Performance of Multiple TFRC in Heterogeneous Wireless Networks
|
|
- Camilla Jenkins
- 8 years ago
- Views:
Transcription
1 Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding Author Computer Engineering Department, Incheon National Univerity, choi@inchoen.ac.kr Abtract In thi paper, we propoe a method that allow wirele mobile node to obtain high throughput in heterogeneou wirele network and low packet loe under handover ituation uing multiple connection. Currently, a mobile node exchange data with a erver with one network connection. The propoed method can ue higher throughput than the conventional method becaue it doe not only ue one network (, G, etc.), but rather uing multiple wirele network. When mobile node move to the area where heterogeneou wirele network can be ued, the mobile node end etup meage to the erver via heterogeneou wirele network and etablih a new connection. Then, the erver can tranmit packet uing multiple connection. Hence, thi method doe not diconnect previou network, which reulting in decreaed packet lo. Uing the n-2 imulation, we can verify that the propoe method enhance throughput and decreae packet lo. Keyword: TFRC, Multiple Connection, Heterogeneou Wirele Network, Simultaneou 1. Introduction Addition to voice ervice, modern portable device provide high quality ervice, online game, large data tranmiion and video. For high quality internet ervice, mobile node need more bandwidth and need to control network reource efficiently. Thu, the iue of efficient network control i under active dicuion to improve network throughput for G, 4G and (Wirele Local Area Network). However, in mobile environment, mobile node move continuouly and network condition change frequently. In thee ituation, if mobile node in wirele network do not adapt to network condition, packet lo increae and quality of ervice (QoS) i reduced. Thi problem i the one of the key factor that prevent uer from receiving high quality ervice [1-2]. Figure 1. Heterogeneou wirele network and handover Handover i the proce of moving a node from one network to other network in cellular or wirele network. There are two type of handover,: horizontal handover and vertical handover. Horizontal handover occur when the node move from the current network to the homogeneou network. Vertical handover occur, when the node move to heterogeneou network. Figure 1 how vertical handover. Vertical handover i divided into two clae, downward vertical handover and upward vertical handover. In downward vertical handover, the node move from low throughput, wide range network International Journal of Advancement in Computing Technology(IJACT) Volume 5, Number 12, Augut
2 to high throughput, hort range network. In downward vertical handover, the node need more time to ue full bandwidth becaue the bandwidth hould abruptly be increaed. Upward vertical handover occur when the node move from high throughput, hort range network to low throughput, wide range network. In upward handover, many packet loe occur becaue the node cannot adapt to the changed network [2-4]. In thi paper, we propoe a method for allowing wirele mobile node to obtain high throughput in heterogeneou wirele network uing multiple connection with low packet lo under the handover ituation. 2. Related Work TFRC (TCP Friendly Rate Control)[7] i a protocol ued in multimedia application and, i deigned for ue with TCP. In TFRC, a ender control throughput uing the feedback information of a receiver [5][6]. But, it i doe not work well in heterogeneou wirele network becaue the bandwidth of heterogeneou wirele network change abruptly. Thu, TFRC doe not adapt to the new bandwidth and degrade ervice quality [2][]. Freeze-TCP[9] i a method to improve throughput in the handover ituation. If a node i aware that handover ha occurred, it end a meage to the erver that et window ize to be 0. When the erver receive thi meage, it top ending packet. When handover end, the node end a meage to the erver that et the window ize to it value before handover. However, Freeze-TCP caue ome adaptation problem. In upward handover, the node hould wait to ue full bandwidth. In downward handover, the node lot packet becaue of low bandwidth. The IEEE MIH[10] tandard define media-acce independent mechanim that enable the optimization of handover between heterogeneou IEEE 02 ytem and may facilitate handover between IEEE 02 ytem and cellular ytem, but it ha ome problem becaue it doe not conider the tranport layer handover. Multipath TCP (MPTCP)[11] i a et of extenion to regular TCP that allow one TCP connection to be pread acro multiple path. MPTCP ditribute the load through the creation of eparate "ubflow" acro potentially dijoint path. A multipath flow hould perform at leat a ingle path flow that would on the bet of the path available to it, but it doe not conider wirele network, heterogeneou network and handover[12]. In thi paper, Multipath TFRC in heterogeneou wirele network can improve throughput uing multiple connection to reduce packet lo in handover.. Tranmiion Rate Control in Heterogeneou Wirele Network uing Multiple Connection Figure 2. Mobile node uing G or LTE Figure. Mobile node uing Current mobile device can tranport data only uing one network. Figure 2 how that mobile device ue one network (G or LTE). In Figure 2, mobile node ue G or 4G becaue it i out of range. Figure how mobile node ue even though they can ue G or 4G. If a node 160
3 want to etablih a new connection for, mobile node will diconnect the current G or $G network and etablih a new connection for. Figure 4. Heterogeneou wirele Network uing multiple connection However, mobile node can improve performance uing heterogeneou network a hown in Figure 4. MTFRC (Multiple TFRC) which propoed in thi paper, ue heterogeneou network if mobile node move to heterogeneou network can be ued. In B of the Figure 4, mobile node cannot ue, and they can only ue G/4G. If a mobile node move to A, it will automatically earch, and uer i notified. The uer who receive the notice, can choice whether he ue heterogeneou network or not. If the uer want to ue only in A, other network are diconnected. When the firt packet lo occur, TFRC receiver calculate the packet lo rate from the number of packet between the firt packet lo and the next packet lo and maintain it for RTT. Next, the lo event rate and average lo rate are calculated, and the receiver tranmit thee value to the ender. The ender received thee value and calculate the tranmiion rate, which can be written a. (1) 2 RTT RTO( ) p(1 ) Where RTO i time out the information of retranmiion timer, which i 4 time average RTT. The tranmiion rate of the propoed method i the um of the and G tranmiion rate, which can be written a MTFRC G. ( The tranmiion rate in can be obtained by. () RTT RTO ( ) p(1 The tranmiion rate in G i calculated uing the modified WLNA tranmiion rate. RTT and RTO are calculated by multiplying the contant number j, which i written a G. (4) j * RTT j * RTO ( ) p(1 161
4 The tranmiion rate of the propoed method i the addition of G and, which can be computed by MTFRC RTT RTO ( ) p(1 1 j * j. (5) In thi equation, (1+j)/j i alway bigger than 1, which mean that propoed method ha better performance than previou method, where 0<j<1. 4. Experiment We ue network imulator 2 (n to evaluate the propoed method. The configuration i hown a Figure 2 and conit of a mobile node, a erver, and a bae tation for the G network and an acce point for. The packet are tranmitted from ever to mobile node uing TFRC. The G coverage i much larger than the coverage. If there i one network, the mobile node tranmit data uing one connection. If, however, there are multiple network, mobile node chooe network uing the propoed method. The G network ha 2 Mbp data rate and 5m delay. ha 11Mbp data rate and 15m delay. The packet ize i 1000byte and CBR (contant bit rate) traffic model i ued. Figure 5 how the throughput that a mobile node move from a G network area to a area uing TFRC. In previou TFRC, packet loe occur between 22 and 25. After the handover ection, the previou protocol can ue high bandwidth but do not ue it becaue packet loe occur in handover ection. Thu, the previou protocol need more time to adapt to the new network after the handover ection, which caue unneceary congetion control and overhead. The propoed method ue the previou network and new network, G and. Thu more throughput i available than in the previou method becaue the propoed method do not diconnect the previou connection, which we can ee after 25. Figure 6 how the throughput that a mobile node move from a area to G network. Between 1 to, we can ee that MTFRC need more time to acquire the peak data rate, which occur when G network and tarted uing both network. Thi problem i not ignificant becaue we ue leat one connection. If the mobile node ue one connection, the problem doe not occur. Between Figure 5. Throughput comparion between TFRC and MTFRC on movement for a wide bandwidth environment Figure 6. Throughput comparion between TFRC and MTFRC on movement for a narrow bandwidth environment 22 to 25, packet loe occurred, which prevent the network from rapidly adapting to the new network. The propoed method ha fewer packet loe in the handover ection becaue it doe not diconnect the previou network. Thu, we can ee that MTFRC need le time to adapt to the new network. The G network doe not diconnect all the time, which caue minimum packet lo. Moreover, we can ee higher throughput between 0 to 22 than uing one network. 162
5 5. Concluion The propoed method ha two advantage. Firt, it ha better performance than the previou method becaue it doe not ue one network but intead ue multiple connection in network uch a and G. Thu, the propoed method ue heterogeneou and make mobile node ue more throughput than the previou method. Second, it ha fewer packet loe than previou method when it i ued in the handover ection, which mean that mobile node decreae timeout event and retranmiion. We imulate for network imulation 2, and the propoed method i hown to have better performance than the previou method. Acknowledgement Thi work wa upported by the Incheon National Univerity (International Cooperative) Reearch Grant in Reference [1] C.T. Lin and J. W. Ding, CAR: a low latency video-on-demand broadcating cheme for heterogeneou receive, IEEE Tran. on Broadcating, vol. 52, Iue, pp. 6-49, Sep [2] S. Ko and K. Chung, Quality adaptation cheme for video treaming ervice in heterogeneou wirele network, Proc. of the KIISE Korea Computer Congre 2011, vol., no. 1(A), pp. 5-7, Jun [] M. Stemm and R. H. Katz, Vertical handover in wirele overlay network, Mobile Network and Application, vol., no. 4, pp. 5 50, Dec, 199 [4] A. Hwang, J. Lee, W. Jung, and B. Kim, Congetion Control Algorithm for TCP Performance Enhancement by Bandwidth Meaurement in Vertical Handoff between Heterogeneou Wirele Network, Journal of the intitute of electronic engineer of Korea, vol. 4, no., pp. 4-90, Aug [5] E. Blanton, M. Allman, K. Fall, and L. Wang, A Conervative Selective Acknowledgement (SACK)-Baed Lo Recovery Algorithm for TCP, RFC 517 pp.1-11, Apr. 200 [6] E. Kohler, M. Handley, and S. Floyd, Datagram Congetion Control Protocol (DCCP) Congetion Control ID 2: TCP-like Congetion Control, RFC 440 pp.1-12, Mar [7] M. Handley, S.Floyd, j Padhye, and J.Widmer, TCP friendly rate control (TFRC): protocol pecification, RFC 44 pp.1-2, Jan. 200 [] A. Gurtov and J. Korhonen, Effect of vertical handover on performance of TCP-friendly rate control, ACM SIGMOBILE Mobile Computing and Communication Review, vol., no., pp. 7-7, Jul [9] G. Tim, M. Jame, Phatak. DS, G. Vipul, Freeze - TCP: A true end-to-end TCP enhancement mechanim for mobile environment, in Proc. IEEE INFOCOM pp , Irael, Mar [10] IEEE, IEEE Standard for Local and metropolitan area network-part 21: Media independent Handover Service, IEEE td , pp.1-90 Jan, 2009 [11] C. Raiciu, M. Handley and D. Wichik, Coupled multipath-aware congetion control, IETF RFC 656, pp.1-12 October 2011 [12] H. K. Kang, T. A. Le, C. S. Hong, Multi-path TCP Congetion Control for Streaming Service in Wirele Network, Journal of KISS : Information networking, vol. 9 no. 2 [2012],
Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationGabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow
Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant
More informationHow to Maximize User Satisfaction Degree in Multi-service IP Networks
How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationPerformance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network
International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More informationDistributed Monitoring and Aggregation in Wireless Sensor Networks
Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationTHE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE
THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationTHE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More informationNetwork Architecture for Joint Failure Recovery and Traffic Engineering
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,
More informationA Duality Model of TCP and Queue Management Algorithms
A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationInternational Journal of Heat and Mass Transfer
International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationA Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University
A Communication Model with Limited Information-Proceing Capacity of Recipient Oleg V. Pavlov WPI Robert K. Plice San Diego State Univerity Nigel Melville Univerity of Michigan, Ann Arbor Keyword pam, email,
More informationSector Concentration in Loan Portfolios and Economic Capital. Abstract
Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector
More informationA SURVEY ON EFFICIENT VIDEO SHARING AND STREAMING IN CLOUD ENVIRONMENT USING VC
A SURVEY ON EFFICIENT VIDEO SHARING AND STREAMING IN CLOUD ENVIRONMENT USING VC M.Sona 1, D.Daniel 2, S.Vanitha 3 PG scholar, Deptarment of CSE, Dr.N.G.P Institute of Technology, Coimbatore, India 1 Assistant
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationd t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions
ECS 52A Computer Network Fall 2002 HW 7 Solution. (5 pt) Conider four tation that are attached to two different bu cable. The tation exchange fixed-ize packet of length ec. Time i divided into lot of ec.
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationHUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationResearch Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationVoIP over WiMAX: Quality of Experience Evaluation
VoIP over WiMAX: Quality of Experience Evaluation Vitor Bernardo, Bruno Sousa, Marilia Curado Laboratory of Communications and Telematics Department of Informatics Engineering, University of Coimbra {vmbern,bmsousa,marilia}@dei.uc.pt
More informationWireless and Battery-less Sensor Using RF Energy Harvesting
DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationDespeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units
Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com
More informationSimulation of Sensorless Speed Control of Induction Motor Using APFO Technique
International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationHow To Understand The Hort Term Power Market
Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,
More informationSPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :
S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationDistributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
More informationRegulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing
Proceeding of the 44th IEEE Conference on Deciion and Control, and the Euroean Control Conference 005 Seville, Sain, December 1-15, 005 WeB14.5 Regulated Maximal Matching: A Ditributed Scheduling Algorithm
More informationMATLAB/Simulink Based Modelling of Solar Photovoltaic Cell
MATLAB/Simulink Baed Modelling of Solar Photovoltaic Cell Tarak Salmi *, Mounir Bouzguenda **, Adel Gatli **, Ahmed Mamoudi * *Reearch Unit on Renewable Energie and Electric Vehicle, National Engineering
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationGrowing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds
Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationEVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More informationPerformance Evaluation of Multiple IEEE 802.11b WLAN Stations in the Presence of Bluetooth Radio Interference
Performance Evaluation of Multiple IEEE 802.11b WLAN Station in the Preence of Bluetooth Radio Interference Jung-Hyuck Jo and Nikil Jayant Georgia ech Broadband Intitute, Georgia Intitute of echnology,
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationGraph Analyi I Network Meaure of the Networked Adaptive Agents
Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationPerformance of VoIP with DCCP for Satellite Links
Performance of VoIP with DCCP for Satellite Links Golam Sarwar, Roksana Boreli, Emmanuel Lochin To cite this version: Golam Sarwar, Roksana Boreli, Emmanuel Lochin. Performance of VoIP with DCCP for Satellite
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationIAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659
IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio
More informationOptimizing a Semantic Comparator using CUDA-enabled Graphics Hardware
Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More information119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom
A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and
More informationEngineering Bernoulli Equation
Engineering Bernoulli Equation R. Shankar Subramanian Department of Chemical and Biomolecular Engineering Clarkon Univerity The Engineering Bernoulli equation can be derived from the principle of conervation
More informationSJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
More informationAuction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing
1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing
More informationGlobal Imbalances or Bad Accounting? The Missing Dark Matter in the Wealth of Nations. Ricardo Hausmann and Federico Sturzenegger
Global Imbalance or Bad Accounting? The Miing Dark Matter in the Wealth of Nation Ricardo Haumann and Federico Sturzenegger CID Working Paper No. 124 January 2006 Copyright 2006 Ricardo Haumann, Federico
More informationDevelopment Progress
H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M
More informationLaboratory Evidence for Surface Nucleation of Solid Polar Stratospheric Cloud Particles
10238 J. Phy. Chem. A 2002, 106, 10238-10246 Laboratory Evidence for Surface Nucleation of Solid Polar Stratopheric Cloud Particle A. Tabazadeh,*, Y. S. Djikaev, P. Hamill, and H. Rei NASA Ame Reearch
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More information