IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY

Size: px
Start display at page:

Download "IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117"

Transcription

1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY Capacity ad Delay of Hybrid ireless Broadbad Access Networks Pa Li, Chi Zhag, Studet Member, IEEE, ad Yuguag Fag, Fellow, IEEE Abstract A optical etwork is too costly to act as a broadbad access etwork. O the other had, a pure wireless ad hoc etwork with odes ad total badwidth of bits per secod caot provide satisfactory broadbad services sice the perode throughput dimiishes as the umber of users goes large. I this paper, we propose a hybrid wireless etwork, which is a itegrated wireless ad optical etwork, as the broadbad access etwork. Specifically, we assume a hybrid wireless etwork cosistig of radomly distributed ormal odes, ad m regularly placed base statios coected via a optical etwork. A source ode trasmits to its destiatio oly with the help of ormal odes, i.e., i the ad hoc mode, if the destiatio ca be reached withi L (L ) hops from the source. Otherwise, the trasmissio will be carried out i the ifrastructure mode, i.e., with the help of base statios. Two trasmissio modes share the same badwidth of bits/sec. e first study the throughput capacity of such a hybrid wireless etwork, ad observe that the throughput capacity greatly depeds o the maximum hop cout L ad the umber of base statios m. e show that the throughput capacity of a hybrid wireless etwork ca scale liearly with oly if m =Ω(), ad whe we assig all the badwidth to the ifrastructure mode traffics. e the ivestigate the delay i hybrid wireless etworks. e fid that the average packet delay ca be maitaied as low as Θ() eve whe the per-ode throughput capacity is Θ( Idex Terms Hybrid wireless etworks; capacity; delay; broadbad access etworks. I. INTRODUCTION THE INTERNET S pheomeal growth has triggered great icrease o demads for broadbad services. Thus, how to desig a broadbad access etwork to provide broadbad services is essetial to the further success of the Iteret. Optical etworks ca provide high badwidth ad low etwork delay [3] [25] [26]. However, they are too costly to act as broadbad access etworks. Sice wireless etworks ca be deployed easily ad quickly with low cost, we the tur to them for help. I their semial paper [2], Gupta ad Kumar show that the per-ode throughput capacity i radom wireless ad hoc etworks is Θ( log ) bits/sec, which meas radom ad hoc etworks caot scale. Later o, Buragohai et al. [4] study Mauscript received 5 Jauary 2008; revised 4 July This work was partially supported by the Natioal Sciece Foudatio uder grats CNS ad DBI The work of Fag was also partially supported by the Project uder B08038 with Xidia Uiversity, Chia. P. Li, C. Zhag ad Y. Fag is with Departmet of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL 326 ( {lipaleo@,zhagchi@,fag@ece.}ufl.edu Y. Fag is also a Chagjiag Scholar Chair Professor with Natioal Key Laboratory of Itegrated Services Networks, Xidia Uiversity, Xi a, Chia. Digital Object Idetifier 0.09/JSAC I this paper, we use the Kuth s otatios [3]: f() =O(g()) meas f() is asymptotically upper bouded by g(); f() = Ω(g()) meas f() is asymptotically lower bouded by g(); f() = Θ(g()) meas f() is asymptotically tight bouded by g(); f() =o(g()) meas f() is asymptotically egligible with respect to g(); f() =ω(g()) meas f() is asymptotically domiat with respect to g( the throughput capacity i grid etworks where there are odes ad the average source-destiatio distace is d. They show that the Ω(/d) throughput ca be achieved. Thus, grid etworks caot scale either sice d = ω() formostofthe cases. The work i [2] deals with dese etworks, i.e., the area is fixed ad the ode desity icreases liearly as the umber of odes, ad the authors assume the whole etwork is coected. Dousse et al. [6] study the throughput capacity i exteded etworks where the desity of odes is fixed ad the area icreases liearly with the umber of odes. They show that by allowig a arbitrary small fractio of the odes to be discoected i 2-dimesioal exteded etworks, a ovaishig rate ca be achieved for each ode. Ozgur et al. [22] also ivestigate the throughput capacity of a coected ad hoc etwork. Their results show that by itelliget ode cooperatio ad distributed MIMO commuicatio, the dese etworks ca scale liearly with the umber of odes, ad the exteded etworks scale as 2 α/2 for 2 α<3 ad for α 3, whereα is the path loss expoet i power propagatio model. Moreover, Duarte-Melo et al. [7] study the case of semi-exteded etworks, where both ode desity ad the etwork area icrease as the umber of odes icreases. Specifically, they assume the etwork area is a disk of radius γ, 0 <γ< 2. ith a (+d) propagatio model, they show α that the per-ode throughput capacity is Ω( ),i.e.,semiexteded etworks caot scale. γ Sice we prefer the etwork to be coected, ad the odes i the etwork to be loosely coupled as well, the results for pure ad hoc etworks are pessimistic, i.e., they caot scale as the umber of odes. This meas pure wireless ad hoc etworks caot provide satisfactory broadbad service whe the umber of etwork users goes large. I this study, we propose to use hybrid wireless etworks as the broadbad access etworks, which are also called multihop cellular etworks [8]. Hybrid wireless etworks ca be oe-dimesioal, two-dimesioal with strip area [7], or two-dimesioal with square area [6]. Traffic patter i the etwork ca be asymmetric [27] or symmetric [4] [23] [28]. I this study, we oly focus o two-dimesioal square hybrid wireless etworks with symmetric traffics. e first ivestigate the throughput capacity of hybrid wireless etworks. Kozat ad Tassiulas [4] study the throughput capacity of hybrid wireless etworks where both ad hoc odes ad access poits are radomly distributed. They show that the per-ode throughput capacity ca be Θ(/ log ) bits per secod if the umber of access poits scales liearly with the umber of odes, which meas the etwork caot scale. Similar results are also reported i []. Zemliaov ad Veciaa [28] ivestigate the throughput capacity of hybrid wireless /08/$25.00 c 2008 IEEE Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

2 8 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 etworks where ad hoc odes are radomly distributed ad base statios are arbitrarily placed. They show that the perode throughput capacity depeds o the umber of base statios, but the etwork still caot scale. Assumig odes are radomly distributed ad m base statios are regularly placed, Liu et al. [6] study the throughput capacity of hybrid wireless etworks. They cosider two differet routig strategies. Uder k-earest-cell routig strategy, if m grows asymptotically slower tha, the maximum per-ode throughput capacity is Θ( log /m ), adthe 2 beefit of addig base statios is isigificat. However, if m grows asymptotically faster tha, the maximum per-ode throughput capacity is Θ( m ), which icreases liearly with the umber of base statios. Uder probabilistic routig strategy, similar results are obtaied. The threshold of the umber of base statios above which the per-ode throughput capacity icreases liearly with m is log. Thus, the etwork ca scale if m =Ω( Actually, the authors i [6] assume k =0, i.e., a ode trasmits to its destiatio i the ad hoc mode oly if it is i the same cell. However, the 0-earest-cell routig strategy caot efficietly make use of the wireless chael. For example, if a source ode ad its destiatio are withi oehop distace of each other, but they are ot i the same cell, the they caot directly commuicate i the ad hoc mode accordig to the routig strategy. Istead, the trasmissios betwee these two odes ca oly be carried out through base statios. Besides, the case k = 0 is too specific. To provide a solutio to a more geeral case, ad to better utilize the badwidth resource, Pei et al. [23] propose to use the L-maximum-hop routig strategy. Ufortuately, the capacity bouds derived i [23] are ot tight. I this paper, we revisit the throughput capacity problem i hybrid wireless etworks by usig the L-maximum-hop resource allocatio strategy i [23] 2. Specifically, a source ode trasmits to its destiatio i the ad hoc mode if the destiatio ca be reached from the source withi L (L ) hops. Otherwise, the trasmissio will be carried out i the ifrastructure mode. Assumig a total badwidth of bits/sec is split ito three parts, i.e., for ad hoc mode, 2 for uplik i the ifrastructure mode, ad 3 for dowlik i the ifrastructure mode, we show that: ) whe L =Ω( 3 ), the throughput capacity of the log 2 3 etwork is Θ( L log )+Θ(m 2 Ifm =Ω( L log ), we ca have higher throughput whe all the traffics are carried i the ifrastructure mode. The per-ode throughput capacity icreases liearly with the umber of base statios m, ad the etwork ca scale oly if m =Ω( Ifm = O( L log ), we ca achieve higher throughput whe all the traffics are carried i the ad hoc mode, ad the etwork caot scale. 2) whe L = o( 3 ), the throughput capacity of log 2 3 the etwork is Θ(L 2 log )+Θ(m 2 If m = Ω(L 2 log ), we ca have higher throughput whe all 2 e call it a resource allocatio strategy istead of a routig strategy because we oly decide which kid of resource a trasmissio uses, ad do ot specify how to choose a route from a source to a destiatio. the traffics are carried i the ifrastructure mode. The per-ode throughput capacity icreases liearly with the umber of base statios m, ad the etwork ca scale oly if m =Ω( Ifm = O(L 2 log ), we ca achieve higher throughput whe all the traffics are carried i the ad hoc mode, ad the etwork caot scale. It ca be easily show that the results obtaied i [6] uder the 0-earest-cell routig strategy is just a special case i 2) preseted above. Furthermore, we also compare the throughput capacity of our hybrid wireless etworks with that of pure ad hoc etworks. The capacity gai is clearly show. I additio to the throughput capacity, the packet delay is also a importat issue i the etwork. [2], [8], [0], [5], [9], ad [20] propose to utilize odes mobility to deliver packets. Each packet is oly relayed for very few times before arrivig at the destiatio. For example, i [0], each packet is at most relayed oce, i.e., relayed by at most oe relayig ode. They fid that there is a trade-off betwee the capacity ad the delay. Specifically, i pure ad hoc etworks, the capacity ca oly be icreased at the cost of greatly icreased delay. Moreover, Gamal et al. [9] show that usig mobility to icrease throughput, eve slightly, would lead to a abrupt ad large icrease i delay. I this paper, we also study the delay i hybrid wireless etworks. e fid that by addig base statios i pure ad hoc etworks, the capacity ca be improved without icreasig the delay. Particularly, i hybrid wireless etworks, the average packet delay ca be maitaied as low as Θ() eve whe the per-ode throughput capacity is Θ( The rest of this paper is orgaized as follows. I Sectio II we itroduce some defiitios. Sectio III gives the hybrid wireless etwork model, icludig the etwork architecture, the iterferece model, ad the resource allocatio strategy. I Sectio IV ad Sectio V, we derive the throughput capacity ad delay of hybrid wireless etworks, respectively. e fially coclude this paper i Sectio VI. II. DEFINITIONS Throughput: As defied i the usual way, the time average of the umber of bits per secod that ca be trasmitted by each ode to its destiatio is called the per-ode throughput. The sum of per-ode throughput over all the odes i a etwork is called the throughput of the etwork. Feasible Throughput: e say that the throughput of a etwork, deoted by λ(), is feasible if there exists a spatial ad temporal schedulig scheme that yields a aggregate etwork throughput of λ() bits/sec. Throughput Capacity of A Network: e say that the throughput capacity of a etwork ( [4]) is of order O(f()) bits per secod if there is a determiistic costat c < + such that lim if Prob(λ() =c f() is feasible) <, + ad is of order Θ(f()) bits per secod if there are determiistic costats 0 <c 2 <c 3 < + such that lim if Prob(λ() =c 2f() is feasible) =, + lim if Prob(λ() =c 3f() is feasible) <. + Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

3 LI et al.: CAPACITY AND DELAY OF HYBRID IRELESS BROADBAND ACCESS NETORKS 9 Average Packet Delay of A Network: The delay of a packet i a etwork is the time it takes the packet to reach the destiatio after it leaves the source. As i [5], [20], we do ot cosider the queuig delay at the source ode sice we are more iterested i the etwork delay. The average packet delay of a etwork is obtaied by averagig over all trasmitted packets i the etwork. Besides, we also assume the packet size scales as the per-ode throughput 3. III. HYBRID IRELESS NETORK MODEL A. Network Architecture e cosider a two-tier hybrid wireless etwork o the surface of a torus of uit area. The low tier is composed of ormal odes, ad the higher tier cosists of m base statios, respectively. The assumptio of a torus eables us to avoid techicalities arisig out of edge effects, but the results derived i the paper are applicable for odes located o a uit square as well. e assume odes are uiformly ad idepedetly distributed. They have the same trasmissio power, ad hece the same trasmissio rage deoted by r( e follow the process i [0] to choose radom seder-receiver pairs so that each ode is a source ode for oe flow ad a destiatio ode for at most O() flows. The m base statios are regularly placed i the etwork, dividig the area ito a hexagoal tessellatio, which is exactly the classical 7-cell reuse model as described i [24]. Each hexago is called a cell ad there is oe base statio i the ceter of each cell. Base statios do ot serve as data sources or data destiatios. Istead, they oly help relay the packets for the ormal odes. Furthermore, we also assume base statios are iter-coected by a optical etwork, i which the lik badwidth is large eough. Thus, the wired etwork has o badwidth costraits. B. Iterferece Model e employ the Protocol Model i [2] as the iterferece model. Suppose ode X i trasmits to aother ode X j. X i ad X j also deote the positios of these two odes. The, the trasmissio is successful if the followig two coditios are satisfied: ) The distace betwee X i ad X j is o more tha r(), the trasmissio rage of the odes, i.e., X i X j r( 2) The positios of other trasmitters X k simultaeously trasmittig over the same chael should satisfy: X k X j ( + Δ)r( The quatity Δ > 0 models situatios where a guard zoe is specified by the protocol to prevet a eighborig ode from trasmittig o the same chael at the same time. It also allows for imprecisio i the achieved rage of trasmissios. 3 As poited out i [9], uder this assumptio, queuig delay at source ode ca actually be a costat, which gives us aother reaso to focus o etwork delay. C. Resource Allocatio Strategy I hybrid wireless etworks, packets ca be trasmitted i two modes: ad hoc mode ad ifrastructure mode. I the ad hoc mode, packets are forwarded from the source to the destiatio with oly the help of ormal odes, i.e., without the help of base statios. hile i the ifrastructure mode, packets are first trasmitted from the source to the wired etwork, ad the to the destiatio. I this paper, we cosider a L-maximum-hop (L ) resource allocatio strategy. I particular, if a destiatio ode ca be reached withi L hops from a source ode, the the packets betwee this source ad destiatio pair are trasmitted i the ad hoc mode. Otherwise, packets are trasmitted i the ifrastructure mode. Moreover, we assume a total badwidth of bits/sec 4, which is split ito three frequecy bads, i.e., for ad hoc mode, 2 for uplik for ifrastructure mode, ad 3 for dowlik for ifrastructure mode, respectively. Sice the uplik has the same amout of traffic as the dowlik, we have 2 = 3. Thus, = IV. CAPACITY OF HYBRID IRELESS NETORKS UNDER L-MAXIMUM-HOP RESOURCE ALLOCATION STRATEGY I this sectio, we derive the capacity of hybrid wireless etworks uder L-maximum-hop resource allocatio strategy. e assume all odes are equipped with omidirectioal ateas. Recall that the trasmissios i the ad hoc mode, the uplik ad dowlik trasmissios i the ifrastructure mode use differet frequecy bads, i.e.,, 2,ad 3, respectively. e assume there is o iterferece betwee these three types of traffics, ad they ca be carried out simultaeously. Thus, the throughput capacity of the etwork with odes ad m base statios, deoted by λ(, m), ca be represeted as λ(, m) =λ a (, m)+λ i (, m) where λ a (, m) ad λ i (, m) deote the throughput capacity cotributed by the ad hoc mode trasmissios ad the ifrastructure mode trasmissios, respectively. Notice that λ(, m), λ a (, m), adλ i (, m) all deote the aggregated throughput capacity. e use λ 0 (, m), λ 0 a(, m), adλ 0 i (, m) to deote the correspodig per-ode throughput capacity, respectively. A. Ad Hoc Mode Throughput Capacity Cosider the low tier etwork compoet, i.e., uiformly ad idepedetly distributed odes o a plaar torus. e first itroduce some of the defiitios ad results i [2], listed as follows. c i s are used to deote determiistic costats idepedet of. Vorooi Tessellatio [2]: Give a set of poits i a plae, Vorooi tessellatio divides the domai ito a set of polygoal regios, the boudaries of which are the perpedicular bisectors of the lies joiig the poits. 4 Notice that badwith has several meaigs. I sigal processig, it is a measure of the width of a rage of frequecies, measured i hertz. Here, however, we refer it to be a rate of data trasfer, measured i bits per secod. Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

4 20 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 Lemma 4. i [2]: For every ε>0, there is a Vorooi tessellatio with the property that every Vorooi cell cotais a disk of radius ε ad is cotaied i a disk of radius 2ε. The for the odes, we ca costruct a Vorooi tessellatio V for which (V) Every Vorooi cell cotais a disk of area 00 log /. (V2) Every Vorooi cell is cotaied i a disk of radius 2ρ(), where ρ() := the radius of a disk of area 00 log. Adjacet Vorooi Cells: e say two Vorooi cells are adjacet if they share a commo poit (every Vorooi cell is aclosedset e choose the rage r() of each trasmissio so that r() =8ρ(), which allows direct commuicatio withi a Vorooi cell ad betwee adjacet Vorooi cells. Iterferig Neighbors: we say two cells are iterferig eighbors if there is a poit i oe cell which is withi a distace (2 + Δ)r() of some poit i the other cell. Lemma 4.3 i [2]: he all odes i the etwork use omidirectioal ateas, every cell i V has o more tha c iterferig eighbors, where c depeds oly o Δ ad grows o faster tha liearly i ( + Δ) 2. Proof: Let V be a Vorooi cell. If V is a iterferig eighborig Vorooi cell, there must be two poits, oe i V ad the other i V, which are o more tha (2+Δ)r() uits apart. From (V2), the diameter of a cell is bouded by 4ρ( Hece V, ad similarly every other iterferig eighbor i the Protocol Model, must be cotaied withi a commo large disk D of radius 6ρ() +(2+Δ)r( Such a disk caot cotai more tha c 2 = [6ρ()+(2+Δ)r()]2 ρ 2 () =(22+8Δ) 2 O((+Δ) 2 ) disks of radius ρ( By (V), there ca therefore be o more tha this umber of cells withi D. Thus, c = c 2 is the a upper boud o the umber of iterferig eighbors of the cell. Lemma 4.4 i [2]: I the Protocol Model, there is a schedule for trasmittig packets such that i every ( + c ) slots, each cell i the tessellatio V gets oe slot for packet trasmissio, ad all trasmissios are successfully received withi a distace r() from their trasmitters. e first derive a lower boud o the per-ode throughput capacity by choosig the routes of packets to approximate the straightlie coectig the source ad the destiatio. Deote the straight lie coectig a source ode X i ad a destiatio ode Y i as L i. Uder the L-maximum-hop resource allocatio strategy, we ow boud the probability that L i itersects a give Vorooi cell V. Lemma : For segmet L i ad Vorooi cell V, uder the L-maximum-hop routig strategy, Prob(L i itersects V ad L i is usig ) c 3 L 3 ( log )2. Proof: As metioed before, Vorooi cell V is cotaied 400 log π i a disk of radius 2ρ(), i.e.,. Suppose X i lies at a distace x from the ceter of this disk as show i Fig., the the agel α subteded at X i by the disk is o X i Lr( ) 2 ρ( ) Fig.. Illustratio for calculatig the probability that L i itersects Vorooi cell V. more tha c4 log x. The area of the sector formed is o more tha c5l2 r 2 ()α 2π.IfY i does ot lie i the sector, the the lie L i caot itersect the disk cotaiig the cell V. Thus, the probability that L i itersects the disk is o more tha c6l2 x ( log ) 3 2. Sice X i is uiformly distributed o the plae of uit disk, the probability desity that it is at a distace x from the ceter of the disk is bouded above by 2c 7 πx. Besides, i order for L i to itersect V, we eed 2ρ() x Lr( As a result, we ca obtai Prob(L i itersects V ad L i is usig ) 8L 00 log π c 6 L log x (log ) 3 2 2c7 πxdx π c 3 L 3 ( log )2. Sice there are lies {L i } i=, coectig X i ad Y i,the mea umber of lies passig through a Vorooi cell that use frequecy bad is bouded as follows: E(Number of lies i {L i } i= itersects V ad L i is usig ) c 3 L 3 log2. Notice that routes follow lies. By exploitig uiform covergece i the law of large umbers alog the lie i [2], we have the followig two results. Lemma 2: There is a δ () 0 such that Prob ( sup (Number of lies L i itersectig V ad L i V V is usig ) c 3 L 3 log2 ) δ ( Note that the traffic hadled by a cell is proportioal to the umber of lies passig through it. Sice each lie o frequecy bad carries traffic of rate λ 0 a (, m) bits per secod, we have the followig boud. Lemma 3: There is a δ () 0 such that Prob ( sup (Traffic eedig to be carried by cell V ) V V c 3 λ 0 a (, m)l3 log2 ) δ ( This implies that the rate at which each cell eeds to trasmit is less tha c 3 λ 0 a (, m)l3 log2 with high probability. This rate ca be accommodated by all cells if it is less tha the rate available, i.e., if c 3 λ 0 a(, m)l 3 log2 c 2. Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

5 LI et al.: CAPACITY AND DELAY OF HYBRID IRELESS BROADBAND ACCESS NETORKS 2 Thus, we arrive at a lower boud o the per-ode throughput capacity cotributed by ad hoc mode trasmissios, as show i the followig lemma. Lemma 4: For ad hoc mode trasmissios, uder the L- maximum-hop resource allocatio strategy, ) whe L =Ω( 3 ), there is a determiistic costat log 2 3 c>0 ot depedig o, Δ, or, such that λ 0 a (, m) = c ( + Δ) 2 L 3 log 2 bits per secod is feasible with high probability, i.e., λ 0 a (, m) =Ω( L 3 log 2 2) ad whe L = o( 3 ), there is a determiistic log 2 3 costat c>0 ot depedig o, Δ, or,such that λ 0 a(, m) =. bits per secod is feasible with high probability. Next, we fid a upper boud o the per-ode throughput capacity. Lemma 5.4 i [2]: The umber of simultaeous trasmissios o ay particular chael is o more tha 4 N max = c 8 πδ 2 r 2 () i the Protocol Model. Uder the L-maximum-hop resource allocatio strategy, the mea umber of hops take by a packet trasmitted i the ad hoc mode, deoted by h, is calculated as follows: h πr 2 () πl 2 r 2 () +2 3πr 2 () πl 2 r 2 () L [L2 (L ) 2 ]πr 2 () πl 2 r 2 () = 4L3 +3L 2 L 6L 2 Sice each source geerates λ 0 a(, m) bits per secod, there are sources, each of which trasmits to its destiatio i ad hoc mode with a probability of πl 2 r 2 (), the the total umber of bits per secod served by the etire etwork eeds to be at least πl 2 r 2 () hλ 0 a (, m To esure that all the required traffic is carried, we therefore eed Thus, πl 2 r 2 () hλ 0 a(, m) N max. λ 0 a(, m) log c 9 Δ 2 L 3 r 4 (). Sice r() > π with high probability [], the we obtai is ecessary to guaratee coectivity λ 0 c a(, m) Δ 2 L 3 log 2. Besides, we also have λ 0 a (, m). Thus, we arrive at the followig lemma. Lemma 5: For ad hoc mode trasmissios, uder the L- maximum-hop resource allocatio strategy, ) whe L = Ω( 3 ), a upper boud o per-ode log 2 3 throughput capacity is λ 0 a (, m) = c Δ 2 L 3 log 2 bits per secod, where c < +, ot depedig o, Δ, or, 2) ad whe L = o( 3 ), a upper boud o per-ode log 2 3 throughput capacity is λ 0 a(, m) =. Notice that the probability that oe ode will trasmit to its destiatio ode i ad hoc mode is πl 2 r 2 ( LetN i ( j ) be a radom variable defied as follows: N i =, source ode i trasmits to its destiatio ode i ad hoc mode; 0, otherwise. Let N T be a radom variable defied as the total umber of source odes trasmittig i ad hoc mode, i.e., N T = i= N i. Thus, the expected umber source odes i ad hoc mode is: Sice f(n i Θ( E(N T )=E( N i )= i= E(N i i= = ) = πl 2 r 2 (), ad r() eeds to be log ) to make the etwork coected [], we have5 E(N i )= πl 2 r 2 () +0 ( πl 2 r 2 ()) = πl 2 log. Thus, E(N T )= πl 2 log = πl2 log. Recall the Cheroff bouds [5]: For ay δ>0, P [N T > ( + δ)πl 2 log ] < ( For ay 0 <δ<, e δ )πl ( + δ) +δ P [N T < ( δ)πl 2 log ] <e 2 δ2 πl 2 log. From the above, we ca obtai for ay 0 <δ<, P [ N T πl 2 log >δπl 2 log ] <e θπl2 log. 2 log. where θ > 0. So,as, the total umber of source odes trasmittig i ad hoc mode is equal to πl 2 log with probability. Thus, the total ad hoc mode traffic is πl 2 r 2 ()λ 0 a (, m), i.e., c L 2 log. Combiig Lemma 4 ad Lemma 5 leads to the followig theorem. q 5 Note r() =Θ(q log ) meas r() log =cr where 0 <c r < +. e igore c r i the followig derivatios for simplicity, which will ot chage our fial results. Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

6 22 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 Theorem : Uder the L-maximum-hop routig strategy, the throughput capacity of the etwork cotributed by ad hoc mode trasmissios is Θ( L log ), L =Ω( 3 ); log λ a (, m) = 2 3 Θ((L 2 log ) ), L = o( 3 log 2 3 B. Ifrastructure Mode Throughput Capacity e the derive the throughput capacity cotributed by trasmissios i the ifrastructure mode. Notice that each packet trasmitted from a source to its destiatio i ifrastructure mode will use oe uplik ad oe dowlik, ad hece it should be couted oly oce for the throughput capacity. Sice the badwidth for uplik is 2 bits/sec, the throughput capacity per cell, deoted by λ c i (, m), is upper bouded by 2. As we metioed before, the base statios divide the area ito a hexago tessellatio, i.e., a 7-cell frequecy reuse patter. Thus, the throughput capacity per cell is lower bouded by 7 2. Fially, we obtai the followig theorem. Theorem 2: Uder the L-maximum-hop routig strategy, the throughput capacity of the etwork cotributed by ifrastructure mode trasmissios is λ i (, m) =Θ(m 2 Proof: e have show that λ c i (, m) =Θ( 2 There are m cells, which leads to λ i (, m) =Θ(m 2 C. Throughput Capacity of the Network From Theorem ad Theorem 2, we ca obtai the followig theorem. Theorem 3: Uder the L-maximum-hop resource allocatio strategy, the throughput capacity of the etwork is Θ( L log )+Θ(m 2), L =Ω( 3 ); log λ a (, m) = 2 3 Θ(L 2 log )+Θ(m 2 ), L = o( 3 log 2 3 Case : L =Ω( 3 log 2 3 Accordig to Theorem 3, we have λ(, m) = Θ( L log )+Θ(m 2 If m =Ω( L log ), the we ca have higher throughput whe =0, i.e., 2 = /2, ad λ max (, m) = Θ(m ), ad hece, { Θ( ), if m =Ω(); λ 0 max(, m) = Θ( m ), if m = o( If m = o( L log ), the we ca have higher throughput whe 2 =0, i.e., =,ad λ max (, m) = Θ( L log ), ad hece, λ 0 max(, m) = Θ( L log Sice L = Ω( 3 ),thel log, ad hece log 2 3 λ 0 max(, m) 0 as, which meas the per-ode throughput capacity dimiishes as goes large ad the etwork caot scale. Case 2: L = o( 3 log 2 3 Accordig to Theorem 3, we have λ(, m) = Θ(L 2 log )+Θ(m 2 If m =Ω(L 2 log ), the we ca have higher throughput whe =0, i.e., 2 = /2, ad λ max (, m) = Θ(m ), ad hece, { Θ( ), if m =Ω(); λ 0 max (, m) = ), if m = o( Θ( m If m = o(l 2 log ), the we ca have higher throughput whe 2 =0, i.e., =,ad ad hece, λ max (, m) = Θ(L 2 log ), λ 0 max (, m) = log Θ(L2 Sice L = o( 3 ),the L 2 log log as,which meas the per-ode throughput capacity dimiishes as goes large ad the etwork caot scale. From the above, we arrive at the followig results. Corollary : Uder the L-maximum-hop resource allocatio strategy, ) whe L =Ω( 3 ), (i) if m =Ω( log 2 3 L log ), we ca have higher throughput whe =0, ad the etwork ca scale oly if m =Ω(); (ii) if m = o( L log ), we ca have higher throughput whe 2 =0,adtheetwork caot scale. 2) whe L = o( 3 ), (i) if m log 2 3 =Ω(L2 log ), we ca have higher throughput whe =0,adtheetwork ca scale oly if m =Ω(); (ii) if m = o(l 2 log ), we ca have higher throughput whe 2 =0,adthe etwork caot scale. D. Comparisos with Pure Ad Hoc Networks Gupta ad Kumar have show i [2] that for pure ad hoc etworks, whe each ode radomly chooses aother ode as its destiatio with o limit to the maximum umber of hops, the per-ode throughput capacity is Θ( log ediscuss i the followig whether the per-ode throughput capacity ca be ehaced by placig some base statios i the etwork ad the impacts of L ad m o the throughput capacity of hybrid wireless etworks. Case : L =Ω( 3 log 2 3 ) If m =Ω( L log ), If m =Ω(), theλ 0 max (, m) =Θ( If m = o(), the λ 0 max (, m) = Θ(m ) = Sice the trasmissio rage of the Ω( L log Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

7 LI et al.: CAPACITY AND DELAY OF HYBRID IRELESS BROADBAND ACCESS NETORKS 23 log π odes satisfies r() > as metioed before, the L = O( log Thus, we obtai λ 0 max(, m) = Ω( log Moreover, whe L = Θ( 3 ), we ca obtai log 2 3 λ0 max(, m) = 3 Ω( ),adwhel = ω( ), we ca 3 log 3 log 2 3 obtai λ 0 max (, m) =Ω(o( ) 3 log 3 2) If m = o( L log ),wehaveshowthatλ0 max(, m) = Θ( L log Sice L = O( log ), we have λ 0 max(, m) = Ω( log Furthermore, whe L = Θ( 3 ), we have log 2 3 λ0 max(, m) = Θ( ), 3 log 3 ad whe L = ω( 3 ), we have log 2 3 λ0 max (, m) = o( 3 log 3 I this case, we limit L to Ω( 3 Ifm = o( log 2 3 L log ), the icrease of base statios does ot icrease the per-ode throughput capacity. But, the throughput capacity of hybrid wireless etworks is greater tha that of pure ad hoc etworks. If we add some more base statios i the etwork so that m is lower bouded by L log but upper bouded by, the per-ode throughput capacity icreases liearly with the umber of base statios, which is Θ( m ), ad also greater tha that of pure ad hoc etworks. Moreover, if we keep addig base statios i the etwork such that m = Ω(), the per-ode throughput capacity will reach its maximum, i.e., Θ( Besides, we also observe that except for the case that m =Ω(), the throughput capacity of hybrid wireless etworks always gets smaller as the maximum umber of hops L icreases. Case 2: L = o( 3 log 2 3 e otice that i this case, L 2 log = o( 2 3 log 3 ) If m =Ω(L 2 log ), If m =Ω(), wehaveshowthatλ 0 max(, m) = Θ( If m = o(), λ 0 max (, m) = Θ(m Thus, if m =Ω( 2 3 log 3 ),theλ0 max(, m) =Ω( ); 3 log 3 ad if m = o( 2 3 ), the log 3 λ0 max (, m) = 4 o( Furthermore, whe L = Ω( ), 3 log 3 log 3 4 we obtai that λ 0 max(, m) = Ω( log ), ad whe L = o( 4 ), we obtai that log 3 4 λ0 max(, m) = Ω(o( log ) 2) If m = o(l 2 log ) =o( 2 3 log 3 ),theλ0 max (, m) = Θ( L2 log ) = o( Moreover, whe L = 3 log 3 Ω( 4 ), we obtai that log 3 4 λ0 max (, m) =Ω( log ), ad whe L = o( 4 ), we obtai that log 3 4 λ0 max(, m) = o( log I this case, we further limit L to o( 3 If m = log 2 3 o(l 2 log ), the icrease of base statios does ot icrease the per-ode throughput capacity, which is o( If 3 log 3 we add some more base statios i the etwork so that m =Ω(L 2 log ), the per-ode throughput capacity icreases liearly with the umber of base statios. If m =Ω( 2 3 ), log 3 the the per-ode throughput capacity will be lower bouded by.ifm =Ω(), the per-ode throughput capacity 3 log 3 will reach its maximum, i.e., Θ( Besides, we observe that except for the case that m =Ω(), the throughput capacity of hybrid wireless etworks gets larger as the maximum umber of hops L icreases, which is quite differet from that i Case. Notice that whe L is as small as o( 4 ), the capacity log 3 4 of hybrid wireless etworks ca be eve smaller tha that of pure ad hoc etworks. This is because i this case too may odes share the resource i the ifrastructure mode, which sigificatly limits the etwork capacity. From the above, we also fid that addig base statios ito the pure ad hoc etworks ca have sigificat impacts o the etwork capacity oly if m =Ω( L log ) whe L =Ω( 3 ), log 2 3 or m =Ω(L 2 log ) whe L = o( 3 Iotherwords, log 2 3 as the maximum hop cout L icreases, the threshold of m, above which the capacity of hybrid wireless etworks icreases liearly with m, first icreases whe L is small, ad the decreases whe L is large. E. More Discussios I [6], the authors use a routig strategy such that a source ode trasmits to its destiatio ode i the ad hoc mode oly if the destiatio is i the same cell as the source. They show that uder this routig strategy, the maximum throughput capacity icreases liearly with the umber of base statios m if m =Ω( e show i the followig that this ca be cosidered as a special case i our aalysis. he m = Ω( ), we ca obtai that L = O( m /r()) = O( 4 log ), ad hece m = Ω(L 2 log Actually, this is icluded i the case that L = o( 3 ) log 2 3 as we have show before. Accordig to our results, whe m = Ω( ) = Ω(L 2 log ), the maximum throughput capacity icreases liearly with m, which is the same as that i [6]. V. DELAY IN HYBRID IRELESS NETORKS UNDER L-MAXIMUM-HOP RESOURCE ALLOCATION STRATEGY I the literature, there are some works ( [2], [8], [9], [5], [9], [20]) about the trade-off betwee capacity ad delay i mobile ad hoc etworks. They show that by usig mobility to icrease the capacity of the etwork, the delay will also be icreased. Recall that i static radom ad hoc etworks, the per-ode throughput capacity is Θ( log ), ad the average packet delay is Θ( log Gammaletal.[9]showthatwhe the capacity of mobile radom ad hoc etworks icreases to Θ(), the average packet delay icreases to Θ( log Ithis Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

8 24 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 TABLE I THROUGHPUT CAPACITY AND PACKET DELAY IN HYBRID IRELESS NETORKS. L m Per-ode Throughput Capacity Average Packet Delay Ω() Θ( ) Ω( 3 log 2 3 ) (Ω( L log ),o()) Θ( m ) Θ() o( L log ) Θ( L log ) Ω() Θ( ) Θ(L) o( 3 log 2 ) (Ω(L 2 log ),o()) Θ( m ) Θ() 3 o(l 2 log ) Θ( L2 log ) Θ(L) sectio, we study the delay i hybrid wireless etworks to see whether there also exists such a trade-off. e first preset a fudametal result, which will be used frequetly, as follows. Lemma 6: Uder L-maximum-hop resource allocatio strategy, if we choose the route of packets to approximate the straightlie coectig the source ad the destiatio, for packets trasmitted i the ad hoc mode, the average delay is Θ(L), ad for packets trasmitted i the ifrastructure mode, the average delay is Θ( Recall that the umber of trasmitters i the ad hoc mode is πl 2 log with probability. The, the umber of trasmitters i the ifrastructure mode is πl 2 log with probability. Thus, the average delay of all the packets i the hybrid etwork, deoted by D 0 (), is D 0 () = Θ( πl2 log L +( πl 2 log ) ) = Θ( L3 log + Case : L =Ω( 3 log 2 3 As we metioed before, the average delay of all the packets i the hybrid etwork is D 0 () =Θ( L3 log +)=Ω( ) If m = Ω( L log ), we ca have higher throughput whe all the badwidth is assiged to the traffics i the ifrastructure mode, i.e., there are o traffics i the ad hoc mode. Thus, the average delay of all the packets is D 0 max() =Θ( 2) m = o( L log ), we ca have higher throughput whe all the badwidth is assiged to the ad mode traffics. I this case, the average delay of all the packets is D 0 max () =Θ(L) =Ω( 3 log 2 3 Besides, sice L = O( log ), we also have Dmax 0 () =O( log Thus, we observe that i this case, as we put more ad more base statios i the etwork so that m icreases from o( L log ) to Ω( L log ), the delay decreases while the capacity icreases as we show i Sectio IV-D. Case 2: L = o( 3 log 2 3 The same as before, the average delay of all the packets i the hybrid etwork is D 0 () =Θ( L3 log +)=Θ( ) If m = Ω(L 2 log ), we ca have higher throughput whe all the badwidth is assiged to the traffics i the ifrastructure mode, ad the average delay of all the packets is Dmax() 0 =Θ( 2) m = o(l 2 log ), we ca have higher throughput whe all the badwidth is assiged to the ad mode traffics, ad the average delay of all the packets is Dmax 0 () =Θ(L) =o( 3 log 2 3 Besides, sice L =Ω(),wehave Dmax 0 () =Θ(L) =Ω( Similar to that whe L =Θ( 3 log 2 3 ),asm icreases from o(l 2 log ) to Ω(L 2 log ), the delay decreases while the capacity icreases. I coclusio, we fid that the smaller the maximum hop umber L is, the smaller the average packet delay is. Specifically, whe L = Ω( 3 ), the average delay is log 2 3 lower bouded by 3 if m = o( log 2 3 L log ), ad is Θ() if m = Ω( L log Besides, whe L = o( 3 ), the log 2 3 delay is o( 3 ) if m = log 2 3 o(l2 log ), ad is Θ() if m =Ω(L 2 log Combiig the results of the throughput capacity ad the correspodig delay, we arrive at Table I, from which we observe that i hybrid wireless etworks, by addig base statios to help carry out trasmissios, the per-ode throughput capacity ca achieve Θ( ) while the average packet delay is kept as low as Θ( VI. CONCLUSION I this paper, we study the throughput capacity ad the average packet delay i hybrid wireless etworks. e fid that for most of the cases, hybrid wireless etworks have greater throughput capacity ad smaller average packet delay tha pure ad hoc etworks. Moreover, we observe that whe m = Ω(), the per-ode throughput capacity ca be Θ( ) while the average packet delay is maitaied as low as Θ( Oly Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

9 LI et al.: CAPACITY AND DELAY OF HYBRID IRELESS BROADBAND ACCESS NETORKS 25 whe L = o( 4 ) ad m = log 3 4 o(l2 log ), hybrid wireless etworks have smaller throughput capacity tha pure ad hoc etworks. This is because i this case, there are a small umber of base statios while too may odes share the badwidth i the ifrastructure mode. e also otice that we eed to assig all the badwidth to either ad hoc mode trasmissios or ifrastructure mode trasmissios i order to have higher throughput. I either case, oe of the two mode trasmissios will get o badwidth at all. I order to avoid this situatio, we ca assig some miimum amout of badwidth to each mode, as suggested i [6]. Sice hybrid wireless etworks ca provide high throughput capacity ad low packet delay, we ca fially coclude that wireless hybrid etworks is a good solutio to broadbad access etworks. REFERENCES [] A. Agarwal ad P. Kumar. Capacity bouds for ad hoc ad hybrid wireless etworks. ACM SIGCOMM Computer Commuicatio Review, 34(3):7 8, July [2] N. Basal ad Z. Liu. Capacity, delay, ad mobility i wireless adhoc etworks. I Proceedig of the IEEE Iteratioal Coferece o Computer Commuicatios (INFOCOM 03), Sa Fracisco, Califoria, USA, March [3] L. Brate, I. Tardy, A. Nordbotte, Z. Elek, ad A. Morozova. Future broadbad access etworks. broadbadtutorials.php. [4] C. Buraagohai, S. Suri, C. Toth, ad Y. Zhou. Improved throughput bouds for iterferece-aware routig i wireless etworks. I CO- COON 07, Baff, Caada, July [5] T. Corme, C. Leiserso, R. Rivest, ad C. Stei. Itroductio to Algorithms (2d ed. MIT Press, 200. [6] O. Dousse, M. Fraceschetti, ad P. Thira. O the throughput scalig of wireless relay etworks. IEEE Tras. Iform. Theory (Joit special issue with IEEE/ACM Tras. Networkig), 52(6): , [7] E. Duarte-Melo, A. Josa, M. Liu, D. Neuhoff, ad S. Pradha. The effect of ode desity ad propagatio model o throughput scalig of wireless etworks. I Proc. IEEE Iteratioal Symposium o Iformatio Theory (ISIT), July [8] A. Gamal, J. Mamme, B. Prabhakar, ad D. Shah. Throughput-delay trade-off i wireless etworks. I Proc. IEEE Iteratioal Coferece o Computer Commuicatios (INFOCOM 04), Hog Kog, Chia, March [9] A. Gamal, J. Mamme, B. Prabhakar, ad D. Shah. Throughput-delay trade-off i wireless etworks part i: The fluid model. IEEE Tras. Iform. Theory, 52(6): , [0] M. Grossglauser ad D. Tse. Mobility icreases the capacity of ad hoc wireless etworks. IEEE/ACM Tras. Networkig, 0(4): , August [] P. Gupta ad P. Kumar. Critical power for asymptotic coectivity i wireless etworks. Stochastic Aalysis, Cotrol, Optimizatio ad Applicatios, A Volume i Hoor of.h. Flemig: , 998. [2] P. Gupta ad P. Kumar. The capacity of wireless etworks. IEEE Tras. Iform. Theory, 46(2): , March [3] D. Kuth. The Art of Computer Programmig. Addiso-esley, 998. [4] U. Kozat ad L. Tassiulas. Throughput capacity of radom ad hoc etworks with ifrastructure support. I Proc. ACM MobiCom, Aapolis, MD, USA, Jue [5] X. Li, G. Sharma, R. Mazumdar, ad N. Shroff. Degeerate delay-capacity tradeoffs i ad-hoc etworks with browia mobility. IEEE/ACM Tras. Networkig, Special Issue o Networkig ad Iformatio Theory, 4: , [6] B. Liu, Z. Liu, ad D. Towsley. O the capacity of hybrid wireless etworks. I Proc. IEEE Iteratioal Coferece o Computer Commuicatios (INFOCOM 03), Sa Fracisco, Califoria, USA, March [7] B. Liu, P. Thira, ad D. Towsley. Capacity of a wireless ad hoc etwork with ifrastructure. I Proc. ACM MobiHoc, Motreal, Quebec, Caada, September [8] H. Luo, R. Ramjee, P. Siha, L. Li, ad S. Lu. Uca: a uified cellular ad ad-hoc etwork architecture. I Proc. ACM MobiCom, Sa Diego, Califoria, USA, September [9] J. Mamme ad D. Shah. Throughput ad delay i radom wireless etworks with restricted mobility. IEEE Tras. Iformatio Theory, 53(3):08 6, [20] R. Moraes, H. Sadjadpour, ad J. Garcia-Lua-Aceves. O mobilitycapacity-delay trade-off i wireless ad hoc etworks. I Proceedig of the IEEE/ACM Iteratioal symposium o Modelig, Aalysis, ad Simulatio of Computer ad Telecommuicatio Systems (MAS- COTS 04), Voledam, Netherlads, October [2] A. Okabe, B. Boots, K. Sugihara, ad S. Chiu. Spatial tessellatios : cocepts ad applicatios of Vorooi diagrams. iley Series i Probability ad Statistics, [22] A. Ozgur, O. Leveque, ad D. Tse. How does the iformatio capacity of ad hoc etworks scale? I Proc. Forty-fourth Aual Allerto Coferece o Commuicatio, Cotrol ad Computig, Moticello, IL, USA, September [23] Y. Pei, J. Modestio, ad X. ag. O the throughput capacity of hybrid wireless etworks usig a l-maximum-hop routig strategy. I Proc. IEEE Vehicular Techology Coferece, [24] T. Rappaport. ireless Commuicatios: Priciples ad Practice (Secod Editio Pretice-Hall PTR, [25] S. Sarkar, S. Dixit, ad B. Mukherjee. A evolutio sceario of a broadbad access etwork usig r-soa-based wdm-po techologies. J. Lightwave Techol., 25(): , [26] S. Sarkar, S. Dixit, ad B. Mukherjee. Hybrid wireless-optical broadbad-access etwork (woba): A review of relevat challeges. J. Lightwave Techol., 25(): , [27] S. Toumpis. Capacity bouds for three classes of wireless etworks. I Proc. ACM MobiHoc, Roppogi Hills, Tokyo, Japa, May [28] A. Zemliaov ad G. Veciaa. Capacity of ad hoc wireless etworks with ifrastructure support. IEEE J. Sel. Areas Commu., 23(3), March Pa Li (IEEE, S 06 / ACM 07) received his B.E. i Electrical Egieerig from Huazhog Uiversity of Sciece ad Techology, uha, Chia, i He is workig towards his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at Uiversity of Florida. His research iterests iclude capacity ad coectivity aalysis, medium access cotrol, routig algorithms, ad cross-layer desig i wireless etworks. He is a studet member of the IEEE ad the ACM. Chi Zhag (IEEE, S 06) received the B.E. ad M.E. degrees i Electrical Egieerig from Huazhog Uiversity of Sciece ad Techology, uha, Chia, i July 999 ad Jauary 2002, respectively. Sice September 2004, he has bee workig towards the Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at Uiversity of Florida, Gaiesville, Florida, USA. His research iterests are etwork ad distributed system security, wireless etworkig, ad mobile computig. Yuguag Michael Fag (IEEE, S 92-M 94- S 96-M 97-SM 99-F 08) received a Ph.D. degree i Systems Egieerig from Case ester Reserve Uiversity i Jauary 994 ad a Ph.D degree i Electrical Egieerig from Bosto Uiversity i May 997. He was a assistat professor i the Departmet of Electrical ad Computer Egieerig at New Jersey Istitute of Techology from July 998 to May He the joied the Departmet of Electrical ad Computer Egieerig at Uiversity of Florida i May 2000 as a assistat professor, got a early promotio to a associate professor with teure i August 2003 ad to a full professor i August He holds a Uiversity of Florida Research Foudatio (UFRF) Professorship from 2006 to Authorized licesed use limited to: Uiversity of Florida. Dowloaded o Jue 20, 2009 at 03:00 from IEEE Xplore. Restrictios apply.

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Multicast Capacity in Mobile Wireless Ad Hoc Network with Infrastructure Support

Multicast Capacity in Mobile Wireless Ad Hoc Network with Infrastructure Support Multicast apacity i Mobile ireless Ad Hoc Networ with Ifrastructure Support Xi he, etao Huag ad Xibig ag Departmet of Electroic Egieerig Shaghai Jiao Tog Uiversity, hia Email: qfbzcx,yelohuag,xwag8}@sjtu.edu.c

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks

Throughput and Delay Analysis of Hybrid Wireless Networks with Multi-Hop Uplinks This paper was preseted as part of the ai techical progra at IEEE INFOCOM 0 Throughput ad Delay Aalysis of Hybrid Wireless Networks with Multi-Hop Upliks Devu Maikata Shila, Yu Cheg ad Tricha Ajali Dept.

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Interference Alignment and the Generalized Degrees of Freedom of the X Channel

Interference Alignment and the Generalized Degrees of Freedom of the X Channel Iterferece Aligmet ad the Geeralized Degrees of Freedom of the X Chael Chiachi Huag, Viveck R. Cadambe, Syed A. Jafar Electrical Egieerig ad Computer Sciece Uiversity of Califoria Irvie Irvie, Califoria,

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

1 The Gaussian channel

1 The Gaussian channel ECE 77 Lecture 0 The Gaussia chael Objective: I this lecture we will lear about commuicatio over a chael of practical iterest, i which the trasmitted sigal is subjected to additive white Gaussia oise.

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

AP Calculus BC 2003 Scoring Guidelines Form B

AP Calculus BC 2003 Scoring Guidelines Form B AP Calculus BC Scorig Guidelies Form B The materials icluded i these files are iteded for use by AP teachers for course ad exam preparatio; permissio for ay other use must be sought from the Advaced Placemet

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

Connectivity in Secure Wireless Sensor Networks under Transmission Constraints Coectivity i Secure Wireless Sesor Networks uder Trasmissio Costraits Ju Zhao Osma Yaga ad Virgil Gligor March 3 04 CMU-CyLab-4-003 CyLab Caregie Mello Uiversity Pittsburgh PA 53 Coectivity i Secure Wireless

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Floating Codes for Joint Information Storage in Write Asymmetric Memories

Floating Codes for Joint Information Storage in Write Asymmetric Memories Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 ajiag@cs.tamu.edu Vaske Bohossia Electrical

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

5 Interconnection Networks

5 Interconnection Networks 5 Itercoectio Networks 5. INTRODUCTION Networkig strategy was origially employed i the 950's by the telephoe idustry as a meas of reducig the time required for a call to go through. Similarly, the computer

More information

Performance Analysis of Energy Utilization in Static and Mobility Relaying in WSN

Performance Analysis of Energy Utilization in Static and Mobility Relaying in WSN Iteratioal Joural of Sciece, Egieerig ad Techology Research (IJSETR) Performace Aalysis of Eergy Utilizatio i Static ad Mobility Relayig i WSN S.Girija M.tech, Mr.S.Arumozhi M.tech (Phd), Mr.S.Abazhaga

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig

More information

Semiconductor Devices

Semiconductor Devices emicoductor evices Prof. Zbigiew Lisik epartmet of emicoductor ad Optoelectroics evices room: 116 e-mail: zbigiew.lisik@p.lodz.pl Uipolar devices IFE T&C JFET Trasistor Uipolar evices - Trasistors asic

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic Paper Performace Evaluatio of the MSMPS Algorithm uder Differet Distributio Traffic Grzegorz Dailewicz ad Marci Dziuba Faculty of Electroics ad Telecommuicatios, Poza Uiversity of Techology, Poza, Polad

More information

MARKOV MODEL M/M/M/K IN CONTACT CENTER

MARKOV MODEL M/M/M/K IN CONTACT CENTER MARKOV MODEL M/M/M/K IN CONTACT CENTER Erik CHROMY 1, Ja DIEZKA 1, Matej KAVACKY 1 1 Istitute of Telecommuicatios, Faculty of Electrical Egieerig ad Iformatio Techology, Slovak Uiversity of Techology Bratislava,

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find 1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper Verizo Wireless Broadbad Network Coectivity ad Data Trasport Solutios Verizo Wireless White Paper Cotets 1. Itroductio......................................................................................

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Induced Cooperative Multi-user Diversity Relaying for Multi-hop Cellular Networks

Induced Cooperative Multi-user Diversity Relaying for Multi-hop Cellular Networks Iduced Cooperative Multi-user Diversity Relayig for Multi-hop Cellular Networks Keiva Navaie ad Halim Yaikomeroglu Broadbad Commuicatios ad Wireless Systems (BCWS) Cetre Departmet of Systems ad Computer

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity

Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), INVITED PAPER ON OPTIMIZATION OF COMM. NETWORKS, MARCH 2006 1 Optimal Backpressure Routig for Wireless Networks with Multi-Receiver Diversity Michael

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information