube. Thi can occur in heat

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Performance Evaluation of a Bluetooth Channel Estimation Algorithm

Performance Evaluation of a Bluetooth Channel Estimation Algorithm Performance Evaluation of a Bluetooth Channel Estimation Algorithm N. Golmie National Institute of Standards and Technology Gaithersburg, Maryland 2899 Abstract Since Bluetooth devices have to share the

More information

Digital Communication Systems

Digital Communication Systems Digital Communication Sytem The term digital communication cover a broad area of communication technique, including digital tranmiion and digital radio. Digital tranmiion, i the tranmitted of digital pule

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Wireless and Battery-less Sensor Using RF Energy Harvesting

Wireless and Battery-less Sensor Using RF Energy Harvesting DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Linear Momentum and Collisions

Linear Momentum and Collisions Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

FLUID MECHANICS. TUTORIAL No.4 FLOW THROUGH POROUS PASSAGES

FLUID MECHANICS. TUTORIAL No.4 FLOW THROUGH POROUS PASSAGES FLUID MECHANICS TUTORIAL No.4 FLOW THROUGH POROUS PASSAGES In thi tutorial you will continue the work on laminar flow and develop Poieuille' equation to the form known a the Carman - Kozeny equation. Thi

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor

More information

Mobility Improves Coverage of Sensor Networks

Mobility Improves Coverage of Sensor Networks Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131

More information

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

On Reference RIAA Networks by Jim Hagerman

On Reference RIAA Networks by Jim Hagerman On eference IAA Network by Jim Hagerman You d think there would be nothing left to ay. Everything you need to know about IAA network ha already been publihed. However, a few year back I came acro an intereting

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Engineering Bernoulli Equation

Engineering Bernoulli Equation Engineering Bernoulli Equation R. Shankar Subramanian Department of Chemical and Biomolecular Engineering Clarkon Univerity The Engineering Bernoulli equation can be derived from the principle of conervation

More information

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science aachuett Intitute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric achinery Cla Note 10: Induction achine Control and Simulation c 2003 Jame L. Kirtley Jr. 1 Introduction

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY BANDS

COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY BANDS Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY

More information

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999 Matlab and Simulink for Modeling and Control Robert Babuška and Stefano Stramigioli November 999 Delft Delft Univerity of Technology Control Laboratory Faculty of Information Technology and Sytem Delft

More information

Omni Antenna vs. Directional Antenna

Omni Antenna vs. Directional Antenna Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros

More information

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK

OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK binding neuron, biological and medical cybernetic, interpike interval ditribution, complex ytem, cognition and ytem Alexander VIDYBIDA OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK A binding neuron

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information